Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/EpicGamesLauncherInstaller.msi?productName=unrealEngine

Overview

General Information

Sample URL:https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/EpicGamesLauncherInstaller.msi?productName=unrealEngine
Analysis ID:1334820
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Queries the volume information (name, serial number etc) of a device
Drops PE files to the application program directory (C:\ProgramData)
Drops certificate files (DER)
Contains functionality to query locales information (e.g. system language)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
Creates files inside the system directory
PE file contains sections with non-standard names
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file does not import any functions
Installs a raw input device (often for capturing keystrokes)
Modifies existing windows services
PE file contains an invalid checksum
Adds / modifies Windows certificates
Drops PE files
Tries to load missing DLLs
Uses cacls to modify the permissions of files
Drops PE files to the windows directory (C:\Windows)
Binary contains a suspicious time stamp
Contains functionality to retrieve information about pressed keystrokes
Checks for available system drives (often done to infect USB drives)
Creates or modifies windows services
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • cmd.exe (PID: 7476 cmdline: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/EpicGamesLauncherInstaller.msi?productName=unrealEngine" > cmdline.out 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 7520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • wget.exe (PID: 7564 cmdline: wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/EpicGamesLauncherInstaller.msi?productName=unrealEngine" MD5: 3DADB6E2ECE9C4B3E1E322E617658B60)
  • msiexec.exe (PID: 7612 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\download\EpicInstaller-15.17.1-unrealEngine.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 8128 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 8156 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 3BBD1DD15089631A9AFCF4304595035B C MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 7320 cmdline: rundll32.exe "C:\Users\user\AppData\Local\Temp\MSIBB31.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7161484 5 CustomActionManaged!CustomActionManaged.CustomActions.ValidatePathLength MD5: 889B99C52A60DD49227C5E485A016679)
    • msiexec.exe (PID: 7244 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 5854640CF7E0C4E3DEBC704E3691BC11 MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 7592 cmdline: rundll32.exe "C:\Windows\Installer\MSI6187.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7168421 10 CustomActionManaged!CustomActionManaged.CustomActions.TelemetrySendStart MD5: 889B99C52A60DD49227C5E485A016679)
      • rundll32.exe (PID: 7356 cmdline: rundll32.exe "C:\Windows\Installer\MSI6C17.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7171125 16 CustomActionManaged!CustomActionManaged.CustomActions.SetStartupCmdlineArgs MD5: 889B99C52A60DD49227C5E485A016679)
      • rundll32.exe (PID: 352 cmdline: rundll32.exe "C:\Windows\Installer\MSI7447.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7173218 22 CustomActionManaged!CustomActionManaged.CustomActions.CheckReparsePoints MD5: 889B99C52A60DD49227C5E485A016679)
      • rundll32.exe (PID: 3452 cmdline: rundll32.exe "C:\Windows\Installer\MSIA49E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7251093 50 CustomActionManaged!CustomActionManaged.CustomActions.TelemetrySendEnd MD5: 889B99C52A60DD49227C5E485A016679)
      • rundll32.exe (PID: 4592 cmdline: rundll32.exe "C:\Windows\Installer\MSIBD1A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7257359 59 CustomActionManaged!CustomActionManaged.CustomActions.SetLauncherEpicGamesDirLoc MD5: 889B99C52A60DD49227C5E485A016679)
      • rundll32.exe (PID: 7136 cmdline: rundll32.exe "C:\Windows\Installer\MSIC019.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7258125 65 CustomActionManaged!CustomActionManaged.CustomActions.SetLauncherInstallDirLoc MD5: 889B99C52A60DD49227C5E485A016679)
      • rundll32.exe (PID: 6692 cmdline: rundll32.exe "C:\Windows\Installer\MSIC3E2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7259093 71 CustomActionManaged!CustomActionManaged.CustomActions.SetServiceWrapperDirLoc MD5: 889B99C52A60DD49227C5E485A016679)
      • rundll32.exe (PID: 7516 cmdline: rundll32.exe "C:\Windows\Installer\MSICB46.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7260984 77 CustomActionManaged!CustomActionManaged.TelemetryActions.TelemetrySendStart MD5: 889B99C52A60DD49227C5E485A016679)
    • msiexec.exe (PID: 5928 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 326B4F743620B4FBE5E3F09E4CCFA871 E Global\MSI0000 MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 6492 cmdline: rundll32.exe "C:\Windows\Installer\MSI19B0.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7215609 31 CustomActionManaged!CustomActionManaged.CustomActions.MoveChainerToFolder MD5: 889B99C52A60DD49227C5E485A016679)
      • icacls.exe (PID: 7832 cmdline: "icacls.exe" "C:\Program Files (x86)\Epic Games\Launcher" /grant "BUILTIN\Users":(OI)(CI)F MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 4520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • icacls.exe (PID: 5752 cmdline: "icacls.exe" "C:\ProgramData\Epic" /grant "BUILTIN\Users":(OI)(CI)F MD5: 2E49585E4E08565F52090B144062F97E)
        • conhost.exe (PID: 3864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • rundll32.exe (PID: 7580 cmdline: rundll32.exe "C:\Windows\Installer\MSIE2CA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7267015 99 CustomActionManaged!CustomActionManaged.CustomActions.RegisterProductID MD5: 889B99C52A60DD49227C5E485A016679)
    • DXSETUP.exe (PID: 7320 cmdline: "C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe" /silent MD5: BF3F290275C21BDD3951955C9C3CF32C)
    • InstallChainer.exe (PID: 6688 cmdline: "C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe" 44 "C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\EpicOnlineServices.msi" "EOSPRODUCTID=EpicGamesLauncher" "C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\EpicGamesLauncher.exe" com.epicgames.launcher://unrealEngine MD5: 4A3181A2E93579124799A9B81263768E)
  • SrTasks.exe (PID: 3568 cmdline: C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1 MD5: 2694D2D28C368B921686FE567BD319EB)
    • conhost.exe (PID: 2448 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: CrashReportClient.exe.10.drBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_7992d738-c
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore SRInitDone
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Content\Font\Noto_License.txtJump to behavior
Source: Binary string: d3dcsx_43.pdb source: SET8FD5.tmp.21.dr
Source: Binary string: DSETUP.pdb source: DXSETUP.exe, DXSETUP.exe, 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, DSETUP.dll.10.dr
Source: Binary string: DSETUP.pdb0 source: DXSETUP.exe, 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, DSETUP.dll.10.dr
Source: Binary string: d:\build\++Portal\Sync\Portal\Source\Installers\EpicOnlineServicesHelper\CustomActionManaged\obj\x86\Release\CustomActionManaged.pdb source: rundll32.exe, 00000023.00000003.2987556388.0000000004CC0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CA0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004720000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004E6B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000027.00000003.3083659682.0000000004860000.00000004.00000020.00020000.00000000.sdmp, CustomActionManaged.dll.36.dr, CustomActionManaged.dll.38.dr
Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdb source: api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr
Source: Binary string: dsetup32.pdb source: DXSETUP.exe, DXSETUP.exe, 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MD /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 /WX -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_BN_ASM_PART_WORDS -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DRC4_ASM -DMD5_ASM -DRMD160_ASM -DAES_ASM -DVPAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DPADLOCK_ASM -DPOLY1305_ASM source: CrashReportClient.exe.10.dr
Source: Binary string: XInput1_3.pdb source: DXSETUP.exe, 00000015.00000003.2851958632.0000000001480000.00000004.00000020.00020000.00000000.sdmp, SET88EF.tmp.21.dr
Source: Binary string: api-ms-win-core-file-l1-2-0.pdb source: api-ms-win-core-file-l1-2-0.dll.10.dr
Source: Binary string: CrashReportClient.pdb source: CrashReportClient.exe.10.dr
Source: Binary string: XInput1_3.pdb@ source: DXSETUP.exe, 00000015.00000003.2851958632.0000000001480000.00000004.00000020.00020000.00000000.sdmp, SET88EF.tmp.21.dr
Source: Binary string: d:\build\++Portal\Sync\Engine\Restricted\NotForLicensees\Source\Programs\UnrealEngineLauncherInstaller\CustomActionManaged\obj\x86\Release\CustomActionManaged.pdb source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, CustomActionManaged.dll.15.dr
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\wixca.pdb source: rundll32.exe, 00000013.00000003.2573130265.000000000679F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\SfxCA.pdb source: MSI6C17.tmp.10.dr
Source: Binary string: d:\build\++Portal\Sync\Engine\Source\Programs\NotForLicensees\UnrealEngineLauncherInstallChainer\InstallChainer\InstallChainer\obj\x86\Release\InstallChainer.pdb source: InstallChainer.exe, 00000022.00000000.2946555358.0000000000AA2000.00000002.00000001.01000000.0000001E.sdmp
Source: Binary string: C:\agent\_work\66\s\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbP source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003300000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031DD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005DC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.000000000062C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007CC000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, 00000022.00000002.3186896603.00000000053D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000023.00000003.2987785945.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CC0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CA0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004720000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005963943.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004E6B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024283792.00000000032EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000027.00000003.3083932135.0000000002EFC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000027.00000003.3083659682.0000000004860000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.dr
Source: Binary string: DXSETUP.pdb source: DXSETUP.exe, DXSETUP.exe, 00000015.00000000.2647842848.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, DXSETUP.exe, 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp
Source: Binary string: %c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%cuser + domain + host name too bigcompiler: cl /Zi /Fdossl_static.pdb /MD /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 /WX -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_BN_ASM_PART_WORDS -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DRC4_ASM -DMD5_ASM -DRMD160_ASM -DAES_ASM -DVPAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DPADLOCK_ASM -DPOLY1305_ASM source: CrashReportClient.exe.10.dr
Source: Binary string: C:\agent\_work\66\s\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003300000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031DD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005DC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.000000000062C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007CC000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, InstallChainer.exe, 00000022.00000002.3186896603.00000000053D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000023.00000003.2987785945.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CC0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CA0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004720000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005963943.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004E6B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024283792.00000000032EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000027.00000003.3083932135.0000000002EFC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000027.00000003.3083659682.0000000004860000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.dr
Source: Binary string: api-ms-win-crt-string-l1-1-0.pdb source: api-ms-win-crt-string-l1-1-0.dll.10.dr
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile opened: c:
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F144B1 FindFirstFileA,FindClose,21_2_00F144B1
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_6D0D6CEC FindFirstFileA,FindClose,21_2_6D0D6CEC
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_6D0DB23F FindFirstFileA,GetLastError,FindClose,__fread_nolock,_strnlen,_strnlen,FindFirstFileA,FindClose,21_2_6D0DB23F
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_6D0DC4A0 _strrchr,FindFirstFileA,FindClose,FindClose,FindFirstFileA,FindClose,_strrchr,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,_strrchr,FileTimeToSystemTime,FileTimeToSystemTime,21_2_6D0DC4A0
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_6D0DA3CE FindFirstFileA,lstrcmpA,lstrcmpA,GetFileAttributesA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,21_2_6D0DA3CE
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\NULL
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine\NULL
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\NULL
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\ThirdParty

Networking

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 54.237.117.94 443
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 54.172.245.211 443
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 52.86.217.108 443Jump to behavior
Source: BaseEngine.ini.10.drString found in binary or memory: LoginRedirectUrl="https://www.facebook.com/connect/login_success.html" equals www.facebook.com (Facebook)
Source: BaseEngine.ini.10.drString found in binary or memory: LoginUrl="https://www.facebook.com/`ver/dialog/oauth" equals www.facebook.com (Facebook)
Source: BaseEngine.ini.10.drString found in binary or memory: http://127.0.0.1
Source: rundll32.exe, 00000026.00000002.3041618750.00000000050D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.epicgames.dev
Source: wget.exe, 00000002.00000003.1893294152.0000000000FF1000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FE9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003304000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031E1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000BA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005E0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.000000000679F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.0000000006874000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987785945.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CF7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CD7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: wget.exe, 00000002.00000003.1893294152.0000000000FF1000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FE9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.0000000006874000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003304000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031E1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000BA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005E0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.000000000679F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987785945.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CF7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CD7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004757000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005963943.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004EA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024283792.00000000032EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003304000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031E1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000BA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005E0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.000000000679F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987785945.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CF7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CD7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004757000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005963943.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004EA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024283792.00000000032EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA.crt0
Source: rundll32.exe, 0000000E.00000003.2110196856.0000000003239000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000002.2111065061.000000000323A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2942304760.0000000000845000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2939523360.0000000000845000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3037274081.0000000003369000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000002.3038990256.0000000003369000.00000004.00000020.00020000.00000000.sdmp, E0968A1E3A40D2582E7FD463BAEB59CD.9.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: rundll32.exe, 0000000E.00000003.2110196856.0000000003239000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000002.2111065061.000000000323A000.00000004.00000020.00020000.00000000.sdmp, DXSETUP.exe, 00000015.00000002.2879867725.00000000013EE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2942304760.0000000000845000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2939523360.0000000000845000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3037274081.0000000003369000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000002.3038990256.0000000003369000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: wget.exe, 00000002.00000003.1893294152.0000000000FF1000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FE9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000002.1930907744.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.0000000006874000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: wget.exe, 00000002.00000003.1893294152.0000000000FF1000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FE9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.0000000006874000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
Source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003304000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031E1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000BA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005E0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.000000000679F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987785945.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CF7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CD7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004757000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005963943.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004EA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024283792.00000000032EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003304000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031E1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000BA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005E0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.000000000679F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CF7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987785945.0000000003194000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.0000000003194000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CD7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005963943.0000000000AD4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004757000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004EA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024283792.00000000032F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
Source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003304000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031E1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000BA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005E0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.000000000679F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987785945.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CF7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CD7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004757000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005963943.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004EA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024283792.00000000032EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA.crl0E
Source: wget.exe, 00000002.00000003.1893294152.0000000000FF1000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FE9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.0000000006874000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003304000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031E1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000BA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005E0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.000000000679F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987785945.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CF7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CD7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004757000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005963943.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004EA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024283792.00000000032EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: wget.exe, 00000002.00000003.1893294152.0000000000FF1000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FE9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003304000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031E1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000BA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005E0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.000000000679F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.0000000006874000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987785945.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CF7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CD7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003304000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031E1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000BA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005E0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.000000000679F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987785945.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CF7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CD7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004757000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005963943.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004EA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024283792.00000000032EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA.crl0L
Source: wget.exe, 00000002.00000003.1893294152.0000000000FF1000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FE9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.0000000006874000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
Source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003304000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031E1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000BA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005E0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.000000000679F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987785945.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CF7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CD7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004757000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005963943.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004EA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024283792.00000000032EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: wget.exe, 00000002.00000003.1893294152.0000000000FF1000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FE9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000002.1930907744.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.0000000006874000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: rundll32.exe, 0000000E.00000002.2111719898.0000000004E40000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2944268216.00000000043ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://datarouter-weighted.ol.epicgames.com
Source: rundll32.exe, 0000000E.00000002.2111719898.0000000004E40000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2944268216.00000000043ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://datarouter.ol.epicgames.com
Source: rundll32.exe, 00000026.00000002.3041618750.00000000050D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://eos-gateway-ingressv2-prod-c3-w1.befa.live.use1a.on.epicgames.com
Source: rundll32.exe, 0000000E.00000003.2110196856.0000000003239000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000002.2111065061.000000000323A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2942304760.0000000000845000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2939523360.0000000000845000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3037274081.0000000003369000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000002.3038990256.0000000003369000.00000004.00000020.00020000.00000000.sdmp, E0968A1E3A40D2582E7FD463BAEB59CD.9.drString found in binary or memory: http://ocsp.comodoca.com0
Source: wget.exe, 00000002.00000003.1893294152.0000000000FF1000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FE9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003304000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031E1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000BA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005E0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.000000000679F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.0000000006874000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987785945.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CF7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CD7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
Source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003304000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031E1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000BA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005E0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.000000000679F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CF7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987785945.0000000003194000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.0000000003194000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CD7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005963943.0000000000AD4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004757000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004EA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024283792.00000000032F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0K
Source: wget.exe, 00000002.00000003.1893294152.0000000000FF1000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FE9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003304000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031E1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000BA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005E0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.000000000679F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.0000000006874000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987785945.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CF7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CD7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0N
Source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003304000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031E1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000BA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005E0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.000000000679F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987785945.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CF7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CD7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004757000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005963943.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004EA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024283792.00000000032EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
Source: wget.exe, 00000002.00000003.1893294152.0000000000FF1000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FE9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000002.1930907744.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.0000000006874000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drString found in binary or memory: http://ocsp.sectigo.com0
Source: rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drString found in binary or memory: http://s.symcd.com06
Source: rundll32.exe, 0000000E.00000002.2111719898.0000000004E2D000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000002.2111719898.0000000004DB1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2944268216.0000000004361000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2944268216.00000000043D7000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000026.00000002.3041618750.0000000005041000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000026.00000002.3041618750.00000000050BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003304000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031E1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000BA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005E0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.000000000679F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987785945.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CF7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CD7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004757000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005963943.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004EA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024283792.00000000032EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wixtoolset.org
Source: InstallChainer.exeString found in binary or memory: http://wixtoolset.org/
Source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, 00000022.00000002.3186896603.00000000053D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CC0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CA0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004720000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004E6B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000027.00000003.3083659682.0000000004860000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.drString found in binary or memory: http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
Source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, InstallChainer.exe, 00000022.00000002.3186896603.00000000053D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CC0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CA0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004720000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004E6B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000027.00000003.3083659682.0000000004860000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.drString found in binary or memory: http://wixtoolset.org/news/
Source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, InstallChainer.exe, 00000022.00000002.3186896603.00000000053D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CC0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CA0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004720000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004E6B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000027.00000003.3083659682.0000000004860000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.drString found in binary or memory: http://wixtoolset.org/releases/
Source: InstallChainer.exeString found in binary or memory: http://wixtoolset.org/telemetry/v
Source: DXSETUP.exe, 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmp, DXSETUP.exe, 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpString found in binary or memory: http://www.BetaPlace.com
Source: DXSETUP.exe, 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpString found in binary or memory: http://www.BetaPlace.com.
Source: DXSETUP.exe, 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpString found in binary or memory: http://www.BetaPlace.com.?
Source: DXSETUP.exe, 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpString found in binary or memory: http://www.BetaPlace.comEContinuare
Source: DXSETUP.exe, 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpString found in binary or memory: http://www.betaplace.com
Source: DXSETUP.exe, DXSETUP.exe, 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmp, DXSETUP.exe, 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpString found in binary or memory: http://www.betaplace.com.
Source: wget.exe, 00000002.00000003.1893294152.0000000000FF1000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FE9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.0000000006874000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drString found in binary or memory: http://www.digicert.com/CPS0
Source: CrashReportClient.exe.10.drString found in binary or memory: http://www.google.comDUMPREQFLUSHD:/build/
Source: CrashReportClient.exe.10.drString found in binary or memory: http://www.unicode.org/copyright.html
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://accounts.epicgames.com
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://accounts.launcher-website-prod07.ol.epicgames.com
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://accounts.unrealengine.com
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://answers.unrealengine.com
Source: rundll32.exe, 00000026.00000002.3041618750.00000000050BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.epicgame
Source: rundll32.exe, 00000026.00000002.3041618750.0000000005041000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000026.00000002.3041618750.00000000050BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.epicgames.dev
Source: rundll32.exe, 00000023.00000003.2987556388.0000000004CC0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CA0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004720000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000002.3041618750.0000000005041000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004E6B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000027.00000003.3083659682.0000000004860000.00000004.00000020.00020000.00000000.sdmp, CustomActionManaged.dll.36.dr, CustomActionManaged.dll.38.drString found in binary or memory: https://api.epicgames.dev/
Source: rundll32.exe, 00000026.00000002.3041618750.0000000005041000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.epicgames.dev/telemetry/data?SessionID=
Source: rundll32.exe, 00000026.00000002.3041618750.0000000005090000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.epicgames.dev/telemetry/data?SessionID=%7B2CF9C3A4-CF06-41C6-AA21-0F580F96D9BD%7D&AppID=
Source: BaseEngine.ini.10.drString found in binary or memory: https://api.twitch.tv/kraken
Source: BaseEngine.ini.10.drString found in binary or memory: https://api.twitch.tv/kraken/oauth2/authorize
Source: BaseEngine.ini.10.drString found in binary or memory: https://api.twitch.tv/kraken/oauth2/revoke
Source: CrashReportClient.exe.10.drString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drString found in binary or memory: https://d.symcb.com/cps0%
Source: rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drString found in binary or memory: https://d.symcb.com/rpa0
Source: rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drString found in binary or memory: https://d.symcb.com/rpa0.
Source: rundll32.exe, 00000021.00000002.2944268216.00000000043D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://datarouter.ol.epicgameT
Source: rundll32.exe, 0000000E.00000002.2111719898.0000000004E2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://datarouter.ol.epicgameTj
Source: rundll32.exe, 0000000E.00000002.2111719898.0000000004E2D000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000002.2111719898.0000000004DB1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2944268216.0000000004361000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2944268216.00000000043D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://datarouter.ol.epicgames.com
Source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000002.2111719898.0000000004DB1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2944268216.0000000004361000.00000004.00000800.00020000.00000000.sdmp, CustomActionManaged.dll.15.drString found in binary or memory: https://datarouter.ol.epicgames.com/
Source: rundll32.exe, 0000000E.00000002.2111719898.0000000004DB1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2944268216.0000000004361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://datarouter.ol.epicgames.com/datarouter/api/v1/public/data?SessionID=
Source: rundll32.exe, 00000021.00000002.2944268216.00000000043B0000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2944268216.0000000004361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://datarouter.ol.epicgames.com/datarouter/api/v1/public/data?SessionID=%7B090B195D-E8A0-4734-80
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://dev.epicgames.com
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://docs.unrealengine.com
Source: cmdline.out.0.drString found in binary or memory: https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://epicgames.com
Source: CrashReportClient.exe.10.drString found in binary or memory: https://epicsupport.force.com/unrealengine/s/
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://fortnitehelp.epicgames.com
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://forums.unrealengine.com
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://help.unrealtournament.com
Source: wget.exeString found in binary or memory: https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/
Source: wget.exe, 00000002.00000002.1930579524.00000000009E0000.00000004.00000020.00020000.00000000.sdmp, cmdline.out.0.drString found in binary or memory: https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/EpicGamesLau
Source: wget.exe, 00000002.00000002.1930579524.00000000009E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/h5
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://launcher.store.epicgames.com
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://launcherhelp.epicgames.com
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://paragonhelp.epicgames.com
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://publish.unrealengine.com
Source: wget.exe, 00000002.00000003.1893294152.0000000000FF1000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FE9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000002.1930907744.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.0000000006874000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drString found in binary or memory: https://sectigo.com/CPS0
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://shadowcomplexhelp.epicgames.com
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://store.epicgames.com
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://twinmotionhelp.epicgames.com
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://ue-launcher-website-prod.ol.epicgames.com
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://unrealstudiohelp.epicgames.com
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://wiki.unrealengine.com
Source: wget.exe, 00000002.00000003.1893294152.0000000000FF1000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FE9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003304000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031E1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000BA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005E0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.000000000679F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.0000000006874000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987785945.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CF7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987785945.0000000003194000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.000000000318D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://www.twinmotion.com
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://www.unrealengine.com
Source: NamedBaseUrls.json.10.drString found in binary or memory: https://www.unrealengine.com/twinmotion
Source: CrashReportClient.exe.10.drBinary or memory string: GetRawInputDatamemstr_8703d164-a
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F14D57 CreateMutexA,GetLastError,SetErrorMode,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,DirectXSetupSetCallback,DirectXSetupSetCallback,DirectXSetupA,GetAsyncKeyState,ExitWindowsEx,#17,FreeLibrary,GetLastError,DirectXSetupA,GetLastError,FreeLibrary,GetLastError,GetLastError,CloseHandle,CloseHandle,EnumWindows,21_2_00F14D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX71DD.tmp\d3dx10_43_x86.catJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX71DD.tmp\xinput1_3_x86.catJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX71DD.tmp\d3dcsx_43_x86.catJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX71DD.tmp\D3DCompiler_43_x86.catJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX71DD.tmp\d3dx11_43_x86.catJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI60EA.tmpJump to behavior
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F14D57 CreateMutexA,GetLastError,SetErrorMode,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,DirectXSetupSetCallback,DirectXSetupSetCallback,DirectXSetupA,GetAsyncKeyState,ExitWindowsEx,#17,FreeLibrary,GetLastError,DirectXSetupA,GetLastError,FreeLibrary,GetLastError,GetLastError,CloseHandle,CloseHandle,EnumWindows,21_2_00F14D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F16964 GetSystemDirectoryA,GetLastError,#17,ExitWindowsEx,21_2_00F16964
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\6d496a.msiJump to behavior
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009F723A2_2_009F723A
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F1EE9B21_2_00F1EE9B
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F2503D21_2_00F2503D
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F1940021_2_00F19400
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F2492121_2_00F24921
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F256FC21_2_00F256FC
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F24E6A21_2_00F24E6A
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F243D821_2_00F243D8
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_6D0E69F221_2_6D0E69F2
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_6D0DC4A021_2_6D0DC4A0
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_6D0E231021_2_6D0E2310
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_6D0E4FC121_2_6D0E4FC1
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_73ACDD9D21_2_73ACDD9D
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_73AC8B3021_2_73AC8B30
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeCode function: 34_2_053D346534_2_053D3465
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeCode function: 34_2_02E4105034_2_02E41050
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 39_3_04A32B1039_3_04A32B10
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: String function: 6D0E22A4 appears 34 times
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: String function: 6D0D6210 appears 91 times
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: String function: 73AC64D5 appears 57 times
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: String function: 00F1390A appears 59 times
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: String function: 00F1ABA8 appears 31 times
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: String function: 6D0D6391 appears 137 times
Source: api-ms-win-core-debug-l1-1-0.dll.10.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-conio-l1-1-0.dll.10.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-stdio-l1-1-0.dll.10.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-rtlsupport-l1-1-0.dll.10.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-heap-l1-1-0.dll.10.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-namedpipe-l1-1-0.dll.10.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-handle-l1-1-0.dll.10.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-file-l1-2-0.dll.10.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-console-l1-2-0.dll.10.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-string-l1-1-0.dll.10.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-string-l1-1-0.dll.10.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-heap-l1-1-0.dll.10.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-console-l1-1-0.dll.10.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-synch-l1-1-0.dll.10.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-localization-l1-2-0.dll.10.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-file-l2-1-0.dll.10.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-datetime-l1-1-0.dll.10.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-environment-l1-1-0.dll.10.drStatic PE information: No import functions for PE file found
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: sfc.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeSection loaded: sfc.dll
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeSection loaded: tsappcmp.dll
Source: C:\Windows\SysWOW64\wget.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/EpicGamesLauncherInstaller.msi?productName=unrealEngine" > cmdline.out 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/EpicGamesLauncherInstaller.msi?productName=unrealEngine"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\download\EpicInstaller-15.17.1-unrealEngine.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 3BBD1DD15089631A9AFCF4304595035B C
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSIBB31.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7161484 5 CustomActionManaged!CustomActionManaged.CustomActions.ValidatePathLength
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 5854640CF7E0C4E3DEBC704E3691BC11
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI6187.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7168421 10 CustomActionManaged!CustomActionManaged.CustomActions.TelemetrySendStart
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI6C17.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7171125 16 CustomActionManaged!CustomActionManaged.CustomActions.SetStartupCmdlineArgs
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI7447.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7173218 22 CustomActionManaged!CustomActionManaged.CustomActions.CheckReparsePoints
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 326B4F743620B4FBE5E3F09E4CCFA871 E Global\MSI0000
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI19B0.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7215609 31 CustomActionManaged!CustomActionManaged.CustomActions.MoveChainerToFolder
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe "C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe" /silent
Source: unknownProcess created: C:\Windows\System32\SrTasks.exe C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1
Source: C:\Windows\System32\SrTasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "icacls.exe" "C:\Program Files (x86)\Epic Games\Launcher" /grant "BUILTIN\Users":(OI)(CI)F
Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "icacls.exe" "C:\ProgramData\Epic" /grant "BUILTIN\Users":(OI)(CI)F
Source: C:\Windows\SysWOW64\icacls.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSIA49E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7251093 50 CustomActionManaged!CustomActionManaged.CustomActions.TelemetrySendEnd
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe "C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe" 44 "C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\EpicOnlineServices.msi" "EOSPRODUCTID=EpicGamesLauncher" "C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\EpicGamesLauncher.exe" com.epicgames.launcher://unrealEngine
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSIBD1A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7257359 59 CustomActionManaged!CustomActionManaged.CustomActions.SetLauncherEpicGamesDirLoc
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSIC019.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7258125 65 CustomActionManaged!CustomActionManaged.CustomActions.SetLauncherInstallDirLoc
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSIC3E2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7259093 71 CustomActionManaged!CustomActionManaged.CustomActions.SetServiceWrapperDirLoc
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSICB46.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7260984 77 CustomActionManaged!CustomActionManaged.TelemetryActions.TelemetrySendStart
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSIE2CA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7267015 99 CustomActionManaged!CustomActionManaged.CustomActions.RegisterProductID
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/EpicGamesLauncherInstaller.msi?productName=unrealEngine" Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 3BBD1DD15089631A9AFCF4304595035B CJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 5854640CF7E0C4E3DEBC704E3691BC11Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 326B4F743620B4FBE5E3F09E4CCFA871 E Global\MSI0000Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSIBB31.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7161484 5 CustomActionManaged!CustomActionManaged.CustomActions.ValidatePathLengthJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe "C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe" 44 "C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\EpicOnlineServices.msi" "EOSPRODUCTID=EpicGamesLauncher" "C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\EpicGamesLauncher.exe" com.epicgames.launcher://unrealEngineJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSIBB31.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7161484 5 CustomActionManaged!CustomActionManaged.CustomActions.ValidatePathLengthJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI6187.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7168421 10 CustomActionManaged!CustomActionManaged.CustomActions.TelemetrySendStartJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI6C17.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7171125 16 CustomActionManaged!CustomActionManaged.CustomActions.SetStartupCmdlineArgsJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI7447.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7173218 22 CustomActionManaged!CustomActionManaged.CustomActions.CheckReparsePointsJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSIA49E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7251093 50 CustomActionManaged!CustomActionManaged.CustomActions.TelemetrySendEndJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSIBD1A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7257359 59 CustomActionManaged!CustomActionManaged.CustomActions.SetLauncherEpicGamesDirLocJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSIC019.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7258125 65 CustomActionManaged!CustomActionManaged.CustomActions.SetLauncherInstallDirLocJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSIC3E2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7259093 71 CustomActionManaged!CustomActionManaged.CustomActions.SetServiceWrapperDirLocJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSICB46.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7260984 77 CustomActionManaged!CustomActionManaged.TelemetryActions.TelemetrySendStartJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSI19B0.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7215609 31 CustomActionManaged!CustomActionManaged.CustomActions.MoveChainerToFolder
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "icacls.exe" "C:\Program Files (x86)\Epic Games\Launcher" /grant "BUILTIN\Users":(OI)(CI)F
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "icacls.exe" "C:\ProgramData\Epic" /grant "BUILTIN\Users":(OI)(CI)F
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Windows\Installer\MSIE2CA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7267015 99 CustomActionManaged!CustomActionManaged.CustomActions.RegisterProductID
Source: C:\Windows\SysWOW64\wget.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F14163 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,FreeLibrary,GetLastError,21_2_00F14163
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\Desktop\cmdline.outJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIA268.tmpJump to behavior
Source: CrashReportClient.exe.10.drBinary string: 4: Use Windows functions, use names such as DirectX Device (newest, most promising)r.DriverDetectionMethodLogThreadingWindowsD:\build\++Portal\Sync\Engine\Source\Runtime\Core\Public\GenericPlatform/GenericPlatformProcess.hURLParmsWindows (unknown version)Windows 2000ProfessionalDatacenter ServerAdvanced ServerWindows XPHome EditionWindows Server 2003 R2Windows Storage Server 2003Windows Home ServerProfessional x64 EditionWindows Server 2003Windows VistaWindows Server 2008Windows 7Windows Server 2008 R2Windows 8Windows Server 2012Windows 8.1Windows Server 2012 R2Windows 11Windows 10Windows Server 2022Windows Server 2019ReleaseIdSOFTWARE\Microsoft\Windows NT\CurrentVersion (Release %s)GetProductInfokernel32.dllUltimate EditionHome Premium EditionHome Basic EditionEnterprise EditionBusiness EditionStarter EditionCluster Server EditionDatacenter EditionDatacenter Edition (core installation)Enterprise Edition (core installation)Enterprise Edition for Itanium-based SystemsSmall Business ServerSmall Business Server Premium EditionStandard EditionStandard Edition (core installation)Web Server Edition(type unknown)64bit32bit%d.%d.%d.%d.%d.%sPureVirtualFunctionCalledWhileRunningAppPure virtual function being called while application was running (GIsRunning == 1).Pure virtual function being calledError_ResolutionTooLowLaunchThe current resolution is too low to run this game.Computer: %sCPU Page size=%i, Cores=%iHigh frequency timer resolution =%f MHzConsoleCtrl RequestExit*** INTERRUPTED *** : SHUTTING DOWN*** INTERRUPTED *** : CTRL-C TO FORCE QUITntdll.dllRtlAreLongPathsEnabledAttempting to run KillAllPopUpBlockingWindowsKillAllPopUpBlockingWindows.batWin RequestExitOutBuffer && BufferCountCoCreateGuid( (GUID*)&Result )==((HRESULT)0L)No to AllYes to AllNoToAllYesToAllIsWow64Processkernel32usehyperthreading-corelimit=SoftwareFWindowsPlatformMisc::SetStoredValue: ERROR: Could not store value for '%s'. Error Code %u: %sDevice DescriptionDriverDesc\SettingsProviderNameNVIDIAAdvanced Micro DevicesIntelDriverVersionCatalyst_VersionCatalyst RadeonSoftwareEditionRadeonSoftwareVersionDriverDateEnumDisplayDevices: %d. '%s' (P:%d D:%d)JumpOverNonPrimary \Registry\Machine\\HKEY_LOCAL_MACHINE\GetVideoDriverDetailsInvalid PrimaryIsNotTheChoosenAdapter PrimaryDriverLocationFailed FoundDriverCount:%d DebugString: %sSYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\%04dFoundDriverCount:%d FallbackToPrimary \Device\Video0HARDWARE\DEVICEMAP\VIDEOQueryForPrimaryFailed MachineGuidSoftware\Microsoft\CryptographyDefaultProviderNameStreamingInstallData
Source: classification engineClassification label: mal48.evad.win@46/1104@0/6
Source: C:\Windows\System32\msiexec.exeFile read: C:\Windows\win.iniJump to behavior
Source: CustomActionManaged.dll.14.dr, CustomActions.csSuspicious method names: .CustomActions.GetAnalyticsPayload
Source: CustomActionManaged.dll.12.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionEndAnalyticsPayloadString
Source: CustomActionManaged.dll.12.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionStartAnalyticsPayloadString
Source: CustomActionManaged.dll.12.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionUpgradeStartAnalyticsPayloadString
Source: CustomActionManaged.dll.12.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetCompactedJsonString
Source: CustomActionManaged.dll.12.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionUpgradeEndAnalyticsPayloadString
Source: CustomActionManaged.dll.12.dr, CustomActions.csSuspicious method names: .CustomActions.GetAnalyticsPayload
Source: CustomActionManaged.dll.14.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionEndAnalyticsPayloadString
Source: CustomActionManaged.dll.14.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionStartAnalyticsPayloadString
Source: CustomActionManaged.dll.14.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionUpgradeStartAnalyticsPayloadString
Source: CustomActionManaged.dll.14.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetCompactedJsonString
Source: CustomActionManaged.dll.14.dr, AnalyticsPayload.csSuspicious method names: .AnalyticsPayload.GetActionUpgradeEndAnalyticsPayloadString
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F1390A __wstrtime,__wstrtime,_strrchr,FormatMessageA,LocalFree,GetLastError,21_2_00F1390A
Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dll
Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dll
Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dll
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dll
Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dll
Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dll
Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dll
Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dll
Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dll
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSIBB31.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7161484 5 CustomActionManaged!CustomActionManaged.CustomActions.ValidatePathLength
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2448:120:WilError_03
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeMutant created: \Sessions\1\BaseNamedObjects\DSETUP32 DLL Mutex
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4520:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7520:120:WilError_03
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeMutant created: \Sessions\1\BaseNamedObjects\***DirectXSetupA***
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeMutant created: \Sessions\1\BaseNamedObjects\DSETUP DLL Mutex
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeMutant created: \Sessions\1\BaseNamedObjects\DirectX Setup
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3864:120:WilError_03
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_6D0D7D53 iDirectXSetupGetEULAA,SetLastError,SetLastError,FindResourceA,GetLastError,SizeofResource,SetLastError,LoadResource,GetLastError,LockResource,SetLastError,21_2_6D0D7D53
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic GamesJump to behavior
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain21_2_00F14D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain21_2_00F14D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain21_2_00F14D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain21_2_00F14D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain21_2_00F14D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: dsetup.dll21_2_00F14D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: DirectXSetupA21_2_00F14D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: FreeLibrary()21_2_00F14D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain21_2_00F14D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain21_2_00F14D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain21_2_00F14D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain21_2_00F14D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: FreeLibrary()21_2_00F14D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain21_2_00F14D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: LoadLibrary()21_2_00F14D57
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCommand line argument: WinMain21_2_00F14D57
Source: CrashReportClient.exe.10.drBinary or memory string: .Target.cs.Build.csSourceIntermediate/TargetInfo.json-Mode=QueryTargets -Project="%s" -Output="%s"Unable to read target info for %s.slnUnreal ProjectsUnrealEngineLauncher/LauncherInstalled.datUE_4.040003UE_4.11040003InstallationListInstallLocationUnrealEngineLauncher/Data/Manifests/%s.manifestCustomFieldsInstallLocation*.upluginIntermediate5.0EASaved/ConfigEditorGameAgnosticCreatedProjectPathsRecentlyOpenedProjectFiles(ProjectName="/Templates/
Source: CrashReportClient.exe.10.drBinary or memory string: SOFTWARE\SOFTWARE\Wow6432Node\MSBuild/14.0/bin/MSBuild.exeMSBuild.exeMSBuildToolsPathMicrosoft\MSBuild\ToolsVersions\14.0MSBuild\15.0\bin\MSBuild.exe15.0Microsoft\VisualStudio\SxS\VS7Microsoft\MSBuild\ToolsVersions\12.0Microsoft\MSBuild\ToolsVersions\4.0Building UnrealBuildTool in %s...Project file not found at %sCouldn't find MSBuild installation; skipping./nologo /verbosity:quiet "%s" /property:Configuration=Development /property:Platform=AnyCPURunning: %s %sFailed to start process.Missing %s after buildTargetsEngine/Source/Programs/UnrealBuildTool/UnrealBuildTool.csprojEngine/Config/UnrealBuildToolPlatformPathsEngine/Binaries/DotNET/UnrealBuildTool.exeLauncher.Platform_%sLauncher.Platform_%s.LargeLauncher.Platform_%s.XLargeD:/build/++Portal/Sync/Engine/Source/Developer/DesktopPlatform/Private/PlatformInfo.cppCookFlavorBuildFlavorUnknown platform flag %s in PlatformInfobTargetPlatformCanUseCrashReporterDataDrivenPlatformInfo section [PreviewPlatform %s] must specify a PlatformNamePlatformName != NAME_NoneDataDrivenPlatformInfo section [PreviewPlatform %s] must specify a ShaderFormatItem.ShaderFormat != NAME_NoneEnabledCVarPlatformNameShaderFormatActiveIconPathActiveIconNameInactiveIconPathInactiveIconNameDeviceProfileNameMenuTextMenuTooltipIconTextPlatformInfo PreviewPlatform
Source: wget.exeString found in binary or memory: https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/
Source: wget.exeString found in binary or memory: https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/
Source: C:\Windows\System32\msiexec.exeFile written: C:\ProgramData\Epic\EpicGamesLauncher\Data\EMS\EpicGamesLauncher\PortalRegions.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Binary string: d3dcsx_43.pdb source: SET8FD5.tmp.21.dr
Source: Binary string: DSETUP.pdb source: DXSETUP.exe, DXSETUP.exe, 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, DSETUP.dll.10.dr
Source: Binary string: DSETUP.pdb0 source: DXSETUP.exe, 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, DSETUP.dll.10.dr
Source: Binary string: d:\build\++Portal\Sync\Portal\Source\Installers\EpicOnlineServicesHelper\CustomActionManaged\obj\x86\Release\CustomActionManaged.pdb source: rundll32.exe, 00000023.00000003.2987556388.0000000004CC0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CA0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004720000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004E6B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000027.00000003.3083659682.0000000004860000.00000004.00000020.00020000.00000000.sdmp, CustomActionManaged.dll.36.dr, CustomActionManaged.dll.38.dr
Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdb source: api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr
Source: Binary string: dsetup32.pdb source: DXSETUP.exe, DXSETUP.exe, 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MD /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 /WX -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_BN_ASM_PART_WORDS -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DRC4_ASM -DMD5_ASM -DRMD160_ASM -DAES_ASM -DVPAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DPADLOCK_ASM -DPOLY1305_ASM source: CrashReportClient.exe.10.dr
Source: Binary string: XInput1_3.pdb source: DXSETUP.exe, 00000015.00000003.2851958632.0000000001480000.00000004.00000020.00020000.00000000.sdmp, SET88EF.tmp.21.dr
Source: Binary string: api-ms-win-core-file-l1-2-0.pdb source: api-ms-win-core-file-l1-2-0.dll.10.dr
Source: Binary string: CrashReportClient.pdb source: CrashReportClient.exe.10.dr
Source: Binary string: XInput1_3.pdb@ source: DXSETUP.exe, 00000015.00000003.2851958632.0000000001480000.00000004.00000020.00020000.00000000.sdmp, SET88EF.tmp.21.dr
Source: Binary string: d:\build\++Portal\Sync\Engine\Restricted\NotForLicensees\Source\Programs\UnrealEngineLauncherInstaller\CustomActionManaged\obj\x86\Release\CustomActionManaged.pdb source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, CustomActionManaged.dll.15.dr
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\wixca.pdb source: rundll32.exe, 00000013.00000003.2573130265.000000000679F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\agent\_work\66\s\build\ship\x86\SfxCA.pdb source: MSI6C17.tmp.10.dr
Source: Binary string: d:\build\++Portal\Sync\Engine\Source\Programs\NotForLicensees\UnrealEngineLauncherInstallChainer\InstallChainer\InstallChainer\obj\x86\Release\InstallChainer.pdb source: InstallChainer.exe, 00000022.00000000.2946555358.0000000000AA2000.00000002.00000001.01000000.0000001E.sdmp
Source: Binary string: C:\agent\_work\66\s\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbP source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003300000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031DD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005DC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.000000000062C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007CC000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, 00000022.00000002.3186896603.00000000053D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000023.00000003.2987785945.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CC0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CA0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004720000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005963943.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004E6B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024283792.00000000032EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000027.00000003.3083932135.0000000002EFC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000027.00000003.3083659682.0000000004860000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.dr
Source: Binary string: DXSETUP.pdb source: DXSETUP.exe, DXSETUP.exe, 00000015.00000000.2647842848.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, DXSETUP.exe, 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp
Source: Binary string: %c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%cuser + domain + host name too bigcompiler: cl /Zi /Fdossl_static.pdb /MD /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 /WX -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_BN_ASM_PART_WORDS -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DRC4_ASM -DMD5_ASM -DRMD160_ASM -DAES_ASM -DVPAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DPADLOCK_ASM -DPOLY1305_ASM source: CrashReportClient.exe.10.dr
Source: Binary string: C:\agent\_work\66\s\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003300000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031DD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E0C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005DC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.000000000062C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007CC000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, InstallChainer.exe, 00000022.00000002.3186896603.00000000053D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000023.00000003.2987785945.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CC0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CA0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004720000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005963943.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004E6B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024283792.00000000032EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000027.00000003.3083932135.0000000002EFC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000027.00000003.3083659682.0000000004860000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.dr
Source: Binary string: api-ms-win-crt-string-l1-1-0.pdb source: api-ms-win-crt-string-l1-1-0.dll.10.dr
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009EBEAF push ebx; ret 2_2_009EBEB5
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009F2CA8 push eax; ret 2_2_009F2CD5
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009E8CA4 push ecx; ret 2_2_009E8D1D
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009F0EA2 push ebx; ret 2_2_009F0EA5
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009F0ECA push ebx; ret 2_2_009F0ECD
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009E8CC8 push ecx; ret 2_2_009E8D1D
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009EBEEA push eax; ret 2_2_009EBF15
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009E96E2 push esp; ret 2_2_009E96F5
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009EA4E2 push esp; ret 2_2_009EA4E5
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009F0A00 push esp; ret 2_2_009F0A85
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009EBC2D push esp; ret 2_2_009EBC45
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009F0C52 push edx; ret 2_2_009F0C55
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009F2C79 push esp; ret 2_2_009F2CA5
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009F2C79 push edx; ret 2_2_009F2CC5
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009E8C76 push ecx; ret 2_2_009E8D1D
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009EBC72 push eax; ret 2_2_009EBC75
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009F166A push edx; ret 2_2_009F166D
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009F0990 push esp; ret 2_2_009F0A85
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009EC5DC push es; ret 2_2_009EC5FD
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009EB9DA push eax; ret 2_2_009EB9E5
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009EB51A push eax; ret 2_2_009EB51D
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009EB318 push edx; ret 2_2_009EB319
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009E9B12 push ecx; ret 2_2_009E9BA5
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009ECF04 push edi; retn 0000h2_2_009ECF05
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009EBD00 push eax; ret 2_2_009EBD85
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009F873A push edx; ret 2_2_009F873D
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009E8B38 push esp; ret 2_2_009E8C35
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009F2B37 push esp; ret 2_2_009F2B45
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009F2B37 push esp; ret 2_2_009F2B65
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009E8B54 push esp; ret 2_2_009E8C35
Source: C:\Windows\SysWOW64\wget.exeCode function: 2_2_009F0B52 push ebx; ret 2_2_009F0B55
Source: CrashReportClient.exe.10.drStatic PE information: section name: .uedbg
Source: CrashReportClient.exe.10.drStatic PE information: section name: _RDATA
Source: EpicGamesLauncher.exe.10.drStatic PE information: section name: .uedbg
Source: EpicGamesLauncher.exe.10.drStatic PE information: section name: _RDATA
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F13C3F GetVersionExA,LoadLibraryA,GetProcAddress,GetLastError,FreeLibrary,GetLastError,21_2_00F13C3F
Source: MSI6C17.tmp.10.drStatic PE information: real checksum: 0x34095 should be: 0x434e4
Source: CustomActionManaged.dll.14.drStatic PE information: real checksum: 0x0 should be: 0x16c68
Source: CustomActionManaged.dll.12.drStatic PE information: real checksum: 0x0 should be: 0x16c68
Source: MSI6187.tmp.10.drStatic PE information: real checksum: 0x34095 should be: 0x434e4
Source: MSIBB31.tmp.9.drStatic PE information: real checksum: 0x34095 should be: 0x434e4
Source: MSI7447.tmp.10.drStatic PE information: real checksum: 0x34095 should be: 0x434e4
Source: api-ms-win-core-localization-l1-2-0.dll.10.drStatic PE information: 0xB4568012 [Mon Nov 16 03:29:22 2065 UTC]
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\ProgramData\Epic\EpicGamesLauncher\InstallChainer.exeJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\ProgramData\Epic\EpicGamesLauncher\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI19B0.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET88EF.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\concrt140.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIBD1A.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-file-l1-2-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI6187.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET8B60.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI6C17.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIE2CA.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIA49E.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX71DD.tmp\D3DCompiler_43.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSICB46.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI7447.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI7447.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\ProgramData\Epic\EpicGamesLauncher\InstallChainer.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-string-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\DirectXRedist\dsetup32.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\DirectXRedist\DSETUP.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIE2CA.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIC019.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET8DC2.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\msvcp140_2.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI6C17.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET91D8.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI6187.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-file-l2-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI19B0.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIC3E2.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\EpicGamesLauncher.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIBB11.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI7447.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX71DD.tmp\dxupdate.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIBD1A.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSIBB31.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6187.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIA49E.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIA268.tmpJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX71DD.tmp\d3dx11_43.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\CrashReportClient.exeJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSIBB31.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIC019.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX71DD.tmp\d3dx10_43.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX71DD.tmp\xinput1_3.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIC3E2.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6C17.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI60EA.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\ProgramData\Epic\EpicGamesLauncher\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSICB46.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIBB31.tmpJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET8FD5.tmpJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Users\user\AppData\Local\Temp\DX71DD.tmp\d3dcsx_43.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\concrt140.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\vccorlib140.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-console-l1-2-0.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: (copy)Jump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-console-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI19B0.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIC3E2.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI19B0.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET88EF.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI7447.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIBD1A.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI6187.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIBD1A.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET8B60.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6187.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI6C17.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIA49E.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIE2CA.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIC019.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIA49E.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIC3E2.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6C17.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI60EA.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSICB46.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI7447.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI7447.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSICB46.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIE2CA.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET8FD5.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSIC019.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET8DC2.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI6C17.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile created: C:\Windows\SysWOW64\SET91D8.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\Installer\MSI6187.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_6D0DC3A6 GetPrivateProfileStringA,21_2_6D0DC3A6
Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Content\Font\Noto_License.txtJump to behavior
Source: C:\Windows\System32\SrTasks.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "icacls.exe" "C:\Program Files (x86)\Epic Games\Launcher" /grant "BUILTIN\Users":(OI)(CI)F
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOGPFAULTERRORBOX
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exe TID: 8096Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7624Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\SrTasks.exe TID: 4412Thread sleep time: -300000s >= -30000s
Source: C:\Windows\SysWOW64\rundll32.exe TID: 3468Thread sleep time: -30000s >= -30000s
Source: C:\Windows\SysWOW64\rundll32.exe TID: 7724Thread sleep time: -30000s >= -30000s
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_21-27807
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_21-28139
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI19B0.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Windows\SysWOW64\SET88EF.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSIBD1A.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\concrt140.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-file-l1-2-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI6187.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Windows\SysWOW64\SET8B60.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI6C17.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSIE2CA.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA49E.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSICB46.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI7447.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-string-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSIE2CA.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSIC019.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Windows\SysWOW64\SET8DC2.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\msvcp140_2.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI6C17.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Windows\SysWOW64\SET91D8.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI6187.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-file-l2-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSIC3E2.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI19B0.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\EpicGamesLauncher.exeJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSI7447.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSIBD1A.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIBB31.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA49E.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\CrashReportClient.exeJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSIC019.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIBB31.tmp-\CustomActionManaged.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSIC3E2.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\ProgramData\Epic\EpicGamesLauncher\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\Installer\MSICB46.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: C:\Windows\SysWOW64\SET8FD5.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\concrt140.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\vccorlib140.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-console-l1-2-0.dllJump to dropped file
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeDropped PE file which has not been started: (copy)Jump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-console-l1-1-0.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F2152E __get_wpgmptr,VirtualQuery,GetSystemInfo,GetModuleHandleW,GetProcAddress,VirtualAlloc,VirtualProtect,21_2_00F2152E
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F144B1 FindFirstFileA,FindClose,21_2_00F144B1
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_6D0D6CEC FindFirstFileA,FindClose,21_2_6D0D6CEC
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_6D0DB23F FindFirstFileA,GetLastError,FindClose,__fread_nolock,_strnlen,_strnlen,FindFirstFileA,FindClose,21_2_6D0DB23F
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_6D0DC4A0 _strrchr,FindFirstFileA,FindClose,FindClose,FindFirstFileA,FindClose,_strrchr,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,_strrchr,FileTimeToSystemTime,FileTimeToSystemTime,21_2_6D0DC4A0
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_6D0DA3CE FindFirstFileA,lstrcmpA,lstrcmpA,GetFileAttributesA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,21_2_6D0DA3CE
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeAPI call chain: ExitProcess graph end nodegraph_21-27374
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeAPI call chain: ExitProcess graph end nodegraph_21-28141
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile Volume queried: C:\Windows FullSizeInformation
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\NULL
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine\NULL
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\NULL
Source: C:\Windows\SysWOW64\icacls.exeFile opened: C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\ThirdParty
Source: SrTasks.exe, 00000019.00000003.2875791430.00000163F8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Device\HarddiskVolume1\??\Volume{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:]]?
Source: SrTasks.exe, 00000019.00000003.2875791430.00000163F8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Device\HarddiskVolume1\??\Volume{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
Source: DXSETUP.exe, 00000015.00000002.2879867725.00000000013EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: rundll32.exe, 00000021.00000002.2942304760.0000000000817000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2939523360.0000000000816000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll|
Source: SrTasks.exe, 00000019.00000003.2909165659.00000163F8E12000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CVMWar&Prod_VMware_SATA_CD00
Source: SrTasks.exe, 00000019.00000003.2908112809.00000163F8DC9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Device\HarddiskVolume1\??\Volume{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:e
Source: wget.exeBinary or memory string: Hyper-V RAW
Source: DXSETUP.exe, 00000015.00000002.2879867725.00000000013EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: SrTasks.exe, 00000019.00000003.2875791430.00000163F8E0C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Device\HarddiskVolume1\??\Volume{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:N33?
Source: DXSETUP.exe, 00000015.00000002.2879867725.00000000013EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
Source: rundll32.exe, 00000026.00000003.3037274081.0000000003331000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000002.3038990256.0000000003332000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll^
Source: wget.exe, 00000002.00000002.1930579524.00000000009E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2110196856.0000000003239000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000002.2111065061.000000000323A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F13647 GetWindowsDirectoryA,OutputDebugStringA,CreateDirectoryA,GetLastError,__wstrtime,__wstrtime,21_2_00F13647
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F13C3F GetVersionExA,LoadLibraryA,GetProcAddress,GetLastError,FreeLibrary,GetLastError,21_2_00F13C3F
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F220B3 GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,SetEndOfFile,GetLastError,21_2_00F220B3
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F17E8A SetUnhandledExceptionFilter,21_2_00F17E8A
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F1765E SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00F1765E
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F21B48 _raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,__amsg_exit,21_2_00F21B48
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_6D0DFC2E SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_6D0DFC2E
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_6D0EAACB _raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_6D0EAACB
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_73AD065C _raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_73AD065C
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_73AC6DF2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_73AC6DF2

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 54.237.117.94 443
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 54.172.245.211 443
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 52.86.217.108 443Jump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe c:\windows\system32\cmd.exe /c wget -t 2 -v -t 60 -p "c:\users\user\desktop\download" --no-check-certificate --content-disposition --user-agent="mozilla/5.0 (windows nt 6.1; wow64; trident/7.0; as; rv:11.0) like gecko" "https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/epicgameslauncherinstaller.msi?productname=unrealengine" > cmdline.out 2>&1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -t 60 -p "c:\users\user\desktop\download" --no-check-certificate --content-disposition --user-agent="mozilla/5.0 (windows nt 6.1; wow64; trident/7.0; as; rv:11.0) like gecko" "https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/epicgameslauncherinstaller.msi?productname=unrealengine"
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe "c:\program files (x86)\epic games\launcher\portal\extras\eos\installchainer.exe" 44 "c:\program files (x86)\epic games\launcher\portal\extras\eos\epiconlineservices.msi" "eosproductid=epicgameslauncher" "c:\program files (x86)\epic games\launcher\portal\binaries\win32\epicgameslauncher.exe" com.epicgames.launcher://unrealengine
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -t 60 -p "c:\users\user\desktop\download" --no-check-certificate --content-disposition --user-agent="mozilla/5.0 (windows nt 6.1; wow64; trident/7.0; as; rv:11.0) like gecko" "https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/epicgameslauncherinstaller.msi?productname=unrealengine" Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe "c:\program files (x86)\epic games\launcher\portal\extras\eos\installchainer.exe" 44 "c:\program files (x86)\epic games\launcher\portal\extras\eos\epiconlineservices.msi" "eosproductid=epicgameslauncher" "c:\program files (x86)\epic games\launcher\portal\binaries\win32\epicgameslauncher.exe" com.epicgames.launcher://unrealengineJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSIBB31.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7161484 5 CustomActionManaged!CustomActionManaged.CustomActions.ValidatePathLengthJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "icacls.exe" "C:\Program Files (x86)\Epic Games\Launcher" /grant "BUILTIN\Users":(OI)(CI)F
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\icacls.exe "icacls.exe" "C:\ProgramData\Epic" /grant "BUILTIN\Users":(OI)(CI)F
Source: C:\Windows\SysWOW64\wget.exeQueries volume information: C:\Users\user\Desktop\download VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSIBB31.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSIBB31.tmp-\CustomActionManaged.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI6187.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI6187.tmp-\CustomActionManaged.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI6C17.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI6C17.tmp-\CustomActionManaged.dll VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI7447.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI7447.tmp-\CustomActionManaged.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI19B0.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSI19B0.tmp-\CustomActionManaged.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSIA49E.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSIA49E.tmp-\CustomActionManaged.dll VolumeInformation
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeQueries volume information: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe VolumeInformation
Source: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exeQueries volume information: C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSIBD1A.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSIBD1A.tmp-\CustomActionManaged.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSIC019.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSIC019.tmp-\CustomActionManaged.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSIC3E2.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSIC3E2.tmp-\CustomActionManaged.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSICB46.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSICB46.tmp-\CustomActionManaged.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSIE2CA.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformation
Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Installer\MSIE2CA.tmp-\CustomActionManaged.dll VolumeInformation
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: GetLocaleInfoA,21_2_00F212F5
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: GetLocaleInfoA,21_2_6D0E9F85
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: GetLocaleInfoA,21_2_73AD1F21
Source: C:\Windows\SysWOW64\wget.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F17499 GetLocalTime,21_2_00F17499
Source: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exeCode function: 21_2_00F13C3F GetVersionExA,LoadLibraryA,GetProcAddress,GetLastError,FreeLibrary,GetLastError,21_2_00F13C3F
Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 BlobJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
1
Replication Through Removable Media
3
Native API
1
DLL Side-Loading
1
DLL Side-Loading
11
Disable or Modify Tools
21
Input Capture
1
System Time Discovery
1
Replication Through Removable Media
11
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
System Shutdown/Reboot
Default Accounts13
Command and Scripting Interpreter
2
Windows Service
1
Access Token Manipulation
1
Deobfuscate/Decode Files or Information
LSASS Memory11
Peripheral Device Discovery
Remote Desktop Protocol21
Input Capture
Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)1
Services File Permissions Weakness
2
Windows Service
2
Obfuscated Files or Information
Security Account Manager4
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)111
Process Injection
1
Timestomp
NTDS26
System Information Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon Script1
Services File Permissions Weakness
1
DLL Side-Loading
LSA Secrets21
Security Software Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
File Deletion
Cached Domain Credentials1
Virtualization/Sandbox Evasion
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup Items22
Masquerading
DCSync1
Process Discovery
Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
Virtualization/Sandbox Evasion
Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
Access Token Manipulation
/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)111
Process Injection
Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
Compromise Software Dependencies and Development ToolsWindows Command ShellCronCron1
Services File Permissions Weakness
Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
Compromise Software Supply ChainUnix ShellLaunchdLaunchd1
Rundll32
KeyloggingLocal GroupsComponent Object Model and Distributed COMScreen CaptureExfiltration over USBDNSInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1334820 URL: https://launcher-public-ser... Startdate: 31/10/2023 Architecture: WINDOWS Score: 48 7 msiexec.exe 501 501 2->7         started        10 msiexec.exe 1 10 2->10         started        13 cmd.exe 2 2->13         started        15 SrTasks.exe 2->15         started        dnsIp3 84 C:\Windows\Installer\MSI7447.tmp, PE32 7->84 dropped 86 C:\Windows\Installer\MSI6C17.tmp, PE32 7->86 dropped 88 C:\Windows\Installer\MSI6187.tmp, PE32 7->88 dropped 96 28 other files (none is malicious) 7->96 dropped 17 msiexec.exe 1 7->17         started        19 msiexec.exe 7->19         started        21 DXSETUP.exe 7->21         started        31 2 other processes 7->31 108 172.64.149.23 CLOUDFLARENETUS United States 10->108 90 C:\Users\user\AppData\Local\...\MSIBB31.tmp, PE32 10->90 dropped 92 C:\Users\user\AppData\Local\...\MSIBB11.tmp, PE32 10->92 dropped 94 C:\Users\user\AppData\Local\...\MSIA268.tmp, PE32 10->94 dropped 24 wget.exe 2 13->24         started        27 conhost.exe 13->27         started        29 conhost.exe 15->29         started        file4 process5 dnsIp6 33 rundll32.exe 15 7 17->33         started        38 rundll32.exe 17->38         started        40 rundll32.exe 17->40         started        52 5 other processes 17->52 42 rundll32.exe 19->42         started        44 rundll32.exe 19->44         started        46 icacls.exe 19->46         started        48 icacls.exe 19->48         started        76 C:\Windows\SysWOW64\SET91D8.tmp, PE32 21->76 dropped 78 C:\Windows\SysWOW64\SET8FD5.tmp, PE32 21->78 dropped 80 C:\Windows\SysWOW64\SET8DC2.tmp, PE32 21->80 dropped 82 9 other files (none is malicious) 21->82 dropped 104 18.67.65.6 MIT-GATEWAYSUS United States 24->104 106 23.218.216.149 AS6453US United States 24->106 50 rundll32.exe 6 31->50         started        file7 process8 dnsIp9 98 52.86.217.108 AMAZON-AESUS United States 33->98 66 2 other files (none is malicious) 33->66 dropped 110 System process connects to network (likely due to code injection or exploit) 33->110 100 54.237.117.94 AMAZON-AESUS United States 38->100 68 2 other files (none is malicious) 38->68 dropped 102 54.172.245.211 AMAZON-AESUS United States 40->102 58 Microsoft.Deployme...indowsInstaller.dll, PE32 40->58 dropped 60 C:\Windows\...\CustomActionManaged.dll, PE32 40->60 dropped 70 4 other files (none is malicious) 42->70 dropped 62 Microsoft.Deployme...indowsInstaller.dll, PE32 44->62 dropped 64 C:\Windows\...\CustomActionManaged.dll, PE32 44->64 dropped 54 conhost.exe 46->54         started        56 conhost.exe 48->56         started        72 2 other files (none is malicious) 50->72 dropped 74 10 other files (none is malicious) 52->74 dropped file10 signatures11 process12

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/EpicGamesLauncherInstaller.msi?productName=unrealEngine0%VirustotalBrowse
https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/EpicGamesLauncherInstaller.msi?productName=unrealEngine0%Avira URL Cloudsafe
SourceDetectionScannerLabelLink
(copy)0%ReversingLabs
(copy)0%VirustotalBrowse
C:\Program Files (x86)\Epic Games\DirectXRedist\DSETUP.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\DirectXRedist\DSETUP.dll0%VirustotalBrowse
C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe0%ReversingLabs
C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe0%VirustotalBrowse
C:\Program Files (x86)\Epic Games\DirectXRedist\dsetup32.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\DirectXRedist\dsetup32.dll0%VirustotalBrowse
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\CrashReportClient.exe0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\CrashReportClient.exe0%VirustotalBrowse
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-console-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-console-l1-1-0.dll0%VirustotalBrowse
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-debug-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-debug-l1-1-0.dll0%VirustotalBrowse
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-file-l1-2-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-file-l1-2-0.dll0%VirustotalBrowse
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-handle-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-handle-l1-1-0.dll0%VirustotalBrowse
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-heap-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-heap-l1-1-0.dll0%VirustotalBrowse
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-localization-l1-2-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-localization-l1-2-0.dll0%VirustotalBrowse
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-namedpipe-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-namedpipe-l1-1-0.dll0%VirustotalBrowse
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-string-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-string-l1-1-0.dll0%VirustotalBrowse
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-synch-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-core-synch-l1-1-0.dll0%VirustotalBrowse
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-crt-conio-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-crt-conio-l1-1-0.dll0%VirustotalBrowse
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-crt-environment-l1-1-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\api-ms-win-crt-environment-l1-1-0.dll0%VirustotalBrowse
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\concrt140.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Engine\Binaries\Win32\concrt140.dll0%VirustotalBrowse
C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\EpicGamesLauncher.exe0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\EpicGamesLauncher.exe0%VirustotalBrowse
C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-console-l1-2-0.dll0%ReversingLabs
C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\api-ms-win-core-console-l1-2-0.dll0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsp.sectigo.com00%URL Reputationsafe
https://sectigo.com/CPS00%URL Reputationsafe
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
http://www.BetaPlace.com.?0%Avira URL Cloudsafe
https://api.epicgames.dev/0%Avira URL Cloudsafe
https://api.epicgame0%Avira URL Cloudsafe
http://www.betaplace.com.0%Avira URL Cloudsafe
https://api.epicgames.dev/telemetry/data?SessionID=0%Avira URL Cloudsafe
http://www.betaplace.com0%Avira URL Cloudsafe
http://www.BetaPlace.comEContinuare0%Avira URL Cloudsafe
https://api.epicgames.dev/telemetry/data?SessionID=%7B2CF9C3A4-CF06-41C6-AA21-0F580F96D9BD%7D&AppID=0%Avira URL Cloudsafe
http://www.betaplace.com.0%VirustotalBrowse
http://www.BetaPlace.com.?0%VirustotalBrowse
https://www.twinmotion.com0%Avira URL Cloudsafe
https://api.epicgames.dev/0%VirustotalBrowse
https://datarouter.ol.epicgameT0%Avira URL Cloudsafe
http://www.betaplace.com0%VirustotalBrowse
https://api.epicgames.dev0%Avira URL Cloudsafe
http://127.0.0.10%Avira URL Cloudsafe
http://www.google.comDUMPREQFLUSHD:/build/0%Avira URL Cloudsafe
http://api.epicgames.dev0%Avira URL Cloudsafe
https://datarouter.ol.epicgameTj0%Avira URL Cloudsafe
https://api.epicgames.dev0%VirustotalBrowse
https://www.twinmotion.com1%VirustotalBrowse
http://127.0.0.11%VirustotalBrowse
https://api.epicgames.dev/telemetry/data?SessionID=0%VirustotalBrowse
http://api.epicgames.dev0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/EpicGamesLauwget.exe, 00000002.00000002.1930579524.00000000009E0000.00000004.00000020.00020000.00000000.sdmp, cmdline.out.0.drfalse
    high
    https://api.epicgames.dev/rundll32.exe, 00000023.00000003.2987556388.0000000004CC0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CA0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004720000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000002.3041618750.0000000005041000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004E6B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000027.00000003.3083659682.0000000004860000.00000004.00000020.00020000.00000000.sdmp, CustomActionManaged.dll.36.dr, CustomActionManaged.dll.38.drfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://ocsp.sectigo.com0wget.exe, 00000002.00000003.1893294152.0000000000FF1000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FE9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000002.1930907744.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.0000000006874000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drfalse
    • URL Reputation: safe
    unknown
    https://unrealstudiohelp.epicgames.comNamedBaseUrls.json.10.drfalse
      high
      http://eos-gateway-ingressv2-prod-c3-w1.befa.live.use1a.on.epicgames.comrundll32.exe, 00000026.00000002.3041618750.00000000050D1000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://www.unicode.org/copyright.htmlCrashReportClient.exe.10.drfalse
          high
          https://dev.epicgames.comNamedBaseUrls.json.10.drfalse
            high
            http://datarouter.ol.epicgames.comrundll32.exe, 0000000E.00000002.2111719898.0000000004E40000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2944268216.00000000043ED000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://api.epicgamerundll32.exe, 00000026.00000002.3041618750.00000000050BE000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://publish.unrealengine.comNamedBaseUrls.json.10.drfalse
                high
                http://wixtoolset.org/news/rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, InstallChainer.exe, 00000022.00000002.3186896603.00000000053D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CC0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CA0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004720000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004E6B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000027.00000003.3083659682.0000000004860000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.drfalse
                  high
                  https://www.unrealengine.com/twinmotionNamedBaseUrls.json.10.drfalse
                    high
                    https://curl.haxx.se/docs/http-cookies.htmlCrashReportClient.exe.10.drfalse
                      high
                      https://www.unrealengine.comNamedBaseUrls.json.10.drfalse
                        high
                        http://www.BetaPlace.com.?DXSETUP.exe, 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://epicgames.comNamedBaseUrls.json.10.drfalse
                          high
                          http://datarouter-weighted.ol.epicgames.comrundll32.exe, 0000000E.00000002.2111719898.0000000004E40000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2944268216.00000000043ED000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://api.epicgames.dev/telemetry/data?SessionID=rundll32.exe, 00000026.00000002.3041618750.0000000005041000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://fortnitehelp.epicgames.comNamedBaseUrls.json.10.drfalse
                              high
                              http://wixtoolset.orgrundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2029466941.0000000003304000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098514310.00000000031E1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124904251.0000000000BA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146385527.0000000002E10000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570956731.00000000005E0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.000000000679F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925411187.00000000007D0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987785945.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CF7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2996225742.000000000318D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CD7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004757000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005963943.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004EA2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024283792.00000000032EC000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://accounts.launcher-website-prod07.ol.epicgames.comNamedBaseUrls.json.10.drfalse
                                  high
                                  https://datarouter.ol.epicgames.com/datarouter/api/v1/public/data?SessionID=rundll32.exe, 0000000E.00000002.2111719898.0000000004DB1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2944268216.0000000004361000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.betaplace.com.DXSETUP.exe, DXSETUP.exe, 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmp, DXSETUP.exe, 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpfalse
                                    • 0%, Virustotal, Browse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.betaplace.comDXSETUP.exe, 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpfalse
                                    • 0%, Virustotal, Browse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://ue-launcher-website-prod.ol.epicgames.comNamedBaseUrls.json.10.drfalse
                                      high
                                      https://accounts.unrealengine.comNamedBaseUrls.json.10.drfalse
                                        high
                                        http://www.BetaPlace.comEContinuareDXSETUP.exe, 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/h5wget.exe, 00000002.00000002.1930579524.00000000009E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://docs.unrealengine.comNamedBaseUrls.json.10.drfalse
                                            high
                                            https://launcher.store.epicgames.comNamedBaseUrls.json.10.drfalse
                                              high
                                              https://api.epicgames.dev/telemetry/data?SessionID=%7B2CF9C3A4-CF06-41C6-AA21-0F580F96D9BD%7D&AppID=rundll32.exe, 00000026.00000002.3041618750.0000000005090000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namerundll32.exe, 0000000E.00000002.2111719898.0000000004E2D000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000002.2111719898.0000000004DB1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2944268216.0000000004361000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2944268216.00000000043D7000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000026.00000002.3041618750.0000000005041000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000026.00000002.3041618750.00000000050BE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://www.twinmotion.comNamedBaseUrls.json.10.drfalse
                                                • 1%, Virustotal, Browse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://store.epicgames.comNamedBaseUrls.json.10.drfalse
                                                  high
                                                  https://forums.unrealengine.comNamedBaseUrls.json.10.drfalse
                                                    high
                                                    https://datarouter.ol.epicgameTrundll32.exe, 00000021.00000002.2944268216.00000000043D7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://sectigo.com/CPS0wget.exe, 00000002.00000003.1893294152.0000000000FF1000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FE9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000002.1930907744.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.0000000006874000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://api.epicgames.devrundll32.exe, 00000026.00000002.3041618750.0000000005041000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000026.00000002.3041618750.00000000050BE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • 0%, Virustotal, Browse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://api.twitch.tv/krakenBaseEngine.ini.10.drfalse
                                                      high
                                                      https://api.twitch.tv/kraken/oauth2/authorizeBaseEngine.ini.10.drfalse
                                                        high
                                                        http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/vrundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, 00000022.00000002.3186896603.00000000053D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CC0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CA0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004720000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004E6B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000027.00000003.3083659682.0000000004860000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.drfalse
                                                          high
                                                          https://accounts.epicgames.comNamedBaseUrls.json.10.drfalse
                                                            high
                                                            https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/wget.exefalse
                                                              high
                                                              https://answers.unrealengine.comNamedBaseUrls.json.10.drfalse
                                                                high
                                                                http://127.0.0.1BaseEngine.ini.10.drfalse
                                                                • 1%, Virustotal, Browse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://www.google.comDUMPREQFLUSHD:/build/CrashReportClient.exe.10.drfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://paragonhelp.epicgames.comNamedBaseUrls.json.10.drfalse
                                                                  high
                                                                  https://epicsupport.force.com/unrealengine/s/CrashReportClient.exe.10.drfalse
                                                                    high
                                                                    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0twget.exe, 00000002.00000003.1893294152.0000000000FF1000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FE9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000002.1930907744.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.0000000006874000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://launcherhelp.epicgames.comNamedBaseUrls.json.10.drfalse
                                                                      high
                                                                      http://wixtoolset.org/releases/rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, InstallChainer.exe, InstallChainer.exe, 00000022.00000002.3186896603.00000000053D2000.00000002.00000001.01000000.00000020.sdmp, rundll32.exe, 00000023.00000003.2987556388.0000000004CC0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000024.00000003.2995860276.0000000004CA0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000003.3005740394.0000000004720000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000026.00000003.3024062048.0000000004E6B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000027.00000003.3083659682.0000000004860000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.36.drfalse
                                                                        high
                                                                        https://api.twitch.tv/kraken/oauth2/revokeBaseEngine.ini.10.drfalse
                                                                          high
                                                                          http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#wget.exe, 00000002.00000003.1893294152.0000000000FF1000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.1893294152.0000000000FE9000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000002.1930907744.0000000000FFA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2572077304.0000000000637000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2573130265.0000000006874000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.10.dr, api-ms-win-crt-string-l1-1-0.dll.10.dr, api-ms-win-core-rtlsupport-l1-1-0.dll.10.dr, CrashReportClient.exe.10.drfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://datarouter.ol.epicgames.com/rundll32.exe, 0000000C.00000003.2029329788.0000000004EDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.2098405693.0000000004B7A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000002.2111719898.0000000004DB1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.2124821337.0000000004677000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2146289411.0000000004A83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.2570852345.00000000041BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.2925167476.00000000041B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2944268216.0000000004361000.00000004.00000800.00020000.00000000.sdmp, CustomActionManaged.dll.15.drfalse
                                                                            high
                                                                            https://shadowcomplexhelp.epicgames.comNamedBaseUrls.json.10.drfalse
                                                                              high
                                                                              https://wiki.unrealengine.comNamedBaseUrls.json.10.drfalse
                                                                                high
                                                                                http://wixtoolset.org/InstallChainer.exefalse
                                                                                  high
                                                                                  http://wixtoolset.org/telemetry/vInstallChainer.exefalse
                                                                                    high
                                                                                    https://datarouter.ol.epicgames.comrundll32.exe, 0000000E.00000002.2111719898.0000000004E2D000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000002.2111719898.0000000004DB1000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2944268216.0000000004361000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2944268216.00000000043D7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://www.BetaPlace.com.DXSETUP.exe, 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpfalse
                                                                                        unknown
                                                                                        http://api.epicgames.devrundll32.exe, 00000026.00000002.3041618750.00000000050D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        • 0%, Virustotal, Browse
                                                                                        • Avira URL Cloud: safe
                                                                                        unknown
                                                                                        https://datarouter.ol.epicgameTjrundll32.exe, 0000000E.00000002.2111719898.0000000004E2D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        • Avira URL Cloud: safe
                                                                                        unknown
                                                                                        https://help.unrealtournament.comNamedBaseUrls.json.10.drfalse
                                                                                          high
                                                                                          http://www.BetaPlace.comDXSETUP.exe, 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmp, DXSETUP.exe, 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpfalse
                                                                                            unknown
                                                                                            https://datarouter.ol.epicgames.com/datarouter/api/v1/public/data?SessionID=%7B090B195D-E8A0-4734-80rundll32.exe, 00000021.00000002.2944268216.00000000043B0000.00000004.00000800.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2944268216.0000000004361000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://twinmotionhelp.epicgames.comNamedBaseUrls.json.10.drfalse
                                                                                                high
                                                                                                • No. of IPs < 25%
                                                                                                • 25% < No. of IPs < 50%
                                                                                                • 50% < No. of IPs < 75%
                                                                                                • 75% < No. of IPs
                                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                                18.67.65.6
                                                                                                unknownUnited States
                                                                                                3MIT-GATEWAYSUSfalse
                                                                                                52.86.217.108
                                                                                                unknownUnited States
                                                                                                14618AMAZON-AESUStrue
                                                                                                54.237.117.94
                                                                                                unknownUnited States
                                                                                                14618AMAZON-AESUStrue
                                                                                                172.64.149.23
                                                                                                unknownUnited States
                                                                                                13335CLOUDFLARENETUSfalse
                                                                                                23.218.216.149
                                                                                                unknownUnited States
                                                                                                6453AS6453USfalse
                                                                                                54.172.245.211
                                                                                                unknownUnited States
                                                                                                14618AMAZON-AESUStrue
                                                                                                Joe Sandbox Version:38.0.0 Ammolite
                                                                                                Analysis ID:1334820
                                                                                                Start date and time:2023-10-31 12:14:08 +01:00
                                                                                                Joe Sandbox Product:CloudBasic
                                                                                                Overall analysis duration:0h 11m 41s
                                                                                                Hypervisor based Inspection enabled:false
                                                                                                Report type:full
                                                                                                Cookbook file name:urldownload.jbs
                                                                                                Sample URL:https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/EpicGamesLauncherInstaller.msi?productName=unrealEngine
                                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                Run name:Potential for more IOCs and behavior
                                                                                                Number of analysed new started processes analysed:40
                                                                                                Number of new started drivers analysed:0
                                                                                                Number of existing processes analysed:0
                                                                                                Number of existing drivers analysed:0
                                                                                                Number of injected processes analysed:0
                                                                                                Technologies:
                                                                                                • HCA enabled
                                                                                                • EGA enabled
                                                                                                • AMSI enabled
                                                                                                Analysis Mode:default
                                                                                                Analysis stop reason:Timeout
                                                                                                Detection:MAL
                                                                                                Classification:mal48.evad.win@46/1104@0/6
                                                                                                EGA Information:
                                                                                                • Successful, ratio: 7.1%
                                                                                                HCA Information:
                                                                                                • Successful, ratio: 100%
                                                                                                • Number of executed functions: 369
                                                                                                • Number of non-executed functions: 166
                                                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, VSSVC.exe, svchost.exe
                                                                                                • Execution Graph export aborted for target InstallChainer.exe, PID 6688 because there are no executed function
                                                                                                • Execution Graph export aborted for target rundll32.exe, PID 3452 because it is empty
                                                                                                • Execution Graph export aborted for target rundll32.exe, PID 352 because it is empty
                                                                                                • Execution Graph export aborted for target rundll32.exe, PID 4592 because there are no executed function
                                                                                                • Execution Graph export aborted for target rundll32.exe, PID 6492 because it is empty
                                                                                                • Execution Graph export aborted for target rundll32.exe, PID 6692 because it is empty
                                                                                                • Execution Graph export aborted for target rundll32.exe, PID 7136 because it is empty
                                                                                                • Execution Graph export aborted for target rundll32.exe, PID 7320 because it is empty
                                                                                                • Execution Graph export aborted for target rundll32.exe, PID 7356 because it is empty
                                                                                                • Execution Graph export aborted for target rundll32.exe, PID 7516 because it is empty
                                                                                                • Execution Graph export aborted for target rundll32.exe, PID 7580 because it is empty
                                                                                                • Execution Graph export aborted for target rundll32.exe, PID 7592 because it is empty
                                                                                                • Execution Graph export aborted for target wget.exe, PID 7564 because there are no executed function
                                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                • Report size getting too big, too many NtCreateFile calls found.
                                                                                                • Report size getting too big, too many NtCreateKey calls found.
                                                                                                • Report size getting too big, too many NtOpenFile calls found.
                                                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                                                                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                                • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                                • Report size getting too big, too many NtSetValueKey calls found.
                                                                                                • Report size getting too big, too many NtWriteFile calls found.
                                                                                                • Skipping network analysis since amount of network traffic is too extensive
                                                                                                TimeTypeDescription
                                                                                                12:15:27API Interceptor1x Sleep call for process: msiexec.exe modified
                                                                                                12:15:42API Interceptor3x Sleep call for process: rundll32.exe modified
                                                                                                12:16:51API Interceptor30x Sleep call for process: SrTasks.exe modified
                                                                                                No context
                                                                                                No context
                                                                                                No context
                                                                                                No context
                                                                                                No context
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):81768
                                                                                                Entropy (8bit):6.4167890753768395
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:TVeqvNS6T6jxeEsU6b0xZtDDVb9X8u9JA7zitdrz/R8cy/FaeBD:TVeqvNOeFgxZ9DVVtRBy/EeD
                                                                                                MD5:77F595DEE5FFACEA72B135B1FCE1312E
                                                                                                SHA1:D2A710B332DE3EF7A576E0AED27B0AE66892B7E9
                                                                                                SHA-256:8D540D484EA41E374FD0107D55D253F87DED4CE780D515D8FD59BBE8C98970A7
                                                                                                SHA-512:A8683050D7758C248052C11AC6A46C9A0B3B3773902CCA478C1961B6D9D2D57C75A8C925BA5AF4499989C0F44B34EAF57ABAFAFA26506C31E5E4769FB3439746
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........M..i#Y.i#Y.i#Y.i"Y.i#Y.f~Y.i#Y.f,Y.i#Y.f|Y.i#Y.f.Y.i#Y.fCY.i#Y.f}Y.i#Y.fyY.i#YRich.i#Y........................PE..L...5S.F...........!.........F....................@..........................`..................................................d....0..................h%...@..8....................................&..@...............\............................text...j........................... ..`.data....+..........................@....rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:Microsoft Cabinet archive data, many, 47342 bytes, 5 files, at 0x44 +A "xinput1_3_x86.cat" +A "xinput1_3.dll", flags 0x4, ID 8235, number 1, extra bytes 20 in head, 3 datablocks, 0x1 compression
                                                                                                Category:dropped
                                                                                                Size (bytes):53302
                                                                                                Entropy (8bit):7.985485862279273
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:9cnwcwzHEdb27WH2SfZDNu75ddnVR+ZFaNk0ZT9rHUh:0wb+2eZonQwN9oh
                                                                                                MD5:C234DF417C9B12E2D31C7FD1E17E4786
                                                                                                SHA1:92F32E74944E5166DB72D3BFE8E6401D9F7521DD
                                                                                                SHA-256:2ACEA6C8B9F6F7F89EC51365A1E49FBD0D8C42C53418BD0783DBF3F74A744E6D
                                                                                                SHA-512:6CBAE19794533AD9401F92B10BD9549638BA20CE38375DE4F9D0E20AF20D78819E46856151CC6818325AF9AC774B8128E18FBEBD2DA5DA4EFBD417FC2AF51DAB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MSCF...........D...............+ .............H....................(.........6{. .xinput1_3_x86.cat.h?...(.....6.. .xinput1_3.dll......h.....6G. .apr2007_xinput_x86.inf......m.....6G. .xinput1_3_x86.inf./....p.....6G. .xinput1_3_x86_xp.inf.i...T5..CK.y<.....Y.d..H.<3.1....=...`,cbB.f...*R*kB..V..E...,.[$I.R(~g..n........}....<....y>.9.s.....f*&.s)E.F..Cp ..Q...D 0<0.;....R.....3.\...4...F.1QI...........@..O....2.f....I\...a...c4.0.....,...0.!..6.. M...@..:..ocp.A.K6......... .F..!...[....+..,...0n...<..@cl`+Xe^.X.t.$.;{X@.P....@d..N=.....Z..g....&...#...%]....~.........C. #..u...h(.4^.4.... a.a...*#.Z<....%.{..5..n$....P@[..C<01..Y...F.\..[.H.H.l..f.l.X.0...l.4.A....+B.~.|.l.YO0..k}i>~V..O.f...M0n^.?..B..........a.......N.w/==J.{..D@0..Q.....%..@6..Z.|......@@.4..a.....q......t....4v....dI.Ym..^...........[7.XH.8Y.nR..d.<.;O.."k...d.y2aV..4....D...5..B".H~.....+x_o.4....c.#.`..0...v.F4........I.Q$.....x....._..;]...O[....l....?..:.......Q._....2.;.~...NXz
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):95576
                                                                                                Entropy (8bit):6.500628817584274
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:Bc8tBKv1HCyODN2wjIqlLmqxY3AMVI4I9okOEvc0/c/sZRYltL26VVE2S+JJqsHy:BftQv1iyODswNLmqxY3AMV71Ev54EAxM
                                                                                                MD5:EB701DEF7D0809E8DA765A752AB42BE5
                                                                                                SHA1:7897418F0FAE737A3EBE4F7954118D71C6C8B426
                                                                                                SHA-256:2A61679EEEDABF7D0D0AC14E5447486575622D6B7CFA56F136C1576FF96DA21F
                                                                                                SHA-512:6FF8433C0DADC0E87D18F04289AB6F48624C908ACBDA506708F5E0F3C9522E9316E587E71F568938067BA9F37F96640B793FDFAA580CAEDC3BF9873DC221271F
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........xx...+...+...+..+...+...+F..+.6k+...+.6x+...+.6{+...+...+...+...+...+...+...+...+...+Rich...+................PE..L......M...........!.....*...N.......k.......@.......................................4....@..........................5..y....*.......p..h............^..X.......H...0................................6..@............................................text...)(.......*.................. ..`.data..../...@......................@....rsrc...h....p.......@..............@..@.reloc...............H..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):517976
                                                                                                Entropy (8bit):5.9440274231307315
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:Qi6LKKSPluzye9iHWptICTrbusJxDO9insyH6+PJTOramZap5XVeR4zW1mFD1gbH:8UHWDICTmUxDpEa04+GU
                                                                                                MD5:BF3F290275C21BDD3951955C9C3CF32C
                                                                                                SHA1:9FD00F3BB8A870112DAE464F555FCD5E7F9200C0
                                                                                                SHA-256:8F47D7121EF6532AD9AD9901E44E237F5C30448B752028C58A9D19521414E40D
                                                                                                SHA-512:D2C354EE8B6977D01F23C6D2BB4977812BF653EAE25E7A75A7D0A36B588C89FCDBDC2A8087C24D6FF687AFEBD086D4B7D0C92203CE39691B21DAB71EAFD1D249
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......."..Sf}..f}..f}..A...s}..A...E}..A....}..o._.k}..f}...}....f.g}....g.e}....V.g}....Q.g}..Richf}..................PE..L......M.................b...j.......p....................................... ......t3....@...... ...........................d..........l<..............X............................................4..@...............L............................text....a.......b.................. ..`.data....2...........f..............@....rsrc...l<.......>...z..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):1566040
                                                                                                Entropy (8bit):6.38739478154395
                                                                                                Encrypted:false
                                                                                                SSDEEP:24576:CIQ+ddddddddddddddxOOOOOOOOOOOOOO2iWeXiWeXiWeXiWeXiWeXiWeXiWeXi+:CIQsOOOOOOOOOOOOOO2iWeXiWeXiWeXf
                                                                                                MD5:D8FA7BB4FE10251A239ED75055DD6F73
                                                                                                SHA1:76C4BD2D8F359F7689415EFC15E3743D35673AE8
                                                                                                SHA-256:FB0E534F9B0926E518F1C2980640DFD29F14217CDFA37CF3A0C13349127ED9A8
                                                                                                SHA-512:73F633179B1340C1C14D0002B72E44CAB1919D0EF174F307E4BFE6DE240B0B6EF233E67A8B0A0CD677556865EE7B88C6DE152045A580AB9FBF1A50D2DB0673B4
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........^..?...?...?...G6..?...?..U?.......?.......?.......?...I>..?...I...?...I...?...I?..?...I8..?..Rich.?..........................PE..L......M...........!................c........................................ ......\.....@.................................$...........P...............X............................................^..@...............h............................text............................... ..`.data....4..........................@....rsrc...P...........................@..@.reloc..D).......*..................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:Microsoft Cabinet archive data, many, 91192 bytes, 3 files, at 0x44 "dxupdate.dll" "dxupdate.inf", flags 0x4, ID 3666, number 1, extra bytes 20 in head, 8 datablocks, 0x1 compression
                                                                                                Category:dropped
                                                                                                Size (bytes):97152
                                                                                                Entropy (8bit):7.99414458916803
                                                                                                Encrypted:true
                                                                                                SSDEEP:1536:JvknxJRHNYzrAzRstaRGk0jzphvXdy57XwwnNb+vnaI1eYpIKxozNlmn6F5x:JvknxJpNYAzRstaRkz0BwwnNbSa+vp58
                                                                                                MD5:D495680ABA28CAAFC4C071A6D0FE55AC
                                                                                                SHA1:5885ECE90970EB10B6B95D6C52D934674835929E
                                                                                                SHA-256:E18A5404B612E88FA8B403C9B33F064C0A89528DB7EF9A79AA116908D0E6AFED
                                                                                                SHA-512:A25C647678661473B99462D7433C1D05AF54823D404476E35315C11C93B3F5ECE92C912560AF0D9EFE8F07E36AE68594362D73ABF5D5DE409A3F0A146FE31A10
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MSCF....8d......D...............R...........8d..H.............................~>.%..dxupdate.dll.02........h=...dxupdate.inf.1...0.....~>.%..dxupdate.cif.T....'..CK.Z}.$.U....;..@.e!.#....G===.=+".?..+.s..l8....o.{....;.+..(...d,..HVd..,......(..[&H.........Y.Y..~..{.gv.vW.'.....^......^...}...1v....2.*.~.......y...a_.....^Z..V?H.Q..bo(..0.Ra...q(..`o....W.....4~...q.?...F.............].....~c...O7^..W..x.?...l.=.~$......'..o;.._.....'u.aK......=..X.........g........~.].[..+..\b._........p.=.....w...%..@.o-.....O2..w...~sn..D_:....G).../e.Q_/....=Y.x........p.0..^....w...A}..'..... ...P.7....3.av...?...Kl.......>t...O`..b.]....x..Y....._...x..}....@.....1.9.o....[.?.......)...g..'.1.i../.^.|..=........x...L.6`...>..,...K./....6...........A.#.?.8.|....?.|......w%K.>@..(.I...9.../....].....%v7.>.....-@.p....E........6...Kc..p?@.....8.|.p/..xg...7...^.(..7..X~?..........#...w...q..U....f.... ..?<.\...}.K.Z.,]+...../..-......e...aO....a9Y......Wg.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):15457232
                                                                                                Entropy (8bit):6.624458758309935
                                                                                                Encrypted:false
                                                                                                SSDEEP:393216:YEb9f6Ol1FFtm/deMigK39RK8pVeh9sYq4Awc5UCC2hB4P2:YEb9f6Ol1FFo/deMig2R/eh9sYq4Awcp
                                                                                                MD5:4E170B44987BF04F7A8EE228110F0447
                                                                                                SHA1:653E8495E2528DDC8763BC30927DEF6C8695FA7D
                                                                                                SHA-256:CC4BA7AA5570FF9A31E5A2CF78065D6356F1B1F9FFF0B42574D3CE7132AC23EA
                                                                                                SHA-512:DC4D3C5538952CAD9252E057BEB986E3E5ACC90E3F49F6B94BEA9F6B802073D89ED80130D39E5FF160D9AC1837A62EE41B7ED547C9A908B5BA46A054C3412866
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............a..a..a.....a...d..a.;B...a.p.e..a.p.b..a.p.d..a.p.`..a...e..a...g..a.....a.w....a...`..a.7.d...a...e..a..g..a..e..a..`..a.=.e..a.....a..`...a.2.d...a.?.d..a.2.e...a.>.d...a.>....a.....a.>.c..a.Rich..a.................PE..L....28e.........."......X...*X..............p....@.................................F2....@.................................,...H.......xh...............9.......... R..T....................S......xR..@............p...............................text...*........................... ..`.uedbg..]........................... ..`.rdata..>.-..p....-..\..............@..@.data.....#..P...2...4..............@..._RDATA...'...p...(...f..............@..@.rsrc...xh.......j..................@..@.reloc..............................@..B........................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):17872
                                                                                                Entropy (8bit):7.132558512552857
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:mPWfhWFU+Y3DGk8ZpH3GCJErz550iA+Y3DGUw8JN77hhn80Po:zJDGkiRBEklDGo3hFRo
                                                                                                MD5:A02AF67BD05CED8DCEC2422C5A368E30
                                                                                                SHA1:C00920F5608C41E44496035AB53D137D31626063
                                                                                                SHA-256:47490DBE76AC98A7134B8ED6506DC18BED97B4EFB6DB8764B2357D2B7D0B5171
                                                                                                SHA-512:0145F5865CC9809CBEB04D7C5783BD23193DAA48275AE2396DDBD5CD3CBA693FC6F5EE6ABACB65DFB1229AD6FCAF7FE700346D4C5726C8EA5A259690262981D7
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L.....R............!......................... ...............................0......J.....@.............................+............ ...................9..............T............................................................................text...+........................... ..`.rsrc........ ......................@..@......R.........;...T...T.........R.........d.................R.....................RSDSy...xy.8.RI.......api-ms-win-core-console-l1-1-0.pdb..........T....rdata..T........rdata$zzzdbg.......+....edata... ..`....rsrc$01....` .......rsrc$02......................R.....................(...`...............,...W...................G...o...............................D...s...............5...b...............................................api-ms-win-core-console-l1-1-0.dll.AllocConsole.kern
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):17360
                                                                                                Entropy (8bit):7.156517933803656
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:mvWfhWo+Y3DGk8ZpH3GCJEFxTq0+4y+Y3DGELu8JN77hhVEY:bTDGkiRBEa14GDG0p3hbEY
                                                                                                MD5:08DE2B409864DAEE675885620D34F8FB
                                                                                                SHA1:0C598288BB6C0EB1809F210D3850657BC4606B70
                                                                                                SHA-256:DD2C5EFA9315F66A6531E93A6B80D13F471D57F1BA86FA2294C6C3274ADC144C
                                                                                                SHA-512:DDBE3EC5A802C5E25EFBCEE23795EB9CF3CA47ACEAD97B75E6DDEC1D95E15FF07299606EB8A7288217444A5500D4E1D652F486672AA8AE5BF8449399143842FC
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L..................!......................... ...............................0.......?....@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@................9...T...T...................d.......................................RSDS....F.B..s.Lz.....api-ms-win-core-debug-l1-1-0.pdb............T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02............................P...............(...8...H...|...............q.......................api-ms-win-core-debug-l1-1-0.dll.DebugBreak.kernel32.DebugBreak.IsDebuggerPresent.kernel32.IsDebuggerPresent.OutputDebugStringA.kernel32.OutputDebugStri
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):17360
                                                                                                Entropy (8bit):7.163875204083516
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:mKWfhW9+Y3DGk8ZpH3GCJErMn3n+Y3DGUTP8JN77hhZpv:IYDGkiRBEmlDGsU3hjt
                                                                                                MD5:72591F3EB22ABD6ADD78281FFF3F69BD
                                                                                                SHA1:44CC71FE68FB4214690E2BF1A4A37428D0276761
                                                                                                SHA-256:5D94FCFCA59CB80E0AE42574CB9F83E8D7D0261A0236097A58C58B8E8E3DFF48
                                                                                                SHA-512:970326ECCC59F0FAF754897B2B886848B7D0F6B5AA85AD4E421F2A917358466A45F59A0BCFDDCC8759169897515B80DBFB798D7D807E32020608D3A044D3D060
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L....lC............!......................... ...............................0......E.....@.............................L............ ...................9..............T............................................................................text...<........................... ..`.rsrc........ ......................@..@.....lC.........8...T...T........lC.........d................lC.....................RSDS..T..t..*..].".....api-ms-win-core-file-l1-2-0.pdb.........T....rdata..T........rdata$zzzdbg.......L....edata... ..`....rsrc$01....` .......rsrc$02.........lC.....@...................(...8...l...............`.......................api-ms-win-core-file-l1-2-0.dll.CreateFile2.kernel32.CreateFile2.GetTempPathW.kernel32.GetTempPathW.GetVolumeNameForVolumeMountPointW.kernel32.GetVolumeNameForVolumeMou
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):17360
                                                                                                Entropy (8bit):7.163065573934889
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:mHWfhWE+Y3DGk8ZpH3GCJEFx2TjoD+Y3DGEK9S8JN77hhDnCL:fLDGkiRBE+oJDG793h9y
                                                                                                MD5:5C4308E0D3C3403694D6FFFEADF282F5
                                                                                                SHA1:591075C32583DC1B9E27D6B0D65D56C373EFBD68
                                                                                                SHA-256:9E953AE44E72EF5B0476D2D60A05041AF33FEE241BE55621A00CC2C670E8F907
                                                                                                SHA-512:D4EEC3AFB4A3F910E49F99338F5056967B2E5F4C7790D3B291DE84FE1600E0B3E0E36ABABE0EC79566B49A960A54D268BF6BD14B4A5D14940E53B666D1D6BACE
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L...L..............!......................... ...............................0......{.....@............................._............ ...................9..............T............................................................................text..._........................... ..`.rsrc........ ......................@..@....L...........:...T...T.......L...........d...............L.......................RSDS.1S..1...OWM+.......api-ms-win-core-handle-l1-1-0.pdb...........T....rdata..T........rdata$zzzdbg......._....edata... ..`....rsrc$01....` .......rsrc$02....................L.......Z...............(...<...P...................A...|...............,.............api-ms-win-core-handle-l1-1-0.dll.CloseHandle.kernel32.CloseHandle.CompareObjectHandles.kernel32.CompareObjectHandles.DuplicateHandle.kernel32
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):17360
                                                                                                Entropy (8bit):7.231261033088047
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:mYElOWfhWn+Y3DGk8ZpH3GCJEFxcGcol+Y3DGE7ak8JN77hhRe:kSDGkiRBEnDGpn3hre
                                                                                                MD5:2344DF300A500D4A666C14C4AA40DD84
                                                                                                SHA1:35337CC8433DD19EC733C4DE328C2FE1C5EC01D0
                                                                                                SHA-256:EE731DD2942F063FEC75C1C167AAA63B7C0C03000A95DD96447D456B4240D4FD
                                                                                                SHA-512:64760C467C557EB9BA9EA136182CB97FA154CE9E3B670B6F544D52FC09DBBC3C7FA6621F420CC543B340260D29309DDAAF3B851F23055264E17D56BA678D0143
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L....y.?...........!......................... ...............................0............@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@.....y.?........8...T...T........y.?........d................y.?....................RSDSP[c.0..#...`......api-ms-win-core-heap-l1-1-0.pdb.........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.........y.?........................X...............2...Q...q.......................C...h...........................(...E...f.......................0..._...z...............................................api-ms-win-core-heap-l1-1-0.dll.GetProcessHeap.k
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):19920
                                                                                                Entropy (8bit):7.127869482647659
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:miOMw3zdp3bwjGjue9/0jCRrndbJWfhW3+Y3DGk8ZpH3GCJErAqTTl+Y3DGUs8JN:vOMwBprwjGjue9/0jCRrndb+ODGkiRBc
                                                                                                MD5:1057C413179A108B60578FD04A974360
                                                                                                SHA1:19E7EDB337DECFD53EA37942AA053055EA12C510
                                                                                                SHA-256:9F213BAFDB076C01BD6A2ABE7115F8F32465B6B38F7AB1500CD442ECE1CAA787
                                                                                                SHA-512:51B7CB62111DFDA00F72322DAA9C9A3DAD32A227EB3FC06AAAFC691CD08CC8ED13286386319A9153D698A56B844D40B442BF7FC05D98E295DD3F48ABCED8E89C
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L.....V............!......................... ...............................0............@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@......V.........@...T...T.........V.........d.................V.....................RSDS`7.|7..\f...$......api-ms-win-core-localization-l1-2-0.pdb.........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02..................V.....v.......;...;...(.......................<...f.......................5...]...................!...I...q...................N.............../...j.............../...^.................../...\...................8...`...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):17360
                                                                                                Entropy (8bit):7.212932796153108
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:mPWfhWk+Y3DGk8ZpH3GCJEFxz7R0+Y3DGEz8JN77hh5TB:/HDGkiRBE/72DGF3hzV
                                                                                                MD5:57FEAB4CAFC94CCDCFEEA84C269D6686
                                                                                                SHA1:A7DF1D1E107A8B0E574A4DEE6E3EEA056262A7E8
                                                                                                SHA-256:3E3676EC797ECDB1F270E5BF1E884D37CB964D9A65D097FC250C247767255953
                                                                                                SHA-512:40218D1C4741F4F79800B9FB431FF041A3FF594723E72E828DEC957947270ADCFE6F31CDC66A20D795B96F308864914B9FADFD598FF0CFA14C3A823A7D658B82
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L...R.............!......................... ...............................0............@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@....R..........=...T...T.......R..........d...............R......................RSDS..k3"1...?F2?..S....api-ms-win-core-namedpipe-l1-1-0.pdb............T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02................R......................(...P...x...............:...w...............O...y...............&...W...............=...j.......................api-ms-win-core-namedpipe-l1-1-0.dll.ConnectNamedPipe.kernel32.ConnectNamedPipe.CreateNamedP
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):17360
                                                                                                Entropy (8bit):7.190387498760807
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:mTyMvNWfhWl+Y3DGk8ZpH3GCJEFxGG+Y3DGEd28JN77hhuQ:cyMvqQDGkiRBEpDGyR3hoQ
                                                                                                MD5:6D23B1C181DCF0C328444415F0A69CAF
                                                                                                SHA1:3865C0112F58E6C5B0138C62FFDD8FC7DC0BDADA
                                                                                                SHA-256:D3612DE5A7460FC12F024E3C301C172F286D8CBCA1A890A0EDE65F151DAFA1DA
                                                                                                SHA-512:3A5FA387FEB71AC9AE8B9D0E93B56B6DA3E96FABB1597A745025837FD60FDBBB1CBB2803BE1A4E5C46467082E9C56C5100F7A2421764DD62CE9DC499C568DC8D
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L....y.............!......................... ...............................0............@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@.....y..........:...T...T........y..........d................y......................RSDS...%..E......a.....api-ms-win-core-string-l1-1-0.pdb...........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.....................y......x...............(...H...h...............)...O...x...........................>...i...........................api-ms-win-core-string-l1-1-0.dll.CompareStringEx.kernel32.CompareStringEx.CompareStringOrdinal.kernel32.Compare
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):19408
                                                                                                Entropy (8bit):7.080937379143234
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:mjfdv3V0dfpkXc0vVazWfhWM+Y3DGk8ZpH3GCJEFxmog55+Y3DGE8Z8JN77hhgnb:adv3VqpkXc0vVaQnDGkiRBE6nDGa3h2b
                                                                                                MD5:7EFA8337D01DF82405103E74DEA4AB0F
                                                                                                SHA1:6709CE2DD2D0DCF8300B1D3A7B20DD03C676E3E5
                                                                                                SHA-256:D29ADF82A3F473292D6882C0FB079940398536B9779CF43BF0BE7F2C9A182E5C
                                                                                                SHA-512:7E8D381F97A2DFFF5D58DDA23F8D4941C14EE05C97BB7160CA7201FF6DFA3E44A6319C606335A7D0BA00B3B932C377E72E29CE8C9678CC2F66FE4949735B4010
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L...+.QX...........!......................... ...............................0............@.............................V............ ...................9..............T............................................................................text...V........................... ..`.rsrc........ ......................@..@....+.QX........9...T...T.......+.QX........d...............+.QX....................RSDS.#.wA.o..=K. ......api-ms-win-core-synch-l1-1-0.pdb............T....rdata..T........rdata$zzzdbg.......V....edata... ..`....rsrc$01....` .......rsrc$02....................+.QX............)...)...(.......p.......1...c...................!...F...m...............$...X...........$...[.......................@...i...............!...Q.......................[...............7...........O...................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):18384
                                                                                                Entropy (8bit):7.1391272647934425
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:mhIWfhWv+Y3DGk8ZpH3GCJEFxhZzV+Y3DGEbt8JN77hh233+:0+DGkiRBEr3DGUK3hY3O
                                                                                                MD5:D3B28EC94FAB13AA7150B3AC1ABFB24B
                                                                                                SHA1:62CE8413919282D9E4B2E3FF51B61F9FF14C8D34
                                                                                                SHA-256:598F0CD35118BA86DC7CD4A5240ABEEE6D01D27A0960AE49766C84C2111662BA
                                                                                                SHA-512:75C6754D5D1EB3F2793D1E252C90085045009DE5FFA5E6E48202D12828024ACE8D3D450E0E411F8447A51A3C19BF565D9527917BDA45D76AE73B5965FC3FA6BB
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L....n............!......................... ...............................0......}&....@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@v....................n.........8...d...d........n.........d................n.....................RSDSC..T~.~.:GmfY.......api-ms-win-crt-conio-l1-1-0.pdb.........d....rdata..d........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.........n.....T...............(.......................>...w.........../...W...p...........................,...L...l.......................,...L...m...............t...........'...^...............P...g...........................$...=...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):17872
                                                                                                Entropy (8bit):7.124968259908221
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:mGWfhWX+Y3DGk8ZpH3GCJEFxeM+Y3DGEA/8JN77hhX+/:0WDGkiRBEbDGu3h9g
                                                                                                MD5:7EC18A5100D4C149F5CECCD5D28ABAB4
                                                                                                SHA1:CA9A57E017DF2E6019AE5BC79144764E752699F5
                                                                                                SHA-256:0F91011F52DC33ED32144E67EE5B3A977ABACA32F6A76AE522450CBFD33C1F1D
                                                                                                SHA-512:E63CDE78447A896A25DD758A54A6C2311311C66DBB5ABBF658F357F6546FEFBCD0B1120394D47EA2E1F4618A848D8AB8E5F41BFDA6A331EB9D4220E4BA9FE3C9
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L....<i*...........!......................... ...............................0......|.....@............................."............ ...................9..............T............................................................................text...2........................... ..`.rsrc........ ......................@..@v....................<i*........>...d...d........<i*........d................<i*....................RSDS.[.lv.C.8...u.......api-ms-win-crt-environment-l1-1-0.pdb...........d....rdata..d........rdata$zzzdbg......."....edata... ..`....rsrc$01....` .......rsrc$02.................<i*....................8...............C...d...........................3...O...l....................... .......5...Z...w.......................)...F...a...........................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):248272
                                                                                                Entropy (8bit):6.687188620681205
                                                                                                Encrypted:false
                                                                                                SSDEEP:6144:R2y3hhQZpA2C/VFuGEcL6hmDCYfM1+/e7VR8AocazlBQdSkIuVxRYy12z/VszBR/:Ht+zsM1+WkzRuVxRYPzS/n
                                                                                                MD5:BC440B80B432081023D3F7043F1C0C97
                                                                                                SHA1:8EB0CF8C6A611F372486083E85C0873E2A9C6B4D
                                                                                                SHA-256:8C9AB74CE98F323B557FCFF323D13144F97B1E021E0EF28A5E8FB383860FE871
                                                                                                SHA-512:BE88DC81B2663EEAF9AF7B5ED6744411C4D7943F91B75EDAEDE9F7EF8D1C7B91BE3DC5D6F460C2E3FD26281D0D11D6477E88C9D4A5D570BA49474A51F0E6EB29
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........HD...D...D..../..F...M.~.N.......A...D..........O.......C...............E.......E.......E...RichD...........PE..L....h.].........."!.........x...............0............................................@A.............................K..<r...........................9.......+...;..8............................<..@............p..8............................text............................... ..`.data....4...0...2..................@....idata.......p.......N..............@..@.rsrc................`..............@..@.reloc...+.......,...d..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):33
                                                                                                Entropy (8bit):3.8330556814482386
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:a/uVMWJQKrWy:aMMErWy
                                                                                                MD5:369E92A1F7A7ECEDCACA7D7845CC3F74
                                                                                                SHA1:C001EF0B380BB783ADBEA52EF1D9061882122499
                                                                                                SHA-256:226E2ED6957CF8D5D7BE843556425A4E3DA5C33D54407D2187F8105AAEFC92D9
                                                                                                SHA-512:8A06CA6B6CB92E5F79B4095B20F943A0A61F8049F4F4D7D3B45B5E09E5F9E9D2335BAAAAB3501A63037EA8FC58A80C7A51E24608BBEB2CA469E31E95E9928CB9
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:; Base.ini is required to exist..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:Generic INItialization configuration [DeviceProfiles]
                                                                                                Category:dropped
                                                                                                Size (bytes):34761
                                                                                                Entropy (8bit):5.473320491342328
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:dkfI+LHANt2rulkjOFOQgNtvjOaO63vYcDbEyBoOWe0mp+Pwh0XeTfasQ/mzU+lv:dkZiBqbn
                                                                                                MD5:10AE9CFE530FB68319DAA15BA1C3A8FC
                                                                                                SHA1:6A725189BF8DF1288C4DF0FD188ED3410DED2728
                                                                                                SHA-256:FFE32A801774EA1DB3649E24534458C00065037277F013C04ADD50ED19F6F00D
                                                                                                SHA-512:6428827CF4EA92E604628E81B20D0BBDE90125FF5A008AAC1D700E8918CCC1E501613FDC22EA700AB4A45D734D53483BE50BC04B15AAC44F7C55375C09A2E9A4
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:; Add a ArrayOfStruct key for all DeviceProfile PerObjectConfig sections (this must come before any DeviceProfile sections)..; Note that * properties don't get written back out by the config system, but these aren't real sections, so that should be okay..[DeviceProfile]..*TextureLODGroups=Group....[DeviceProfiles]..+DeviceProfileNameAndTypes=Windows,Windows..+DeviceProfileNameAndTypes=WindowsNoEditor,Windows..+DeviceProfileNameAndTypes=WindowsServer,Windows..+DeviceProfileNameAndTypes=WindowsClient,Windows..+DeviceProfileNameAndTypes=IOS,IOS..+DeviceProfileNameAndTypes=iPadAir,IOS..+DeviceProfileNameAndTypes=iPadAir2,IOS..+DeviceProfileNameAndTypes=iPadAir3,IOS..+DeviceProfileNameAndTypes=iPadAir4,IOS..+DeviceProfileNameAndTypes=iPadMini2,IOS..+DeviceProfileNameAndTypes=iPadMini3,IOS..+DeviceProfileNameAndTypes=iPadMini4,IOS..+DeviceProfileNameAndTypes=iPadMini5,IOS..+DeviceProfileNameAndTypes=iPodTouch6,IOS..+DeviceProfileNameAndTypes=iPodTouch7,IOS..+DeviceProfileNameAndTypes=iPhone5
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:Generic INItialization configuration [InstallBundleManager]
                                                                                                Category:dropped
                                                                                                Size (bytes):157512
                                                                                                Entropy (8bit):5.327507630883185
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:+SBCkfn5OkZX53ftqSiyh1olLWI5qs7ieWy1xAeU5GCg3Dnz1Y0nXpSrVWpXFVsZ:+AD1olLd7xUZENxg2Vg
                                                                                                MD5:1F924BCE5B3D2653CA87F6241EA65BA9
                                                                                                SHA1:1D102BAAE15BAC7F6E3F73D40AFC4B2BDA4E187D
                                                                                                SHA-256:BE94115FC5E64EC51A387958A2C87EB49A872CA52C53F308AEFE0E0E15C35912
                                                                                                SHA-512:F77981A58F1991589E13AA2E34CDD752E5870826D4AF9356C070199E1DAFC1A662BE3C6F28A154F761A3E61196B474C194C9F5824F21613212DACC71CC0568EB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:; This file defines the default settings for core and engine-level features..; These settings are overridden by a project's DefaultEngine.ini file and per-platform overrides..; Some of these settings can be modified from the project settings in the editor....[/Script/EngineSettings.GameMapsSettings]..GameInstanceClass=/Script/Engine.GameInstance..EditorStartupMap=/Engine/Maps/Templates/Template_Default..GameDefaultMap=/Engine/Maps/Entry..ServerDefaultMap=/Engine/Maps/Entry..GlobalDefaultGameMode="/Script/Engine.GameModeBase"..; Example for map prefix and game mode name setting..; +GameModeMapPrefixes=(Name="DM-",GameMode="/Script/GamePackage.DMGameMode")..; +GameModeClassAliases=(Name="DM",GameMode="/Script/GamePackage.DMGameMode")..LocalMapOptions=....[InstallBundleManager]..ModuleName=NullInstallBundleManager..EditorModuleName=NullInstallBundleManager....[URL]..Protocol=unreal..Name=Player..SaveExt=usa..Port=7777....[HTTP]..HttpTimeout=180..HttpConnectionTimeout=60..HttpReceiveTimeou
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):61
                                                                                                Entropy (8bit):4.482561986290143
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:HRAbEqKdwDQJBApKGExdQIAcGsPRCv:HRY8GIBA8k9cQv
                                                                                                MD5:1DB30560254DC359FF91940E10DDB1A6
                                                                                                SHA1:6B9F33E0F1B5E827028FC838C233259F2E389485
                                                                                                SHA-256:CD92B03B5A94EAD554160461A3FAA9E8E1FDF52F37A23C000EBE1164FC28F90B
                                                                                                SHA-512:2BAF7B85A29F23460DAE30E128FF42D46D91EBDFFA36EE62D5D5DBFDF178729E4DCE5BA9B9A30A1DEB6365D36971F446F5084A40F307F49842B85626397131DC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:[Internationalization]..ShouldUseLocalizedNumericInput=True..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):11059
                                                                                                Entropy (8bit):5.103147782440043
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:Y2PCbAZIxNj0IrmQp4JV3ugs19RcaJRkQPMgaNOzvHoNs/OgkySxsm:DKieEo0V+2aJRkQsOmsLkym
                                                                                                MD5:382321EAD709D931C39737A8ADC01183
                                                                                                SHA1:9F745A520F81939659D77FEB339144FE23ADD81B
                                                                                                SHA-256:26B2D78F9D499F75D4274332DCCDFACCAAABB7C9FD1F63DAFC75315320438268
                                                                                                SHA-512:DDDCE196B1DD7A66316855B945CB3ED98286A3735B716CA0A9E1E7A42B8ED75E2AA1390690938F79EBABDD54440FFBDEAF8E0F2B52BA5758EB072CF80271E101
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:; These are tweaked defaults for various lightmass solver and export settings..; Artist oriented lightmass settings are in the editor UI..; Documentation for all of these is in UnrealLightmass / Public / SceneExport.h..; This ini is reloaded every time a lighting build begins, no need to restart....; Warning: overwriting this file with an old version will cause the editor to crash. This file must be in sync with the editor executable...; Instead, create a DefaultLightmass.ini in your project and override just the values you need, then the overrides will continue to work on version upgrades...; https://docs.unrealengine.com/latest/INT/Programming/Basics/ConfigurationFiles/..;..; For example, in your project's Config/DefaultLightmass.ini:..; [DevOptions.PrecomputedDynamicObjectLighting]..; SurfaceLightSampleSpacing=400....[DevOptions.StaticLighting]..bAllowMultiThreadedStaticLighting=True..ViewSingleBounceNumber=-1..bUseBilinearFilterLightmaps=True..bCompressLightmaps=True..bUseConserva
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:Generic INItialization configuration [ExcludeContentForMobile]
                                                                                                Category:dropped
                                                                                                Size (bytes):1310
                                                                                                Entropy (8bit):4.8887259246146755
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:QSMx71rUoSBpMyQDQ0RzMga3oAD7FQR0YehvNb:QSMxx2NUzx5uZ4Yv9
                                                                                                MD5:18DA090A41DFBF5B6DCF765DDA7455ED
                                                                                                SHA1:AC27AD231720FC899AC2F5D1B48C52DD4D48F606
                                                                                                SHA-256:E1901D684774984A794368E33B1229AF3A834506AE4D10C4C45CC2AAD0A5AA83
                                                                                                SHA-512:2BCE9838DFD0178470D588F93C599283921061CFF4FA8DFF4F40B9FD5CB0D9DF7B80954654F0A8490B6F6B6A60645AB02DE8D4A8D70FA0C0A7C183B058047B5F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:; These rules are applied in order, the first rule that applies per file is taken and no others are evaluated..; [SectionName]..; bOverrideChunkManifest=false ..; If true this allows overriding assignments from the cooker..; bExcludeFromPaks=false ...; If true this removes entirely, cannot coexist with overridepaks..; OverridePaks="pakchunk1" ...; If set this will override pak list, comma separated..; Platforms="iOS,Android"...; If set this rule will only apply to these platforms..; Targets="Shipping,Test"...; If set this rule will only apply to these configurations..; bOnlyChunkedBuilds=true...; If set this rule will only apply to chunked builds..; bOnlyNonChunkedBuilds=true..; If set this rule will only apply to non-chunked builds..; +Files=".../*FileMask*.*"...; List of file masks to apply to, using the C# FileFilter class......[ExcludeContentForMobile]..; Exclude specific large textures on mobile platforms, this was moved from CopyBuildToStagingDirectory.cs..; This can be added to
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):89
                                                                                                Entropy (8bit):4.742925459228287
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:w241AVHGSW1tKAKM6yQjUAKM6zntM:wdymQAK14AKB+
                                                                                                MD5:A3879611FF83D94C1352E06EF35CFD85
                                                                                                SHA1:F9598AEF32DAA75929A8300C02FEB308E89EFD1E
                                                                                                SHA-256:B2064E1945F399CDCF2AF1F1AFD83397AF3C30AC14ED955F21DDA7FC9620296E
                                                                                                SHA-512:1A52D5BDCF5ECD6D5086E8E0272DAD86E1E1AF92154C4ADD098E1CC12B71F995E91F7A37D57F03C20717D0DD7939041DF9E31C662626597494CDF2B75A0000E3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:[Staging]..+RemapDirectories=(From="Engine/Plugins/Lumin", To="Engine/Plugins/MagicLeap")
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
                                                                                                MD5:CF788FA9793FEA6104E904FBA48B9ADE
                                                                                                SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
                                                                                                SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
                                                                                                SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):92
                                                                                                Entropy (8bit):3.28350515130155
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tluFblElwql5ERoZPUl1RY:Sv6BMw7CZMu
                                                                                                MD5:18933A825F0FC4CCD2CDEB68524F851F
                                                                                                SHA1:640CFC46024F16F989198B416141DACAC18CC955
                                                                                                SHA-256:F73099366D30DD36F3DE23E28F7851B57454090B3AF7648B1125E343F1321B92
                                                                                                SHA-512:1DDCB869360D19B469FA9DB3147925DED100A931F47CE4FEA7B6384F0A3AF6500FD8D8A8A0672D8B5CF6A47EEA0D874C4445C1DAD9AB16B72C14BC7F7FF39973
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...................................t.u.....o......P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):144
                                                                                                Entropy (8bit):3.8427825837613345
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tltv5/jlullJJstP93OkwlyHbtHUnZWf0lF0/xKlF1hFn:SvMl5Mxwly7K0f00g5
                                                                                                MD5:AE6774AD1B4E487D0992D22700F9087F
                                                                                                SHA1:46B5C49C76A7106F33BFA9BB13EC5B0F50EFF50B
                                                                                                SHA-256:DC359B3A630DAB0A5B4E728806547747FC25105B70ABD3B22E8BFF20A3995EF5
                                                                                                SHA-512:095B725D6F78B78A8F77DFA461B716A480219A969EFC8246045BC0B93A18BA1377BC17BF4FF99B390038DB71DB3A387C4B6C658F858B735A897D41CE6C34CE79
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...................................................NN.........P.......P..o.t...... u..`... ....o...... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):92
                                                                                                Entropy (8bit):3.28350515130155
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tluFblElwql5ERoZPUl1RY:Sv6BMw7CZMu
                                                                                                MD5:18933A825F0FC4CCD2CDEB68524F851F
                                                                                                SHA1:640CFC46024F16F989198B416141DACAC18CC955
                                                                                                SHA-256:F73099366D30DD36F3DE23E28F7851B57454090B3AF7648B1125E343F1321B92
                                                                                                SHA-512:1DDCB869360D19B469FA9DB3147925DED100A931F47CE4FEA7B6384F0A3AF6500FD8D8A8A0672D8B5CF6A47EEA0D874C4445C1DAD9AB16B72C14BC7F7FF39973
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...................................t.u.....o......P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):144
                                                                                                Entropy (8bit):3.8427825837613345
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tltv5/jlullJJstP93OkwlyHbtHUnZWf0lF0/xKlF1hFn:SvMl5Mxwly7K0f00g5
                                                                                                MD5:AE6774AD1B4E487D0992D22700F9087F
                                                                                                SHA1:46B5C49C76A7106F33BFA9BB13EC5B0F50EFF50B
                                                                                                SHA-256:DC359B3A630DAB0A5B4E728806547747FC25105B70ABD3B22E8BFF20A3995EF5
                                                                                                SHA-512:095B725D6F78B78A8F77DFA461B716A480219A969EFC8246045BC0B93A18BA1377BC17BF4FF99B390038DB71DB3A387C4B6C658F858B735A897D41CE6C34CE79
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...................................................NN.........P.......P..o.t...... u..`... ....o...... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):572
                                                                                                Entropy (8bit):5.373790886124089
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:Q74tjYwqxDGPbo9iVu92VnVu92VpEIEQPwG:Q7Ur+IEEw92tw92nDV
                                                                                                MD5:F47AB3C1C4A8BB34305293AE3725CEC4
                                                                                                SHA1:73718A4B40FB655D24AB4A55EA8FD037A0201B8B
                                                                                                SHA-256:325158DB8005C2BBAA3D9AD4AFE7DC196EB27B6072AC94BFD59B7351DE23362F
                                                                                                SHA-512:987C454DFCD870441918591C0929A075F55BDD5B58A803E8BDE320F0D596F1D90AE02A312E9FC8FF9F6FC1A52E1C925B72A1A76AF979ED20E1A4CA1995077DE1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................b........:...:.4.*...#.(.1.J.D.../.,.F.(.1...4.*.F.(.1...F.H.F.(.1...J.H.D.J.H.2...[.. . . . .~. ... ... ... ... ... ... .o. ... ... ... ... ... .c. ...]...................NN....k..)...45^W*....................V.....................\D....%...'..................V.........................V.....................\D....%...'..................V........................K..P....P..P..o.t...b.. R..`d.. ........c...p...}...............................k.. p.. ....H...U...u.. ..`.y.. ....[...o.w....`...`f.. ...`}..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):376
                                                                                                Entropy (8bit):4.934418116358701
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SvWEVwly7579tIn/MqMYofGtIn/xtIn/MqMYofGtInLfZMgetlfzMR+nU1cf:polxtOOVGtOxtOOVGtaMxNPU1c
                                                                                                MD5:825C655E66A8706E0A6186265B79182C
                                                                                                SHA1:7F5332DA7D0E212F62A51896E84C01B137558BF9
                                                                                                SHA-256:87C751A030504B6C93FF63960B3502705F6125C9A687DE7786EB6C36BA982B9F
                                                                                                SHA-512:D33B86814453E512DCE2ED5618F7B30C98F1AF4F560BAFE593E6ACAF5040F43F42C62C20884D819364167793DA67A2B8D521BA0895FEC877E54F78C01EE767D8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................Q.. ........V...V...........6..........................NN..^D........<.Q......6QD.6......3.'.%.....3.%.........^D........<.Q......6QD.6..^D........<.Q......6QD.6......3.'.%.....3.%.........^D........<.Q......6QD.6.........P.......P..o.t...6.. u..`8.. ................%...........2...?...L...........?.. D.. ..H.I.. ..`.M.. ....o.w.:.. ...`O..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):92
                                                                                                Entropy (8bit):3.28350515130155
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tluFblElwql5ERoZPUl1RY:Sv6BMw7CZMu
                                                                                                MD5:18933A825F0FC4CCD2CDEB68524F851F
                                                                                                SHA1:640CFC46024F16F989198B416141DACAC18CC955
                                                                                                SHA-256:F73099366D30DD36F3DE23E28F7851B57454090B3AF7648B1125E343F1321B92
                                                                                                SHA-512:1DDCB869360D19B469FA9DB3147925DED100A931F47CE4FEA7B6384F0A3AF6500FD8D8A8A0672D8B5CF6A47EEA0D874C4445C1DAD9AB16B72C14BC7F7FF39973
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...................................t.u.....o......P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
                                                                                                MD5:CF788FA9793FEA6104E904FBA48B9ADE
                                                                                                SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
                                                                                                SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
                                                                                                SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):28432
                                                                                                Entropy (8bit):5.567467981150978
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:AJG1Pi0609voRI21kVcQ4PID8rPfAxD/QVzFkVRe0Xqwge:AMtVkVPfAxD/QVJM5Xq6
                                                                                                MD5:CC5E90EE9B5824AA5466F1D6AC53342F
                                                                                                SHA1:EAB29097DF96421D3262C9820B6F0D0F9D121214
                                                                                                SHA-256:1B487B2128F64C7B5F6B4C7526F043BADFFB9F86D1C2055F935C8CFA021C831B
                                                                                                SHA-512:2AD0697D4DA6CF68BFF98DCB3D6887B7C9253A7FEA1025422FFD61DA74155E17508859A1F214B4D51691C975D6629F6DC62A0EAE96156790A842F9C350A264FC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................V.......g........X...1.T...2.T...3.T...4.T...s.....7.b...N.D...a.E...g...e...h.a.m...h.e.d...m.e.g...m.i.....n.e.h...p.a.g...s...b...t.a.h...t.e.k...v.i.e...x.u.e...y.e.k...E.D.C...A.v.i...G...e...J.M.M...K.a.M...K.M.M...O.c.h...P.a.y...X.i.n...X.n.t...X.u.n...a.v.i...c.b.l...c.b.r...c.o.n...c.u.l...g.a.l...g.c.h...m.o.n...o.c.h...p.a.y...p.e.r...r.a.t...t.i.g...x.i.n...x.n.t...x.u.n...L.e.i...L.h.o...L.w.a...m.o.n.u...r.a.t.u...g...e.i...E.i.e.n...E.i.h.M...s.e.l.....t.r.i.....{.0.}.b...7.b.i.s...A.n.n.a...E.i.j.i...E.i.s.o...E.n.g.i...E.n.p.M...E.n.. M...G.e.n.M...H.M.a.n...H.M.e.i...H.M.e.n...H.M.j.i...H.M.k.i...J.i.a.n...J.u.e.i...J.M.e.i...J.M.w.a...K.a.e.i...K.a.h.M...K.a.j.M...K.e.i.M...K.M.a.n...K.M.h.M...K.M.j.i...K.M.k.a...K.M.w.a...M.e.i.M...M.o.n.u...R...X.....R.a.t.u...S.h.M.M...W.a.d.M...Y.M.r.M...Y.M.w.a...e...C.....h.o.m.e...L.c.h.M...L.n.i.n...g.a.l.l.u...c.a.b.r.a...g.o.c.h.u...p.e.r.r.u...t.i.g.r.e...J.M.g.a.n...J.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.870450165586334
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/6kftl7+t3:SBtkJYlU8g8l/Nl4t
                                                                                                MD5:BB0AEDB2268541C63B88E2DAA6A83F14
                                                                                                SHA1:E7BB3AA9133FB59F22DDA92CEBC150BB83A74C1E
                                                                                                SHA-256:6B40AF34079AC564CCBCFA52F909A460198F52938E5D09BB0A6D60EFBD64E68F
                                                                                                SHA-512:25A48EF5A44915D747660225B049D6D2003E460135076302D8C6541ABAE568A21F2B2F28EBBFA9BABFC630CFFA78BDA769B8196FE63110F533C7DC9107AEBC7F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.................................a.z._.L.a.t.n._.A.Z...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
                                                                                                MD5:CF788FA9793FEA6104E904FBA48B9ADE
                                                                                                SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
                                                                                                SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
                                                                                                SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):3024
                                                                                                Entropy (8bit):3.840448449572339
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:/EL27l0wx4F1Nd7KX4Qc039gZb04VU253PePtJBLPqilg8zM/Xt15IlDB1Zy:/ELH6O1GcbZd9ktPfIXt0Be
                                                                                                MD5:AC1477035AFEA949843AB8E8F101517E
                                                                                                SHA1:E195EA2719ACF9133653F4F691DCDA32414E6236
                                                                                                SHA-256:2761825769003AF3030EC77234C60C2C59631D5ECC5680C7F46748C7EFE09790
                                                                                                SHA-512:D5954A36E53D2995B51EEBD04D67C342D90BDDB1EEBB31094CAD59B99233EB15560E10C4969E521927AC5FE035C2D2C70520CA8E88AA6B423DE6E98FE170EE49
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................Version.exceptions.SentenceBreak......C.....F.....G.....I.....L.....P.....Y.....Q.u.....C.a.....C.o.....D.i.....D.o.....D.r.....F.a.....F.n.....F.r.....H.r.....J.r.....K.l.....M.i.....M.o.....N.r.....O.p.....R.d.....S.a.....S.o.....S.t.....W.g.....e.v.....F.a.m.....M.o.d.....P.I.N.....S.t.R.....Z.t.r.....a...D.....a...M.....f.r.z.....i...J.....m...W.....o...A.....u...U.....v...T.....z...B.....z...Z.....A...M.....A.b.s.....A.b.t.....A.b.w.....A.d.j.....A.k.t.....A.l.t.....A.p.p.....A.p.r.....A.r.t.....A.u.g.....B.e.d.....B.e.n.....B.e.r.....D.a.t.....D.e.z.....D.i.m.....D.i.r.....E.r.f.....F...f.....F.e.b.....F.r.l.....G.e.m.....G.e.s.....G.g.f.....H.b.f.....H.r.n.....I.n.c.....I.n.h.....I.n.t.....J...D.....J.a.n.....K.a.p.....K.o.p.....L.t.d.....M.a.x.....M.i.n.....M.i.o.....M.r.d.....M.s.p.....N.o.v.....O.b.j.....O.k.t.....P...M.....P.f.d.....R.e.g.....R.e.l.....R.e.p.....S.e.k.....S.e.p.....S.t.d.....S.t.r.....T.e.l.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):712
                                                                                                Entropy (8bit):3.369956447252417
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:WjthcQRSMC7iqha4uA6Fyp1yl12TeRTVIKolACK4JgJ9LrkSlj:WjwOC7/hshQyMz7K4JK9L4Slj
                                                                                                MD5:1ADFA9703C0CBA543C2A6A14195B80F9
                                                                                                SHA1:3286BAEB9407AEA5FD5DB4BAF1523F2CB78BC686
                                                                                                SHA-256:001162812BCBC4B3E2F8747BFACC6BBFB6084DD04FC37DADF1BABEC54B5E0144
                                                                                                SHA-512:3989E555C9F058B942542C28200AC5419C84DAF14DC6A321C5B6C2D3DD4233ED7475663398C6CF868F22DCF8A21AF80A4BCBD7718C31843747F8DBEF6729CF5B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................Version.exceptions.SentenceBreak......D.....L.....D.C.....d.r.....o.n.....r.a.g.....C...P.....C.f.r.....I.n.g.....L.i.v.....L.t.d.....M.o.d.....N...B.....S.i.g.....U...S.....a...C.....a.l.l.....a.v.v.....d...C.....d.i.v.....f.i.g.....i.n.t.....p...i.....p.a.g.....s.e.z.....t.a.b.....t.a.v.....v.e.r.....v.o.l.....G.e.o.m.....a.r.c.h.....d.o.t.t.....m.i.t.t.....c...c...p.....N...d...A.....N...d...E.....N...d...T.....O...d...G.....S...A...R.....S...p...A.....U...S...A.....d...p...R.....2...1...1.9...1.4...S...M...A...R...T.....-.6.Y.E.^.......................T.....;.1.m...|.......".c.........@...h.w.,.'.....r.O...J.......3....... .(......`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):53856
                                                                                                Entropy (8bit):3.7418320755024443
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:2DoEL0eu4444443P444444444444444F44544444444444b444c44Q4e4444444+:2cELN/d4VqcVk
                                                                                                MD5:3134881D21CCA929C6DA5ED7C81B27C6
                                                                                                SHA1:8C4DF4847AC71183503E521154A91B3F849CC834
                                                                                                SHA-256:D5F7E98EAAA8F0EBE30056C6864DF8E01B00F1BD421F9D02888A40509C9B943D
                                                                                                SHA-512:D6AD8C3748A9CA8FCD289532EBE1D4B7BFF1619E6713330855935BB3F62B10B7D95156A85029CBBA773A898E6EB92FC61978BFD11BAF2AB7029C6527D28E7C49
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:...'........Brk ........ Copyright (C) 2016 and later: Unicode, Inc. and others. License & terms of use: http://www.unicode.org/copyright.html .............)...P....@...A..x....H...f..(...."......................................Z................................................................................................................................................................................... .....!.".............................................#.........................................................................................#.......................$...................................................................................................................................................................................................................................................%...........................................................................................#.......................&...............................................'...............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):56472
                                                                                                Entropy (8bit):3.7017475681634124
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:hrVu4444443P444444444444444F44544444444444b444c44Q4e44444444444D:TopB4FWnVL
                                                                                                MD5:506FF44FA1B804128F6A9C5C352FDAE0
                                                                                                SHA1:7DEBF66ECE7B93EC08CBE59A37B2F5E6892F84FE
                                                                                                SHA-256:643605B61FBCA9B13DF2CB2CF583EC7F4490E95E712A8168EBFB20520B6065D1
                                                                                                SHA-512:A2F170F972B630AC47C7B769AB43F3E0E5A9FE4D95FA060BD07A46A0543A683D450893325C24BFC9BFA5922E88463157A57B1B7656661600314126093E271A97
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:...'........Brk ........ Copyright (C) 2016 and later: Unicode, Inc. and others. License & terms of use: http://www.unicode.org/copyright.html .............-...P....F..8G..@...xP..`e......&.....................................b......................................................................................................................................................................................................... .!............................................."................................................................................................."...........................#.......................................................................................................................................................................................................................................................................$..................................................................................................."...........................%...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):53552
                                                                                                Entropy (8bit):3.732355638311328
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:ADoEL0wu4444443P444444444444444F44544444444444b444c44Q4e44444443:AcELvopd4VtEVf
                                                                                                MD5:C9368F051BFFC010B8984B489BF06E6C
                                                                                                SHA1:6864FB95D254CFCAAAD526FE8E84A15DB08ECA5A
                                                                                                SHA-256:B29C4358C5D605DC14BE6B1C16FD6BB022582051502952BF91C3CE087371C63D
                                                                                                SHA-512:2AD8D40A519B1FA375192C2AAF6AB23A73DA3FD4498E1C05463101B4C735A65F8EAAAE65C2B92408A962A937F2E0B1490E234101A816047ED9EEE694BCC24720
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:...'........Brk ........ Copyright (C) 2016 and later: Unicode, Inc. and others. License & terms of use: http://www.unicode.org/copyright.html .............)...P....@...A..x....H..`e.......".....................................Z................................................................................................................................................................................... .....!.".............................................#.........................................................................................#.......................$...................................................................................................................................................................................................................................................%...........................................................................................#.......................&...............................................'...............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):660
                                                                                                Entropy (8bit):3.969364612406447
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:WR55CTYlb/PnIXJ3EVReO82PADFE+Yc/ALXN0ZYEI4tiPd2oJofQlnO:W5Ckb3I52sDNoLXN0ZLtO2oyfB
                                                                                                MD5:0BE7629F239F7A16B71FDB4AC8BA1A18
                                                                                                SHA1:DF18DBC09EE192D46D05CA4989156AC598FC12D7
                                                                                                SHA-256:7651D933A0D58C98A6DAFAB3C0F093D713A352B03938339F62AC6C185DAD4B0A
                                                                                                SHA-512:CFA279D3D09069DCEF43C6A549B4A302E8675670283287AB98B34A332AFC199764888A6C777DA60CFCE942A6F59C3F66987F491C0A48317DBD5CB1217B82691A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................Version.boundaries.%%DEPENDENCY.grapheme.line.line_loose.line_normal.line_strict.sentence.title.word.dictionaries.Hani.Hira.Kana.Khmr.Laoo.Mymr.Thai......l.i.n.e...b.r.k...c.h.a.r...b.r.k...s.e.n.t...b.r.k...w.o.r.d...b.r.k...t.i.t.l.e...b.r.k...2...1...4.9...3.2...c.j.d.i.c.t...d.i.c.t...l.a.o.d.i.c.t...d.i.c.t...t.h.a.i.d.i.c.t...d.i.c.t...k.h.m.e.r.d.i.c.t...d.i.c.t...l.i.n.e._.l.o.o.s.e...b.r.k...l.i.n.e._.n.o.r.m.a.l...b.r.k...b.u.r.m.e.s.e.d.i.c.t...d.i.c.t.........o.~.....%...9.9.9.`.E...R...@.I.N.Y.e.q.z.......o.~.....%...................9.9.9.`.E...R.....3. .(........./..`...P...P
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):37144
                                                                                                Entropy (8bit):3.478348288934909
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:TtUga3kFDIayEm7PCbbV6GTu0b83+QIkHz8kX4LWhifIrUL/XQM8ZFeyiFHaf/0l:yga3Uwx7PCvE8b83aVfU4gJsZF6
                                                                                                MD5:8E6CD9C6706FA2C50250CABE26EB2F23
                                                                                                SHA1:89CBB53A6A8EE2B46FFEC8F114D5BC53733A45E9
                                                                                                SHA-256:3CC9C8EDC37CDC75F7D60C3CF12655A6A4E85B46BD5632BB1ABA62A331544ABA
                                                                                                SHA-512:80A3029ADCE05D245C58F4A936C05525B4E97A74C5389018D7F8F20F7A2AB84CEC0C7FAC172E1D997E9FAA7A6B3B045A8DD430613EF6EB6DD4C955FDE1544579
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:...'........Brk ........ Copyright (C) 2016 and later: Unicode, Inc. and others. License & terms of use: http://www.unicode.org/copyright.html .................P.......0...`.......p.......p.......................................*...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................*...................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):44928
                                                                                                Entropy (8bit):3.730335600949021
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:TfSX4tmoCZDvcWc/22cAo0VAjkmNVfmyBB+8mpzQVi7IVbHag1jQnwgDo0LJpTCG:LAvjc/22ch0mNVfmyBTg7IVb6rwDA
                                                                                                MD5:83B717BB03CBACC3F46CA0DCC6DE0694
                                                                                                SHA1:B85FC555A01737A383BE0831708E29F545FA4FA8
                                                                                                SHA-256:D2A53C0F3CDDA9BB26EE250268850BB93D6894ABD12D162BC1EA7FB880444851
                                                                                                SHA-512:5B63951A368A3A1C699801EB171CAAC3C231EC7BD2CBC975471D32DF111B8272E5B0C5E8BF6547CA0C164E6CF9BAF808343F752FF254C7EB1BB0C7CDF06057D2
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:...'........Brk ........ Copyright (C) 2016 and later: Unicode, Inc. and others. License & terms of use: http://www.unicode.org/copyright.html ................P.......`.......0....z..`.......0...0...........................X...@....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!.............................................".#.$.........%...&.......'...................................................(...........................................).*.......+.........,...!.......................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):304
                                                                                                Entropy (8bit):3.8227961435116296
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SBtkJfopI+mGTMG5lYly2/DUtD+QtDRqcQtCBwQ7Z4Cn:WuQvTbIy2/Q4QZQGrd
                                                                                                MD5:F7CA1EBA6FC99605E44BE6A0D694A4C1
                                                                                                SHA1:B0A05BFB176FA5A2DF5CAC10E92D9E912344321B
                                                                                                SHA-256:9261D8B837B66A1E3F3368D4AD111AB94CA857EAEDD2F808E91CDD7ED8351AFF
                                                                                                SHA-512:603F144ECF70C1FE8886701D1970DBE969798AECE0FCD5FB644DA5CB9B1300916BFC803C56A5F7EEB4C7C4A9FC2357D18CAE04E72146A2584A2E42AD9912F789
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................?.. ........D...D...........?...Version.boundaries.%%DEPENDENCY.line.line_loose.line_normal.line_strict...2...1...3.6...9.8...l.i.n.e._.c.j...b.r.k...l.i.n.e._.l.o.o.s.e._.c.j...b.r.k...l.i.n.e._.n.o.r.m.a.l._.c.j...b.r.k.........).....@.E.P.\.....).....3. .(.<......`A..P
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2524
                                                                                                Entropy (8bit):5.2701530855113665
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:6yf85nMv8XU/fqi2hTaMM+IHIFItfG/yfUXf6H25F25UTqWoQ9QRi67iseKxVpj8:nfQMEE6i6zLIHIFOGE8K2f2++X6A3xf4
                                                                                                MD5:731AFEFD7454289F3CC687C346CD39F4
                                                                                                SHA1:65334A4EDB35875090C86F614613C1DCC869BB10
                                                                                                SHA-256:18E42CAEBB99B8A45635209D37BFC8E6AF5CCEF3F100FF5C6C29F301943E19F9
                                                                                                SHA-512:D566BE6FC70D4BA28A387165B5ACCCEFC9473DCD18742351EA789F9A09B948AD9566D50E5E138A418E2945C3126926383E3151075BD9169875E5476C92EE1F5F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................_.. ........o...o......................................A.....G...8.A...&.?...+.G...........>...8.(...8.....+.A.....0.,.?.....A.(...&.>.(...+.A.8...,.A.&...8.>.(.....8.>.0.....8.?.(.....>.%.?.....G.%.K...&.?.(.H.........2.....>...K.....H./.>...8.A.(.?...8.H.%.K...-.>.&.M.0.....>.0.M.8.......%.,.0.......8.M.%.....(.8.K.2.....>.,.K.(.....A.2.>.......L.%.>./...+.>...A.(...,.?.8.%.?...,.K.8.K.0.....?.(.?.%.../.A.....8...0.?.....>...8...,.>.0...8.>.5.A.(...8.A...A.0.......>.9.M.(.....+.M.0.?.2...,.A.&.,.>.0...0.,.?.,.>.0.........2.,.>.0...8.A.(.?.,.>.0...8.G...G.(.M.&.....>.(.A.5.>.0.@...(.,.G...M.,.<.0...,.?.8.%.?.,.>.0...8.A...A.0.,.>.0.....8.>...*.B.0.M.5...&.?.8.G...M.,.<.0...8.,.%.>./.9.,.%.>...+.A.../.,.G.2.>.8.G...8.G.,.%.G...M.,.<.0...M./.d./.y.y. .G.G.G.G.G...,.H.8.>...K./.,.H.8.>.....8.*.M.$.>.9. ...G. .&.?.(.....?.%.>.0. ...?.2...?.%.>.0.....>.5.8.G./...K.(.M.&.K.(.H./.,.>.9.>...K.(.H...8.?.%.>.8.G./...K.(.M.&.K.8.G./.,.>.9.>...K.8.G.....>.5.%.>...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
                                                                                                MD5:CF788FA9793FEA6104E904FBA48B9ADE
                                                                                                SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
                                                                                                SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
                                                                                                SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMmsll86E7lXyEKd:SvUl86g1Kd
                                                                                                MD5:D4EF453530AF778ADA54DF1AFC64F304
                                                                                                SHA1:E1C2A9D54D408736B091C1BA4740CB054FD437CD
                                                                                                SHA-256:78FC4219ECA73162DDE17627148AB0B2266CCB80664007082C496BF5BEC35D7E
                                                                                                SHA-512:8BA387125D94E0279B1C930CB6BF46EA088F4BEEBB3C337C160935265DC114B9AE14F70B73403D797E2E6871F9E57114CEFD999766E0AA6E6B66D6AA0DB23DAA
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.g$...................g$...........o.f$
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1216
                                                                                                Entropy (8bit):5.590841534558597
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:p+tAIL3kZtYT7tqi/7ttsMteFsMv4YvCKmXWz5aVe:p+tp3otYdZiMteKMwYaKmnVe
                                                                                                MD5:E0DFF04FF2604F608A3A5C0FDDBDED6A
                                                                                                SHA1:C47515029521BABB1ABE9A847C31BFEB15200F1F
                                                                                                SHA-256:E8C2681948310652DD8A897CB5290DF17C6EFAEDBDB4353AF0085D8EA9673EB7
                                                                                                SHA-512:A762B339223E41F558B9C45143A3AC9A3F3AF67ED157922083922E59102A933BD6783B39356EAF239EA167AE192B64FDA56B3D69D7C1A3DD71790F326C67A25E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .m......(...(.........m..........K.B.Z...K.K.N...K.M.K...K.M.N...K.M.S...K.M.W...K.N.B...K.N.K...K.S.T...K.T.N...O.K.B...O.K.N...O.K.S...O.K.T...O.R.K...S.A.N...S.a.n.d.e...E.s.a.n.d.e...S.h.a.a.h.a...E.i.z.o.o.b.a...K.W.O.T.A. .1...K.W.O.T.A. .2...K.W.O.T.A. .3...K.W.O.T.A. .4...O.b.u.n.a.k.u...E.r.i.z.o.o.b.a...O.k.w.a.k.a.n.a...O.r.w.a.k.a.n.a........)..k..)...4.wEy..................................!.$...0............... .'./..4....eN>...D....L...3..].N..).P.M.Neh.4......k..)...4.wW*eh................................!.$...0............... .'./..4....eN>...D....L...3..].N..).P.M.Neh.4..................4=Y0.=...=(=..>.....>......4..j.R......}..n.1...r..v.~.z..M.......=80.<...<.<1I.<C0t%..l...G.A..4D..4G.G.D.>.J.../...^.a.d.g.............h.~.................H....<..<....Y.........................................<................P....... ...............P............%.......-.............. ... ........5...8...........;...H.......U.......
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2972
                                                                                                Entropy (8bit):5.691547237370157
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:8+57Ti6hKtR1VnDX21mRcMos/sjwHMdoY49byjfWq3msmUP7Eiax3IEvQnHy6:896hKt5nDm1mR66stoz9Wjf3XV7o+znt
                                                                                                MD5:F735BD73284F4065E64F3D375C0E4210
                                                                                                SHA1:7BE091A1D85A8FB82C900C2F5D0A2DB7C308DF79
                                                                                                SHA-256:33CB15B76BAD8153EEF788FAEB02B60F160F126C13D22E0E63724290C49B6651
                                                                                                SHA-512:0F19A72BFF06D44BA351BCE5F92E07D05B9250AE118221DCFE4A3DBC0EB7345024FBD18F392E9C5F017ECB416E9F25B6D7506BBA7D9320F2762F643841E74BB7
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .*..............).....*..........&...........~.....a.....b.....c.....d...a.4...b.4...c.4...d.4...e.4...(...F.../...F...&.'.(...h... .a...&.'.2.'.1...&.'...'.1...4.H.(.'.*...F...3.'.F.........F.....*...E.H.H.2...E. .d.....E...2.'.....F.....3...4...E.E.....&.....D.H.H.D...-.H.2.....1.'.F.../.H.H.4...E.E...........4...E.E.....d.. d... .M.M.M...~...F.,.4...E.E.......H.'.1.4...E.E.....~...4. .2.'.....F...M.M.M.. M.M.M... .y...d.. d... .M.M.M... .y.....'.1....... .3.....E...*.4.1...F... ./.H.H...E...*.4.1...F... .........E.....'.F.H.F... .........E...E... .d... .M.M.M... .y...G...A.*..... .w. ... .Y.....'.1....... ./.H.H...E.....'.1....... .........E.....'.F.H.H.F... ./.H.H...E.....'.1....... ...H.'.1...E...G...A.*..... .W. ... .M.M.M.M...M.M.M... .y. .. .M.M.M... .y...d... .M.M.M. .. .d... .M.M.M... .y...E... .d... .M.M.M. .. .E... .d... .M.M.M...4.[.. . .K. .L. .M. .N. .O. .P. .Q. .R. .!. .". .#. .$. .%. .). .+. .0. .5. .6. .7. .8. .C. .G. .I. .J.].
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):180
                                                                                                Entropy (8bit):4.431161922194599
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlR2xaluljwPgOZM7tvyi24OPnYZi2Pc3nslulAlv5cjXPpKlF7lF:SvM8UVw4Oy7Ryi24OvEi2Pc3nV696I7F
                                                                                                MD5:5AF72DD2B31240203880C30AB8512748
                                                                                                SHA1:3828F5D086D39C4727477D9755704CFCA51FF409
                                                                                                SHA-256:97C35776A37D70FC5BADB8F9128B8BC5E940467BB493FFF013300A62CA7344D0
                                                                                                SHA-512:6C7F35187752BE14ED2E2A64D6F5BC57E1C3DB94194C7F3827DE02EC2C0F960755102E55269405DC6AADA6FC4BAA7DB373E47626B7212E9AC85EA83FDA9A11AA
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................!.. .%......%...%.........%............k..)...4CwH...k............k..)...4Aw.I..$...............................t.`......`... ... ..o.w...*..`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):88
                                                                                                Entropy (8bit):2.64671783887604
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlW/lRl/jlklbl+3N/lnPn:SBtkJGtaaPn
                                                                                                MD5:AA8A7AA673D89EF3789A8F51E0A80829
                                                                                                SHA1:052FC49617344392438BD75F84E6F7662C50D294
                                                                                                SHA-256:0C3E87EC57077F2273433A6859EA6DDD7AFC5B2A272E475EDA076833239882C5
                                                                                                SHA-512:B96A6BF5258AF5D6EE582E2EF722F31017DC8FE8CAAF92A912AADB4E38E10645F451FCCAB8FC5EE95B48DF52A2A9E760F12C4255EC80B03BEF791C6551227CB5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................%%ALIAS...a.r..... .....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.751008663818094
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlu12Ol/8klclsX+RZlUlUvk:SBtkJK2Ol/8sU2cwll
                                                                                                MD5:102C528C9F8554CEF4474E7E10BB6A07
                                                                                                SHA1:D9F58057FEB38913D2F40935781934FCFBC69488
                                                                                                SHA-256:E80DE3D6D7DE0D2D0E8123CA081BCEA0BA849D3F08ABA660D5B93F3896FE10BE
                                                                                                SHA-512:EE971EBE616AED4CFA017A6C851AEC81C411525FE15D776BDEE19354B7FC951F9493AE13FB71B26F954F91CC247E4BBCFDEEFBD817E55D8400C284460EE39C9A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................Version...2...1...2.3...4.7..... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):6816
                                                                                                Entropy (8bit):3.1812041917040403
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:CqEDfLTTLTD5Tf7fTL377fTLKHSGz5Y3pnEoTKAGIhr3C:Cq0f33P5ff33Pf3gY5b1LC
                                                                                                MD5:F0748CA6B45F4ACCDB0A82D6D0206B61
                                                                                                SHA1:5303AAFFA8752402FD58D793AA754E673977F75D
                                                                                                SHA-256:DCF701064EEED5096988453045FDEE7448C3E1ADCF8885C312AFDADDD89BBB3E
                                                                                                SHA-512:86182697A0547823064E216BB4B92459DEB3E74D416AC25CA44B01A8DD3712D14EB76F6E7F9943345A1AD40377C2EC43E929E6A35F852923DC2FCEDE877AC4A3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................"...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...[.i.m.p.o.r.t. .s.r.]..............'........UCol.....`#...... ..............4...8...8...X...X...X...X........................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`'bcdefghijklmnopqrstuvwxyz{|}~.................................................................................................................................2irT..@.y...............0.8.@.H.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.P.X.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):8268
                                                                                                Entropy (8bit):3.8068001682596955
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:yThSGz8bppIKNToAGI1IBXapu5uk0c0HXkqqkTXAAcN4CSkjak3WICy7y8NYTosV:yYTrCyhkqqkTXNcNpSk+8NI8NYsM
                                                                                                MD5:E49D16830A825EEFD584C06F60D8A621
                                                                                                SHA1:6DDDEE5ECAFE01B4E8CF999AE1D050522CBC9665
                                                                                                SHA-256:4BEB717D54843C7F7E07A3E70CD33323FC5F634948277B5DC6B2F7BDD2EA7B15
                                                                                                SHA-512:935E468C1507AE3004AC52AD8786C74E2DA43B5817DCCDA81A1B64404C7138186B82CBCA04A744978509F2E436E77089C05812CD280FC8AD1A1085F5D150B652
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................'...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...4.8...6.7...&.N.<...<.<.<...<.n.g.<.<.<.N.g.<.<.<.N.G...^......'........UCol.....`#...... ..............D...D...D........................... ...:...F...2irT..@.................0.8.@.H.0.8.P.X.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.o.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):560
                                                                                                Entropy (8bit):6.471097376622729
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:WXNR0L3Omtmq103+54vmkCNMvWRQzaLhMvmNKzuxBJB16LO5yG9YmorO0+7ymBAh:W96Osd+OmvmLeO22LSeKufL6uL9iv+70
                                                                                                MD5:5C0CEE0EEE7A296F1FBD31BE1BCAA7DB
                                                                                                SHA1:DA0BBFBED073C0F9CCAA3DA5F389284216B49370
                                                                                                SHA-256:449FCA345D2D6E5C61E2B05353A0D485AE4C9113C1CD453F56F849B51617F5CA
                                                                                                SHA-512:71573BE3B0927BACBF83D15E20ABE60276691E3EB9C6985B0A161B9BCDB4F15BC38A3C91180EF10A2C4283F90823ABD7049A5BD513A8A8E59205276BC1474C3F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................$...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...[.r.e.o.r.d.e.r. .C.h.e.r.].................D......'........UCol.....`#...... .............. ...,...,.........6v...v................................ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstu.wxyz{|}~...................................................................................................................................E.<. .'......`...`..3.y.. .. .(......`~..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):9704
                                                                                                Entropy (8bit):3.621097460230965
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:i6MGRSGzR8fy3/ZAGILxA+qPXu3LjmEuLnj6ouwj2+hRxr226i+f/YijF:iGETxA5bl1VRfaYs
                                                                                                MD5:46CFAFA533753A2D182AAE7427D364EB
                                                                                                SHA1:F0784B7C037F256119434D8F84608D79D5E83D3F
                                                                                                SHA-256:34C8D91C847E6CFE66F7F69198A8586202F04A20554E76113B634612CA528767
                                                                                                SHA-512:9EFC02F5C8B30DA304849582CB1655E7925A5635302E172BEF5F275E0852DEE645B9DAE8123E96B958DA634110CE15049F3E46EA9DDA71A30FD41F6BE97470D9
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................n.. ........r...r...............Version.collations.phonebook.Sequence.%%CollationBin......3.5...2...1...1.9...1.4...&.a.<...<.<.<...&.o.<...<.<.<...&.u.<...<.<.<...&.s.s.<...<.<.<..........$.....'........UCol.....`#...... ..............D...D...D...d...d...d...d...0...0.... ... ...$..2irT..@.................0.8.@.H.P.X.T.\.a.i.n.v.y...0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0...........0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.7234597887964593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlu12Ol/8klclsX+RZlUlnBlk:SBtkJK2Ol/8sU2cwlBlk
                                                                                                MD5:74852472ABC6DD63B12C4766472C9B74
                                                                                                SHA1:5B59504CCCC2A557A39AB15BFFAC0270D4E4014A
                                                                                                SHA-256:BD31F37629AFE5B5CA7801F26F251980F6F6A737C01C3C5BE19E10B8F4840F00
                                                                                                SHA-512:80E3F257A80030BECD995377E912BCB62940C2819CEE559441CD3B9A141229A7E071FA75B91B4B868DCDBFD00AC389F5250C7D49D0F8096E8CDF9B045523D0DB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................Version...2...1...1.9...1.4..... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):11632
                                                                                                Entropy (8bit):4.077590020245211
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:XWh0Y4faHsQC3mMPE7IsGIyQ1i0lPxbHGk:qaj93mMPE7IjI51iGdGk
                                                                                                MD5:1DAC841377561C45224B1493C035E0EF
                                                                                                SHA1:B63E8D3CEA6C4DF2BDCB720901A3071A3CE21AB8
                                                                                                SHA-256:7843392DD3FFA62E4318C4CB22FAD1381380106FD2252B0A31039AD387994D28
                                                                                                SHA-512:FD5F29F450AA883F3A6EF415D740A4331DF9104CB9F172D45CE623396A6F66D02AD287417F636905DF46D0FFC820E01BF4AF64BADC9B8C8EF48027A22ACEFC1C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................P.. ........T...T...........b...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4.....&...<.<...&.D.<.d.z.<.<.<.D.z.<.<.<.D.Z.<.V.<.<.<...&.E.<.[.<.<.<...&.F.<...<.<.<...&.G.<.g.b.<.<.<.G.b.<.<.<.G.B.<.c.<.<.<...&.H.<.x.<.<.<.X.&.K.<.k.p.<.<.<.K.p.<.<.<.K.P.&.N.<.n.y.<.<.<.N.y.<.<.<.N.Y.<.K.<.<.<.J.&.O.<.T.<.<.<...&.T.<.t.s.<.<.<.T.s.<.<.<.T.S.&.V.<...<.<.<..........+.....'........UCol.....`#...... ..............D...D...D...................t#..t#...&...&..z+..2irT..@.................0.8.@.H.P.X.^.f.m.u.0.8.0.8.z.......0.8.....0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.7234597887964593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlu12Ol/8klclsX+RZlUlnBlk:SBtkJK2Ol/8sU2cwlBlk
                                                                                                MD5:74852472ABC6DD63B12C4766472C9B74
                                                                                                SHA1:5B59504CCCC2A557A39AB15BFFAC0270D4E4014A
                                                                                                SHA-256:BD31F37629AFE5B5CA7801F26F251980F6F6A737C01C3C5BE19E10B8F4840F00
                                                                                                SHA-512:80E3F257A80030BECD995377E912BCB62940C2819CEE559441CD3B9A141229A7E071FA75B91B4B868DCDBFD00AC389F5250C7D49D0F8096E8CDF9B045523D0DB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................Version...2...1...1.9...1.4..... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.1584082049584112
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDtM86E/lWlRKOt:SBtkJztt6siRKa
                                                                                                MD5:446A3139B2628B0370B88DEDED4D5382
                                                                                                SHA1:73A290ECC02BE29B6E9DEDD1DDE7B0633CB5D5A8
                                                                                                SHA-256:5107405E84E52F18E47AA7071F183E499A2C325E6E4BDA7FCA2B59ECB55D81D7
                                                                                                SHA-512:6E6CBE46747664442464BCCB8DC93DFAD4A786C6AC390EDA705C083498C898FF0D9083AFA411E800F1DFC1DB10799BEE110E7C5371B3F559A806D72D42CDEB0C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................___..... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):252
                                                                                                Entropy (8bit):3.8923972437714607
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SBtkJbAUMXfRWv80lbl+lSlGZkgFsJtgylf:WCAUMPR0oSMc5lf
                                                                                                MD5:A76CCF6803C6297FDBDC90FCAA2C39A8
                                                                                                SHA1:7156D4D3C55372EF3765D290A098EE994DF34FFE
                                                                                                SHA-256:F6B660BFAC93F4580444EBA04DE3C650C826F8891999302E3CCD0583D7DDF7F7
                                                                                                SHA-512:862AAF133C9CC9D157ABB4B7C20EBA0F0F36D55D7B86A32770530096980986FF9CEB4F199D6902B539AAC541D6784BCA4E24ED73CF7DF27F6F3635F97BE4BD81
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................3.. ........7...7...........#...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...[.b.a.c.k.w.a.r.d.s. .2.]... ......'........UCol.....`#......(....E.<. .#......`...`..3.,.. .. .(......`1..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):17104
                                                                                                Entropy (8bit):3.4874941508467288
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:MOlTpkEKjtDwRehrNL0bDbv/oNuiBmXgpqynC8HpYse:MOllbKhcovL0bDbvKui4XSJQ
                                                                                                MD5:FD6C94EA946E393251E8CE361AC55866
                                                                                                SHA1:5C9044025D9356DBC38C61DA738CEEB2D6520785
                                                                                                SHA-256:F13BCB6CC2690A3BB1B5750D1B8ECC9A3F5F70E12119FBFDE7AD3D2D13155CFE
                                                                                                SHA-512:3FAFA81C5130C08157CBDF5F257FB4960E50E0491FD47E3A45766E65DBB5A04C3C3F6A3C50C21B4EC1116461683A27EAECC97B32F983C1996BC5CD5FE2A7763C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................0...Version.collations.search.Sequence.%%CollationBin.standard....3.5...2...1...1.9...1.4...[.i.m.p.o.r.t. .e.s.]...[.i.m.p.o.r.t. .e.s.-.u.-.c.o.-.s.e.a.r.c.h.]................#.....'........UCol.....`#...... ..........M...D...D...D.... ... ... ... ..."..."...#...#...#..2irT..@....... .........0.8.@.H.0.8.P.X.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.T.\.b.j.r.z.0.8.y...0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.....0.0.0...0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0...0.....0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):6896
                                                                                                Entropy (8bit):3.2718938783920515
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:oBpIEt9ZDfLGWLTDfLvf7fTL377fTLKxASGzFpnEoTxAGIhtS:oBpJbfKGPfHf33Pf3vbktS
                                                                                                MD5:84DADD7F294FF77849F71282F0178B2B
                                                                                                SHA1:C76A7C957E9C2FE30778F9693524C30E6A0A48A1
                                                                                                SHA-256:4B344767F46F079B2A27519FD20BCB714FA53AFA45EB0801335381B5DC5DAEFB
                                                                                                SHA-512:7686B8FCDE850416802F162E93426D6E60C52BA09BA23092C02C5016F4ED5E207D451A2C1B53F024D909B77FE4EB2C68D9CEE0601B3E5DEB7C96145D876BCF49
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................H...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...V.[.n.o.r.m.a.l.i.z.a.t.i.o.n. .o.n.].[.r.e.o.r.d.e.r. .D.e.v.a. .B.e.n.g. .G.u.r.u. .G.u.j.r. .O.r.y.a. .T.a.m.l. .T.e.l.u. .K.n.d.a. .M.l.y.m. .S.i.n.h.].&.P.<...<.<...<.................t......'........UCol.....`#.......... ..............4...l...l...................X.......................#...$...........!......)...`...h...q................................ !"#$%&'(123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgfghijklm'()*+,-./.rstuvwxyz{|}~.................................................................................................................................2irT..@.q...............0.8.@.H.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.`.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):18912
                                                                                                Entropy (8bit):5.023090366613305
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:FyvoCH2tLtUy3E5rHgWvwhk4eUAMTpWo2TzrbFS:8vTHMLtF3mrHgw4eUZTpw4
                                                                                                MD5:A64E40E2EB99B495EC40D72C0714A276
                                                                                                SHA1:2ABF24E2C32A6D35188B3CB990AD2E03C7D1420A
                                                                                                SHA-256:2CA044F7DE47CC135785375C2F8A4DE43AEACC76BDCD84778EED23DBF3D51223
                                                                                                SHA-512:53CC847A9EB04EBFC1AFCEF221E32A6DB661582D518E7D7CBD97D587A915051BC2F0C6CC154AE56A29CE26F69B475EC4A8AF065A5039B85140FAC74D0BB02D87
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................l.. ........p...p...............Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4.....&.C.<.c.s.<.<.<.C.s.<.<.<.C.S.&.D.<.d.z.<.<.<.D.z.<.<.<.D.Z.&.D.Z.<.d.z.s.<.<.<.D.z.s.<.<.<.D.Z.S.&.G.<.g.y.<.<.<.G.y.<.<.<.G.Y.&.L.<.l.y.<.<.<.L.y.<.<.<.L.Y.&.N.<.n.y.<.<.<.N.y.<.<.<.N.Y.&.S.<.s.z.<.<.<.S.z.<.<.<.S.Z.&.T.<.t.y.<.<.<.T.y.<.<.<.T.Y.&.Z.<.z.s.<.<.<.Z.s.<.<.<.Z.S.&.O.<...<.<.<...<.<.Q.<.<.<.P.&.U.<...<.<.<...<.<.q.<.<.<.p.&.c.s.<.<.<.c.c.s./.c.s.&.C.s.<.<.<.C.c.s./.c.s.&.C.S.<.<.<.C.C.S./.C.S.&.d.z.<.<.<.d.d.z./.d.z.&.D.z.<.<.<.D.d.z./.d.z.&.D.Z.<.<.<.D.D.Z./.D.Z.&.d.z.s.<.<.<.d.d.z.s./.d.z.s.&.D.z.s.<.<.<.D.d.z.s./.d.z.s.&.D.Z.S.<.<.<.D.D.Z.S./.D.Z.S.&.g.y.<.<.<.g.g.y./.g.y.&.G.y.<.<.<.G.g.y./.g.y.&.G.Y.<.<.<.G.G.Y./.G.Y.&.l.y.<.<.<.l.l.y./.l.y.&.L.y.<.<.<.L.l.y./.l.y.&.L.Y.<.<.<.L.L.Y./.L.Y.&.n.y.<.<.<.n.n.y./.n.y.&.N.y.<.<.<.N.n.y./.n.y.&.N.Y.<.<.<.N.N.Y./.N.Y.&.s.z.<.<.<.s.s.z./.s.z.&.S.z.<.<.<.S.s.z./.s.z.&.S.Z.<.<.<.S.S.Z.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):7092
                                                                                                Entropy (8bit):3.1883641632795445
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:8qnDfLTTLTD5Tf7fTL377fTLKcSGzFpnEoTxAGIhcFSf:8qDf33P5ff33Pf3JbkcFC
                                                                                                MD5:DEDF86F20809D515B5441A7A00A9C564
                                                                                                SHA1:531629BF1DF847C6B4B746AF23D722B994E3A382
                                                                                                SHA-256:9776F4BE2EF5F11A5D03C9B7AFC184D6361D5256BE1140AE1E416CBBA3F7D0E1
                                                                                                SHA-512:D8EBD3065D260AAE0A1903CC16E4A441302C7A509A6BA12D83F8D7B6E379ABDD73DCECCCE8E61CEA4F4EC397A062891215FE2416A6AB847881EB340297391A11
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................(...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...[.r.e.o.r.d.e.r. .C.y.r.l.].&.5.<.Q.<.<.<..........................'........UCol.....`#...... ..............<...@...@...@...@...@...@................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`'bcdefghijklmnopqrstuvwxyz{|}~.................................................................................................................................2irT..@.................0.8.@.H.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.P.X.^.f.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.7234597887964593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlu12Ol/8klclsX+RZlUlnBlk:SBtkJK2Ol/8sU2cwlBlk
                                                                                                MD5:74852472ABC6DD63B12C4766472C9B74
                                                                                                SHA1:5B59504CCCC2A557A39AB15BFFAC0270D4E4014A
                                                                                                SHA-256:BD31F37629AFE5B5CA7801F26F251980F6F6A737C01C3C5BE19E10B8F4840F00
                                                                                                SHA-512:80E3F257A80030BECD995377E912BCB62940C2819CEE559441CD3B9A141229A7E071FA75B91B4B868DCDBFD00AC389F5250C7D49D0F8096E8CDF9B045523D0DB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................Version...2...1...1.9...1.4..... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):22836
                                                                                                Entropy (8bit):4.285576816878592
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:xJPnQ1xOzzU5wXJUUvuX3gl4PWBcVegUa/8m2YS3wG4qDYe/6dWUXmgEOKNaOjIS:jQ/+4aYzlEECIohA5GDpwU
                                                                                                MD5:0C4EBC14057AC2AEC1048A688AB10D78
                                                                                                SHA1:77C204D54BA7779DD79D606841983297B4340E88
                                                                                                SHA-256:E519FD05C4E1B6177533895C767E9E3B3C7F821E509C9CF8989DC8E6CB486EA2
                                                                                                SHA-512:8581D0D1A5726C4CD8ADF51C029F68A49BB0FC448815533F39B6997F29AD5C2EB63128C29FBE80A017D40454F06CF3C94BD602FDBF01A675E036A5E3E3E3A96B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................A.. ........E...E...............Version.collations.phonetic.Sequence.%%CollationBin.standard......3.5...2...1...1.9...1.4...&.E.<.[.<.<.<...&.O.<.<.T.<.<.<.....S.&.E.<.[.<.<.<...&.O.<.<.T.<.<.<...&.G.<.g.b.<.<.<.g.B.<.<.<.G.b.<.<.<.G.B.&.K.<.k.p.<.<.<.k.P.<.<.<.K.p.<.<.<.K.P.&.M.<.m.b.<.<.<.m.B.<.<.<.M.b.<.<.<.M.B.<.m.f.<.<.<.m.F.<.<.<.M.f.<.<.<.M.F.<.m.p.<.<.<.m.P.<.<.<.M.p.<.<.<.M.P.<.m.v.<.<.<.m.V.<.<.<.M.v.<.<.<.M.V.&.N.<.n.d.<.<.<.n.D.<.<.<.N.d.<.<.<.N.D.<.n.g.<.<.<.n.G.<.<.<.N.g.<.<.<.N.G.<.n.g.b.<.<.<.n.g.B.<.<.<.n.G.b.<.<.<.n.G.B.<.<.<.N.g.b.<.<.<.N.g.B.<.<.<.N.G.B.<.n.k.<.<.<.n.K.<.<.<.N.k.<.<.<.N.K.<.n.s.<.<.<.n.S.<.<.<.N.s.<.<.<.N.S.<.n.t.<.<.<.n.T.<.<.<.N.t.<.<.<.N.T.<.n.y.<.<.<.n.Y.<.<.<.N.y.<.<.<.N.Y.<.n.z.<.<.<.n.Z.<.<.<.N.z.<.<.<.N.Z.&.S.<.s.h.<.<.<.s.H.<.<.<.S.h.<.<.<.S.H.&.T.<.t.s.<.<.<.t.S.<.<.<.T.s.<.<.<.T.S......<.....'........UCol.....`#.......... ..............D...D...D...t...t...D!..D!...)...)...5...5...;..2irT..@.................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):10280
                                                                                                Entropy (8bit):3.8442671385451366
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:e/mFraymPmDPQOwdhEn8Qm5aqPNssWB5+CYEZ:eUrJmPmDoOzm5acssgww
                                                                                                MD5:453D55D7BB47B2B7BC2FD3EBA4E4A1E2
                                                                                                SHA1:0BC5C02A06018B466F3D673EF209E93D32779D6C
                                                                                                SHA-256:FC6A6BC9A00735D6D9538BBDC78DABE54390851BE06CFCF06FF000131E6DDB8D
                                                                                                SHA-512:5FB8EB180F72B4ACDB2AC5BF051209F11C0FDD100F9EE0BFFBA951D9C9AD2B944A69D969613C2742568E1CD46B1F6AF6E4FF4F7DA6B3DF9B8DA1E199A75CCA1A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................M...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...`.&...=.....&...=.....&...=.....&.A.<.<...<.<.<...&.C.<...<.<.<...&.E.<.<...<.<.<...<.<...<.<.<...&.I.<.<./.<.<.<...<.<.y.<.<.<.Y.&.S.<.a.<.<.<.`.&.U.<.<.s.<.<.<.r.<.<.k.<.<.<.j.&.Z.<.~.<.<.<.}............&.....'........UCol.....`#...... ..............D...D...D...........................b"..b"...&..2irT..@.................0.8.@.H.P.X.\.d.l.t.0.8.y...0.8.0.8.0.8.....0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0.......0...0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):7248
                                                                                                Entropy (8bit):3.275547854208499
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:jPvMcDfLTTLTD5Tf7fTL377fTLK5SGz5Y3pnEoTKAGIhgxXR4FDR:jPvZf33P5ff33Pf3eY5b1kGDR
                                                                                                MD5:EA2B7DDCB4A733DA59B0FF62CC497175
                                                                                                SHA1:4885A7DCB1D0F111FB53474AD6FEAC075B3D8206
                                                                                                SHA-256:2AEFB3248516F9E2527A8C1AB7EF96E9BDDF123D745310776041F096F15527AA
                                                                                                SHA-512:3630F610DCDCF922330BC69CEA22D012FF5A06B255E8B96A5220E94C1FE73D4799BD305BB109CA97FBA551AF057F9D6DD57E8B4DC12E512E83A32444703C082D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................:...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...9.[.r.e.o.r.d.e.r. .C.y.r.l.].[.s.u.p.p.r.e.s.s.C.o.n.t.r.a.c.t.i.o.n.s. .[...8.].].&...<.S.<.<.<...&.[.<.\.<.<.<..................'........UCol.....`#...... ..............<...@...@...P...P...P...P................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`'bcdefghijklmnopqrstuvwxyz{|}~.................................................................................................................................2irT..@.................0.8.@.H.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.P.X._.g.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):572
                                                                                                Entropy (8bit):6.406103106338581
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:WL2fR0LNL8aupmq103+54vmkCNMvWRQzaLhMvmNKzuxBmLO5yG9YmorO0+7ymBA3:WLSE4pd+OmvmLeO22LSeKuIuL9iv+7y3
                                                                                                MD5:66E02C38C83471CB19E278EA6FB8112F
                                                                                                SHA1:4ED90E2E7E56C0D24B80116C6988065E5992C3A3
                                                                                                SHA-256:7F2297B2E136463FDF75D7E0F0BFA189A861E7B004DC26B17CA423307EF585B6
                                                                                                SHA-512:28AA0AC9FEF2F5B1BB45623B87961A8E4B1375DF9EE3EA0DEA027464A16E7138B6401DA7B3815C79DFA54461DEE9B367B31BB4D7D32808F41399C316F0FB0707
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................&...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...[.r.e.o.r.d.e.r. .C.y.r.l. .M.o.n.g.].......P......'........UCol.....`#...... .............. ...8...8..............a...b..0v..4v................................ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`'bcdefghijklmnopqrstu.wxyz{|}~...................................................................................................................................E.<. .'......`...`..3.|.. .. .(......`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.7234597887964593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlu12Ol/8klclsX+RZlUlnBlk:SBtkJK2Ol/8sU2cwlBlk
                                                                                                MD5:74852472ABC6DD63B12C4766472C9B74
                                                                                                SHA1:5B59504CCCC2A557A39AB15BFFAC0270D4E4014A
                                                                                                SHA-256:BD31F37629AFE5B5CA7801F26F251980F6F6A737C01C3C5BE19E10B8F4840F00
                                                                                                SHA-512:80E3F257A80030BECD995377E912BCB62940C2819CEE559441CD3B9A141229A7E071FA75B91B4B868DCDBFD00AC389F5250C7D49D0F8096E8CDF9B045523D0DB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................Version...2...1...1.9...1.4..... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):10344
                                                                                                Entropy (8bit):4.271419544171399
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:PhOspqyPOFaeZUBIX9vaUscbxbKY3zcv//cpQwR48zxYWADv:PwspqvNv3sNWzeHmQv
                                                                                                MD5:DD7365352475EA3DD2767F13F41FB976
                                                                                                SHA1:97E4EAD03857C51932E0DFA8ED58587AC67F96B6
                                                                                                SHA-256:62928E142E473D98A1F85FA88DF103F40694042906F2377EA38A65CE3580C86F
                                                                                                SHA-512:719450846B7570A0846BE408940F28452A3800C4E1D13A251A04F96A29DF835AB7E6B0972C94BD70B48C682D1503D5451776C32E69BC7658CC978F0C6B33221D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................C...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...K.&.Z.<.c.h.<.<.<.C.h.<.<.<.C.H.<.d.h.<.<.<.D.h.<.<.<.D.H.<.k.h.<.<.<.K.h.<.<.<.K.H.<.n.y.<.<.<.N.y.<.<.<.N.Y.<.p.h.<.<.<.P.h.<.<.<.P.H.<.s.h.<.<.<.S.h......'.....'........UCol.....`#.......... ..............D...D...D............................"..`"...&..2irT..@.o...............0.8.@.H.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.^.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):7040
                                                                                                Entropy (8bit):3.2963712387128243
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:/A+knETvBDfLGWLTDfLW6f7fTL377fTLKkSGzFpnEoTxAGIhqjz:/A+k0fKGPfzf33Pf3hbkqjz
                                                                                                MD5:DF68A691D69D309CC5973650F2A8D877
                                                                                                SHA1:6BBB69818D12FE9BF2A858863F5CCC9C11643E30
                                                                                                SHA-256:2029F6CB4B7BD08C58B87488342291AF11CE67DBFBE7BC7A6981375FE81E71EB
                                                                                                SHA-512:425430AD9EC214FBFDB0BAB62DE7598CBCDB535AC618B2DEF59579BED521891453CDB41A0A951058C215182BDAC88D2204A822B3A4D9324C93CB58C4BABD4300
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................M...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...`.[.n.o.r.m.a.l.i.z.a.t.i.o.n. .o.n.].[.r.e.o.r.d.e.r. .O.r.y.a. .D.e.v.a. .B.e.n.g. .G.u.r.u. .G.u.j.r. .T.a.m.l. .T.e.l.u. .K.n.d.a. .M.l.y.m. .S.i.n.h.].&...<...<...<...&.9.<...M.7.&./.<.<._..................'........UCol.....`#...... ..............@...............................................................#...$...........!......)...`...h...l...m...q................................ !"#$%&'(123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgfghijklm()*+',-./.rstuvwxyz{|}~.................................................................................................................................2irT..@.w...............0.8.@.H.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.`.0.f.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.1584082049584112
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDtM86E/lWlRKOt:SBtkJztt6siRKa
                                                                                                MD5:446A3139B2628B0370B88DEDED4D5382
                                                                                                SHA1:73A290ECC02BE29B6E9DEDD1DDE7B0633CB5D5A8
                                                                                                SHA-256:5107405E84E52F18E47AA7071F183E499A2C325E6E4BDA7FCA2B59ECB55D81D7
                                                                                                SHA-512:6E6CBE46747664442464BCCB8DC93DFAD4A786C6AC390EDA705C083498C898FF0D9083AFA411E800F1DFC1DB10799BEE110E7C5371B3F559A806D72D42CDEB0C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................___..... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):10284
                                                                                                Entropy (8bit):3.8329305980220534
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:DOdkPkwSGzkach/xFnThAGILr8+0QksfjmEuM65MVabLf6IEcg0M7zk2wu1uQmYG:DOd0kAcVb2q5MV8pEcRM7w2d1mYs/DB
                                                                                                MD5:F54792C447E814C203D5CAAA07EA1774
                                                                                                SHA1:A5D375B3549E36ECFDF92E5A373A28EEFAAB61B7
                                                                                                SHA-256:8C857F52A2A19783B9C14F0925BAB553C70062A5A833911D98E1836C2CA765AB
                                                                                                SHA-512:6E22BE2043964182BF19FFA1C6838FB166366A35449E754ADFC4F462F200CA185399FABAA2E4C249CC97B9BC59275110DF0986C421866405C8B7990A4AD0EDCC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................@...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...F.&.A.<...<.<.<...&.C.<...<.<.<...&.E.<...<.<.<...&.L.<.B.<.<.<.A.&.N.<.D.<.<.<.C.&.O.<...<.<.<...&.S.<.[.<.<.<.Z.&.Z.<.z.<.<.<.y.<.|.<.<.<.{................&.....'........UCol.....`#...... ..............D...D...D............................"..."...&..2irT..@.................0.8.@.H.P.X.`.h.p.x.y.......0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.......0.....0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):9152
                                                                                                Entropy (8bit):3.9385991206484325
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:+iXmyf33Pfoff33Pf3/Y5b1l5zbl6BpQoRw8YsYV:+oHnQnEb17I/E
                                                                                                MD5:140A3116DEE46D196904D5B3BC64DC4B
                                                                                                SHA1:473C9FA7A84CFC5CD61E43FF88B5CAEDACFB2D7F
                                                                                                SHA-256:4B85DE155ABD4F10DC2CE39E96F2203B4D7F55FE577B2C99B94CDD8819525ACA
                                                                                                SHA-512:C69C3EB4CDB45434473C623E75DCE326653E04649B229470D3493695F8E07858F2BDAE377E5353C09D24CCFB0A475559039C16DC757B9524B4285FC9F326DB34
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4.....[.n.o.r.m.a.l.i.z.a.t.i.o.n. .o.n.].[.r.e.o.r.d.e.r. .A.r.a.b.].&.N.<.<.P.<.<.O.<.<.K.<.<.M.<.<.L.&.[.b.e.f.o.r.e. .1.].'.<.".&.'.<.<.#.<.<.r.<.<.q.<.<.%.<.<.s.<.!.&.*.<.|.<.<.y.&.,.<...<.<.-.T.&...<...&./.<...<.<...&.1.<...<.<...&...<...&...<.<.*...C.&...<.<...&...<.<...&.H.<.<.$.<.<...<.<...&.G.<.<.<...<.<.<.G.T.<.<.*.......)...&...<.<.*.I...J.....<.<...T.<.<.<.I.T.<.<.<.&.&...<.<.. <.<.. ................d!.....'........UCol.....`#...... ..............D...H...H...................................L!...................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcde'ghijklmnopqrstuvwxyz{|}~.................................................................................................................................2irT..@.................0.8.@.H.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.7234597887964593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlu12Ol/8klclsX+RZlUlnBlk:SBtkJK2Ol/8sU2cwlBlk
                                                                                                MD5:74852472ABC6DD63B12C4766472C9B74
                                                                                                SHA1:5B59504CCCC2A557A39AB15BFFAC0270D4E4014A
                                                                                                SHA-256:BD31F37629AFE5B5CA7801F26F251980F6F6A737C01C3C5BE19E10B8F4840F00
                                                                                                SHA-512:80E3F257A80030BECD995377E912BCB62940C2819CEE559441CD3B9A141229A7E071FA75B91B4B868DCDBFD00AC389F5250C7D49D0F8096E8CDF9B045523D0DB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................Version...2...1...1.9...1.4..... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):9028
                                                                                                Entropy (8bit):3.7670032895856154
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:BVe6MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMb:BVR7vBnmfO5npz8ZYGn
                                                                                                MD5:71C97109D89ED5276BEA459B00925B66
                                                                                                SHA1:3DC2DBF60B81BE424FBE043DD3E3FD6F6E690952
                                                                                                SHA-256:50A1B2397DD35328A10CA0E7665AFD5C7BDA8C56A45082EFE6F6ABC117EC0128
                                                                                                SHA-512:F0D3CAFAE7139A0BE42183624F42E8C82CA85722B0C1604B3BD04D317E47A732C1ACFC32A0F349E02791609C68A893CAFE8AF2D642A4871D390F284C233AEB90
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................4...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4.....&.A.<...<.<.<...<...<.<.<...&.I.<...<.<.<...&.S.<._.=...<.<.<.^.=...&.T.<.c.=...<.<.<.b.=..................".....'........UCol.....`#...... ..............D...D...D...t...t...t...t....................!..2irT..@.................0.8.@.H.P.X.\.d.0.8.0.8.f.n.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.....0.0.0.....0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):552
                                                                                                Entropy (8bit):6.475698706545024
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:Wh/ThR0L+lq103+54vmkCNMvWRQzaLhMvmNKzuxBmLO5SfG9YmorO0+7ymBADOMt:Wr1w+OmvmLeO22LSeKuIuS+iv+7ym2/t
                                                                                                MD5:3C36DD32064B9ABC9700B51EBFDC9FEB
                                                                                                SHA1:3020CA291091B8175BD6282DFBCB7AB1A2E8509F
                                                                                                SHA-256:5473E753D24D1B03BB1B0ABFE4D9FD14377507B1FF19AADB2C35C57440858766
                                                                                                SHA-512:D079635B3766020E7F3C4C9B95934D692045E4083026AC570E9BA14D16BBCAA41EF1E1F0090BA09BCE4F11A95CCFED1CEC40E30AEE34525DBE957F302EE04588
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................~.. ........................$...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...[.r.e.o.r.d.e.r. .C.y.r.l.].................<......'........UCol.....`#...... .............. ...$...$....................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`'bcdefghijklmnopqrstuvwxyz{|}~...................................................................................................................................E.<. .'......`...`..3.w.. .. .(......`|..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):29156
                                                                                                Entropy (8bit):4.012114656235891
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:TOoHoNZ/vAKnvna0bDbs/nEYYaHDLWbrAiKmEYYRMkxx:6oHoNZXAunhHs85aHfWbEiK55/xx
                                                                                                MD5:BF2D357381E33C4A78C716114D3B3119
                                                                                                SHA1:6F701CBB897FE58A8D4AB3AD352AAA20A9B6F0EE
                                                                                                SHA-256:B8EC2BC354DE81801377879E0C950167CCE4C3B899FCA3881EAF95EBC85EE1AF
                                                                                                SHA-512:D35D36C9068307F85057B78FCD704A289424AE43850B5EB876586F11B562AAFC9162551FB14BC0C8B79592FB69F108F7B5130240F16B436929F421B21049FB1A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................m.. ........q...q...............Version.collations.search.Sequence.%%CollationBin.standard....3.5...2...1...1.9...1.4...1.[.i.m.p.o.r.t. .u.n.d.-.u.-.c.o.-.s.e.a.r.c.h.].[.i.m.p.o.r.t. .s.e.-.u.-.c.o.-.s.t.a.n.d.a.r.d.].../.&.[.b.e.f.o.r.e. .1.].b.<...<.<.<...&.[.b.e.f.o.r.e. .1.].d.<...<.<.<...<...<.<.<...<...<.<.<...&.[.b.e.f.o.r.e. .1.].e.<...<.<.<...<.<...<.<.<...&.[.b.e.f.o.r.e. .1.].h.<...<.<.<...<...<.<.<...&.[.b.e.f.o.r.e. .1.].l.<...<.<.<...&.[.b.e.f.o.r.e. .1.].o.<.K.<.<.<.J.<.<.D.<.<.<.C.<.<...<.<.<...&.[.b.e.f.o.r.e. .1.].t.<.a.<.<.<.`.&.[.b.e.f.o.r.e. .1.].u.<.g.<.<.<.f.<.<...<.<.<...&.y.<.<...<.<.<...<.<.q.<.<.<.p.&.[.b.e.f.o.r.e. .1.]...<.~.<.<.<.}.<...<.<.<...<.<.S.<.<.<.R.<...<.<.<...<...<.<.<...<.<.'.<.<.<.&.<...<.<.<...<.<...<.<.<...<...<.<.<...<.<.Q.<.<.<.P.<.<...<.<.<...<.<...<.<.<...<.<...<.<.<..................9.....'........UCol.....`#.......... ..............D...D...D....(...(...-...-..83..83...9...9...9..2irT..@.|..... .........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):2.8358718455819605
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtl6/NlXelbONglLMhll+fEPn:SBtkJK/6vJQWOn
                                                                                                MD5:22828A7D641C2B46CAF27EE76D771B0B
                                                                                                SHA1:5C2C34608ED1161E4BD7CD471BAB22258BB86933
                                                                                                SHA-256:2FF2317B37FBFA2470A02052DF89CEC26CEC78BD8A30BCDBDC36D8D874A84D04
                                                                                                SHA-512:B77FFA9EDA88505A1CB29C2B00F1A29B4D415972C4EBC2FE04889F8601C771EC9BD11956D7334A0A474766CF33BB3ABAD2715B0358BCF9676126AEC9132E226F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................%%ALIAS...s.r._.L.a.t.n._.R.S..... .....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):25664
                                                                                                Entropy (8bit):4.016149774524455
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:zOG2ydsJRFpmi0vO0bDbPNH3Z2nkhiSkkW1Za4uimCvlIeJjHi:aGHdsvmiO9HVXZXQzs1CvSeVC
                                                                                                MD5:690C0062EEAFA49C713EC2AED29633CC
                                                                                                SHA1:90AAAC8469535DE0DA1DB8F1A4347F295201A4F9
                                                                                                SHA-256:EA32904D79FE915AD2C0F04A378C376F4855BEB578505A374DFCBC2C0D790CDB
                                                                                                SHA-512:9B38CDBF60D53730EC3FA7F36367C651A7C8148681900A4D8126FCCFEEDCDCF3A3CBB2AA85DBC74F9BD273DE9F8CDD185F552C56C03DFA2FA749B519B4E2194D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................Version.collations.search.Sequence.%%CollationBin.standard....3.5...2...1...1.9...1.4...P.&.A.<.a...<.<.<.A...&.C.<.c...<.<.<.C...&.H.<.c.h.<.<.<.c.H.<.<.<.C.h.<.<.<.C.H.&.O.<.o...<.<.<.O...&.R.<.r...<.<.<.R...&.S.<.s...<.<.<.S...&.Z.<.z...<.<.<.Z.......[.i.m.p.o.r.t. .u.n.d.-.u.-.c.o.-.s.e.a.r.c.h.].&.A.<...<.<.<...<...<.<.<...&.C.<...<.<.<...&.D.<...<.<.<...&.E.<...<.<.<...<...<.<.<...&.I.<...<.<.<...&.L.<.:.<.<.<.9.<.>.<.<.<.=.&.N.<.H.<.<.<.G.&.O.<...<.<.<...<...<.<.<...&.R.<.U.<.<.<.T.<.Y.<.<.<.X.&.S.<.a.<.<.<.`.&.T.<.e.<.<.<.d.&.U.<...<.<.<...<.o.<.<.<.n.&.Y.<...<.<.<...&.Z.<.~.<.<.<.}.......09.....'........UCol.....`#...... ..............D...D...D....'...'...'...'..\/..\/...9...9...9..2irT..@.p..... .........0.8.@.H.P.X.`.h.p.x.}.......0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.............0.8.....0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):8704
                                                                                                Entropy (8bit):3.6685940591098785
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:erdySmNSGzV/YlvjfTVuAGIh3NvuSiDnEVlKWbCmjgC6VfSmYy:epy1x0j7H3Mo7KMxMSmYy
                                                                                                MD5:8C4F7B3BC899D6D6792994EA761879D4
                                                                                                SHA1:06982E8B604F9C4435A8F228124AE576ED53A886
                                                                                                SHA-256:80313AFB3F4ACA7CA9AA2BF8B4071520845CCE9E3FAA4CA29F0990A0C5D4DE51
                                                                                                SHA-512:AA1AAE5287BD1C655F6AB0B3F429A05794EAC5E05617FD0A738CEAEDE3B7960519703D571C513F3BB257FFB2A3C46CD41504A156C31E300514DDFCAA43573850
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................t.. ........x...x...........0...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...&.C.<...<.<.<...<...<.<.<...&.D.<...<.<.<...&.S.<.a.<.<.<.`.&.Z.<.~.<.<.<.}.................. .....'........UCol.....`#...... ..............D...D...D.................................... ..2irT..@.................0.8.@.H.P.X.Y.a.0.8.0.8.i.q.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0.....0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):24540
                                                                                                Entropy (8bit):3.7529323885518333
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:YOzfSj10u+D9i4qvs0bDb1riYcEhcXh/hDN10PWyiYcEhc6lxR:fzfSjmPT0DHTcEhwh/ZNmrcEhRHR
                                                                                                MD5:B9F397A964EC7B60E93102E703697ACA
                                                                                                SHA1:51D9C91C9B6DA8964EEFFC724DBD2E1BBAA55558
                                                                                                SHA-256:5B81A62F482B07E2D06BFAD578D6E4806FBCA20E8EC4E6EC271128CE0DA63704
                                                                                                SHA-512:BC67CDB81FC32BF35243DEA589E285639BDE5D09A6B60021491927D1BD6342228FE23ADCD263E8E4A915A765436790CEED6FD3879FCC258CF1D4A5DC3FEB2287
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................n...Version.collations.search.Sequence.%%CollationBin.standard....3.5...2...1...1.9...1.4...2.[.i.m.p.o.r.t. .u.n.d.-.u.-.c.o.-.s.e.a.r.c.h.].[.i.m.p.o.r.t. .s.m.n.-.u.-.c.o.-.s.t.a.n.d.a.r.d.]...i.&.A.<...<.<.<...<.<...<.<.<...&.C.<...<.<.<...&.D.<...<.<.<...&.J.<.<...<.<.<...<.<.D.<.<.<.C.&.S.<.a.<.<.<.`.&.Z.<.~.<.<.<.}.<...<.<.<...<...<.<.<...<...<.<.<...<...<.<.<...<...<.<.<...<...<.<.<...<...<.<.<............1.....'........UCol.....`#.......... ..............D...D...D....'...'...(...(..p-..p-...1...1...1..2irT..@.k..... .........0.8.@.H.P.X.`.h.p.x.y.......0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.............0.8.....0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.....0.0.0...0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0...0.....0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):2.828613311907312
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtl6/NlXelbONglSU5YMnPn:SBtkJK/6v/5YMPn
                                                                                                MD5:B6AB05CAEC5B3D87BA18BCA933CC0A26
                                                                                                SHA1:42A993B80A17D3F3C7983F1282E1E1FECE63FDED
                                                                                                SHA-256:4D8B1CFE45A1B3F9DDD60DAD3AB6D8DFE5F7D328C11B7BB8077A8ECAC46D88CA
                                                                                                SHA-512:039741CC2F608D9D33055B9995D0B25E998371EC28317C496749A56C354210FE166F15255BA836E4B93F6B0C5F6A47F9822CBF99515E823B2F82DD8C50A11A3A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................%%ALIAS...s.r._.C.y.r.l._.B.A..... .....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.1584082049584112
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDtM86E/lWlRKOt:SBtkJztt6siRKa
                                                                                                MD5:446A3139B2628B0370B88DEDED4D5382
                                                                                                SHA1:73A290ECC02BE29B6E9DEDD1DDE7B0633CB5D5A8
                                                                                                SHA-256:5107405E84E52F18E47AA7071F183E499A2C325E6E4BDA7FCA2B59ECB55D81D7
                                                                                                SHA-512:6E6CBE46747664442464BCCB8DC93DFAD4A786C6AC390EDA705C083498C898FF0D9083AFA411E800F1DFC1DB10799BEE110E7C5371B3F559A806D72D42CDEB0C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................___..... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.1584082049584112
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDtM86E/lWlRKOt:SBtkJztt6siRKa
                                                                                                MD5:446A3139B2628B0370B88DEDED4D5382
                                                                                                SHA1:73A290ECC02BE29B6E9DEDD1DDE7B0633CB5D5A8
                                                                                                SHA-256:5107405E84E52F18E47AA7071F183E499A2C325E6E4BDA7FCA2B59ECB55D81D7
                                                                                                SHA-512:6E6CBE46747664442464BCCB8DC93DFAD4A786C6AC390EDA705C083498C898FF0D9083AFA411E800F1DFC1DB10799BEE110E7C5371B3F559A806D72D42CDEB0C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................___..... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):20064
                                                                                                Entropy (8bit):3.745828754746045
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:TOSfg3SyPv1w0bDbq5KAn8nrRWj3MUKPVV6R:6SYF1vH+CR4Z0jE
                                                                                                MD5:A822B9C75FE11AF54909B142EC7C7AE1
                                                                                                SHA1:0E1FFDC7BB343BF182036A3AA02B4AFAEFB902EF
                                                                                                SHA-256:63B27E0DECE4C56B46B01B940EE40DFC70F24ED16549965AD39CB5D5D4647CEB
                                                                                                SHA-512:715B87CDADE594BDCA171DFAD663131AA9AD1B1244DD2F8FCE5E4E0D38B379298AF05131A043C789DEA09DABD995443C13D8079B6AA02BC16651AAA148D8198A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................0...Version.collations.search.Sequence.%%CollationBin.standard....3.5...2...1...1.9...1.4...[.i.m.p.o.r.t. .h.r.]...[.i.m.p.o.r.t. .h.r.-.u.-.c.o.-.s.e.a.r.c.h.]................(.....'........UCol.....`#...... ..........q...D...D...D....#...#...#...#...&...&...(...(...(..2irT..@....... .........0.8.@.H.P.X.Y.a.0.8.i.q.s.{.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.z...........0.8.....0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.....0.0.0...0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0...0.....0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0.....0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.1584082049584112
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDtM86E/lWlRKOt:SBtkJztt6siRKa
                                                                                                MD5:446A3139B2628B0370B88DEDED4D5382
                                                                                                SHA1:73A290ECC02BE29B6E9DEDD1DDE7B0633CB5D5A8
                                                                                                SHA-256:5107405E84E52F18E47AA7071F183E499A2C325E6E4BDA7FCA2B59ECB55D81D7
                                                                                                SHA-512:6E6CBE46747664442464BCCB8DC93DFAD4A786C6AC390EDA705C083498C898FF0D9083AFA411E800F1DFC1DB10799BEE110E7C5371B3F559A806D72D42CDEB0C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................___..... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):2.8743333840434984
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtl6/NlXelbONglSU5Fg+fEPn:SBtkJK/6v/57On
                                                                                                MD5:71B3D464B83631B1E1ECEC35AFCEAD37
                                                                                                SHA1:748A87487B0675355DE3DD7D298173C74176E126
                                                                                                SHA-256:D1ED65D21F51001F63C40408403A386F2CBE5EE7A61FF98C1F5DA60A2B391469
                                                                                                SHA-512:14DBFF86707AB747C9B93C03AFAC82D744444DEDBF379F5353D769EABF2C05A968FCDB14EBE7AB6531B2C87EFE021DFF051AAD7FCB30CEE50F7173890B8E22B8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................%%ALIAS...s.r._.C.y.r.l._.M.E..... .....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):9180
                                                                                                Entropy (8bit):3.6887838997318045
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:RcVJVehSGzmUWiUoaT3AGIhoyye0XnvIlTjN4T084Tm3Arg3Y1Zo:RcVJYhWiUHmPgIlTjNYFmyb3Yw
                                                                                                MD5:5CE536C02CCCE5413DFE8BC4BDC50FD9
                                                                                                SHA1:91974FFAB77E59F413F39B9066D5063A0FD6C9B8
                                                                                                SHA-256:E9051598553443F4D3B3AB25526A429B38D586ABF7834F28CC820F9CBD60CB1E
                                                                                                SHA-512:264C4428FBC70CCA1E0C7E8D09711C05B3C14E22CB664B58C40BAE6F5A866085BDE164B14CD84439428AA334B2C8F3ABA59FDCEA665303E3BCA92B6429ACF79A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................:...Version.collations.standard.Sequence.%%CollationBin...3.5...2...1...1.9...1.4...9.[.n.o.r.m.a.l.i.z.a.t.i.o.n. .o.n.].&.E.<...<.<.<...&.G.<.g.b.<.<.<.G.b.<.<.<.G.B.&.O.<...<.<.<...&.S.<.c.<.<.<.b..........".....'........UCol.....`#...... ..............D...D...D...T...T...T...T...`...`...~........"..2irT..@.................0.8.@.H.P.X.Y.a.a.i.j.r.u.}.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0...0.......0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):96
                                                                                                Entropy (8bit):2.732558048486656
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlR/Pllvlsltloe1zRslklk:SBtkJJelXoeZukC
                                                                                                MD5:12DD8C36CF20B5221FED4CA8D148690E
                                                                                                SHA1:49FE57BD75E718FD72D81117BDEE5C4C0BF187D8
                                                                                                SHA-256:BC0C6C650104EE38A032AAB0BD27D3627087549D811BC2AC1090FC675EDD1426
                                                                                                SHA-512:74EF0DA76CD1054F3B73EF05AC00991F6425DB064A3803E2E16C2715729CAE32B059D97DAED98C3A0FADB797FAEF30E8520D6335AD41A33B0B1EFFFB6D616035
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................%%ALIAS...z.h._.H.a.n.s..... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):2.893564153274269
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtl6/NlXelbH1zRfFPn:SBtkJK/67Zp1n
                                                                                                MD5:215ADB705DE3ABA0C31A481B0566E6E6
                                                                                                SHA1:412A1B4BDCD5038F986B3FEF3ABE047BF02987D1
                                                                                                SHA-256:088EDA99EE757C50C1DBA8520B71914B6084EC5A0FAE9B7FA54D692C420CC967
                                                                                                SHA-512:CAF08E7EC4C3EBC249666E901419B90762742C7C7492B7437B15FF64BD9126DCCB3035787E7ED86143B89ACF4BD9936220267ACA57D9DB040055B58983795D30
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................%%ALIAS...z.h._.H.a.n.t._.H.K..... .....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):152
                                                                                                Entropy (8bit):3.4689779176628415
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlHF26HfHlsuRmMD4VlliufDUlnBlHlPFPtH:SBtkJ4pMfSlkuwlBlHl/
                                                                                                MD5:FED6013D3E13618D243805553B6BFEE8
                                                                                                SHA1:CE436DE298C460153DB8C4D009FED9B6C28B9EDE
                                                                                                SHA-256:0CC444B8CBCD3DB0702FE798BFF4DB5A56FAE99C8A3576C0025E8B6B57C7C7CC
                                                                                                SHA-512:57D313A6A031567C231EBCB2E311CADD7EE7A4854E554651FA34C4B1DFD126AC4544140BDF2512A74F2C22C5EBFC0ADD8524D5B796B27C70DB095A1D2265C471
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................Version.collations.default....s.t.r.o.k.e...2...1...1.9...1.4.....3....... .(......`...P
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.1584082049584112
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDtM86E/lWlRKOt:SBtkJztt6siRKa
                                                                                                MD5:446A3139B2628B0370B88DEDED4D5382
                                                                                                SHA1:73A290ECC02BE29B6E9DEDD1DDE7B0633CB5D5A8
                                                                                                SHA-256:5107405E84E52F18E47AA7071F183E499A2C325E6E4BDA7FCA2B59ECB55D81D7
                                                                                                SHA-512:6E6CBE46747664442464BCCB8DC93DFAD4A786C6AC390EDA705C083498C898FF0D9083AFA411E800F1DFC1DB10799BEE110E7C5371B3F559A806D72D42CDEB0C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................___..... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.1584082049584112
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDtM86E/lWlRKOt:SBtkJztt6siRKa
                                                                                                MD5:446A3139B2628B0370B88DEDED4D5382
                                                                                                SHA1:73A290ECC02BE29B6E9DEDD1DDE7B0633CB5D5A8
                                                                                                SHA-256:5107405E84E52F18E47AA7071F183E499A2C325E6E4BDA7FCA2B59ECB55D81D7
                                                                                                SHA-512:6E6CBE46747664442464BCCB8DC93DFAD4A786C6AC390EDA705C083498C898FF0D9083AFA411E800F1DFC1DB10799BEE110E7C5371B3F559A806D72D42CDEB0C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................___..... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):2.8743333840434984
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtl6/NlXelbH1zRzlhWfEPn:SBtkJK/67ZFLWOn
                                                                                                MD5:62CA9648BCF3E92915DF4ED667775BB3
                                                                                                SHA1:80DADE2F7AE52289CF346A3B1DE99504E082D4CA
                                                                                                SHA-256:918FB146507DF2A02DF8DD79E35A7D9D88BE3338D55D1D2F1E4AFADA8E72278F
                                                                                                SHA-512:34BF61355D86566692BDAEC6FE9F748B23091E7F8E9FFC05C49398A0D35775A6438DD23E58D382A4ED3A2A3F37CB3A6120885100448052B76E28CB625E2C57AF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................%%ALIAS...z.h._.H.a.n.s._.S.G..... .....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.7234597887964593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlu12Ol/8klclsX+RZlUlnBlk:SBtkJK2Ol/8sU2cwlBlk
                                                                                                MD5:74852472ABC6DD63B12C4766472C9B74
                                                                                                SHA1:5B59504CCCC2A557A39AB15BFFAC0270D4E4014A
                                                                                                SHA-256:BD31F37629AFE5B5CA7801F26F251980F6F6A737C01C3C5BE19E10B8F4840F00
                                                                                                SHA-512:80E3F257A80030BECD995377E912BCB62940C2819CEE559441CD3B9A141229A7E071FA75B91B4B868DCDBFD00AC389F5250C7D49D0F8096E8CDF9B045523D0DB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................Version...2...1...1.9...1.4..... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
                                                                                                MD5:CF788FA9793FEA6104E904FBA48B9ADE
                                                                                                SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
                                                                                                SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
                                                                                                SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):10140
                                                                                                Entropy (8bit):4.947208245996127
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:18bx6XHZhLlIwU3IOHTOJWlWWq3cbf0bZx8tD5ZC+UB3UOxNOnC1/cM:axc/LlI5tT7WWq3cL00J5M+UB35WnpM
                                                                                                MD5:64607A2EF6187866EE2A718A10331921
                                                                                                SHA1:2F5B24C41D5A5C624F625F0AF7B10CF04F551AB6
                                                                                                SHA-256:CD8A8550E2FBDFD484754E563C9F3138CA61235FC9459F31863AA4FB4390242F
                                                                                                SHA-512:CF5DC7F9344C2F7540AD4415CC13C7C1E9B6E4445F78ECE7A766D3E8B1FF39229A32C86D5633F78AEAEA9AA7F33D0F238E75FD5808151B0B015B7498B2A9E41A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .&....................H......i~...B.r.i.t.s.e. .p.o.n.d...I.r.a.n.s.e. .r.i.a.l...T.u.r.k.s.e. .l.i.e.r...I.r.a.k.s.e. .d.i.n.a.r...S.i.r.i.e.s.e. .p.o.n.d...J.a.p.a.n.n.e.s.e. .j.e.n...K.a.z.a.k.s.e. .t.e.n.g.e...K.u.b.a.a.n.s.e. .p.e.s.o...L.e.b.a.n.e.s.e. .p.o.n.d...L.i.b.i.e.s.e. .d.i.n.a.r...L.i.t.a.u.s.e. .l.i.t.a.s...M.i.a.n.m.e.s.e. .k.y.a.t...S.w.e.e.d.s.e. .k.r.o.o.n...I.n.d.i.e.s.e. .r.u.p.e.e...C.h.i.n.e.s.e. .j.o.e.a.n...L.e.t.t.i.e.s.e. .l.a.t.s...D.j.i.b.o.e.t.i. .f.r.a.n.k...E.g.i.p.t.i.e.s.e. .p.o.n.d...E.t.i.o.p.i.e.s.e. .b.i.r.r...G.e.o.r.g.i.e.s.e. .l.a.r.i...K.i.r.g.i.s.i.e.s.e. .s.o.m...K.r.o.a.t.i.e.s.e. .k.u.n.a...L.a.o.s.i.a.a.n.s.e. .k.i.p...M.a.c.a.o.s.e. .p.a.t.a.c.a...M.o.l.d.o.w.i.e.s.e. .l.e.u...O.e.z.b.e.k.i.e.s.e. .s.o.m...S.e.r.b.i.e.s.e. .d.i.n.a.r...V.a.n.u.a.t.u.s.e. .v.a.t.u...Y.s.l.a.n.d.s.e. .k.r.o.o.n...I.n.d.i.e.s.e. .r.o.e.p.e.e...K.a.t.a.r.r.e.s.e. .r.i.a.l...A.f.g.a.a.n.s.e. .a.f.g.a.n.i...A.l.g.e.r.i.e.s.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):3.315821515325992
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQx68tXmar98k+FlllQ/wF:Svu68dmar9il4wF
                                                                                                MD5:006F2DC31EBA19D58A2D90952FC0A0E1
                                                                                                SHA1:345751FC3EA8C1F78EABBEEE3D8F35DB6B2703BD
                                                                                                SHA-256:B58B655CF2787743987BB1CAA66DCBD5F75C1161FAF18F426DD82983E57E8CE6
                                                                                                SHA-512:6D94175559DF549A22428E21111C347ABD77E75B7FB2A5DACD653E2C5C73D9EBCDE74B000E284E76BEE135DD5A1D90B5B14AD3FA0DD82AB1E1CD3BAABB260845
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .!....................!......i~....... .................... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2308
                                                                                                Entropy (8bit):4.3979767036908575
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:wpUIdMjJNuPVJyVFSq3urfDM69UW52wZGY929bJMh1X7/mY/F2nrMyQpnvg:8WK7yVFvuXZ9352bY9291O1X7/mY/Qwq
                                                                                                MD5:55FE1F0AEEB53BCBA85349A099DEE4BA
                                                                                                SHA1:0AA381447584402F3B07BC0C890553B4D3D03D29
                                                                                                SHA-256:54C82B3FAE82F1A28DB85C85C9D6B28549E2EB26BCBC5C4904E717D189CE8A70
                                                                                                SHA-512:430BD7047BB642689D6F6224C30D7636D7E801678D611D668E72C4FEFED8F09FD4747412A0E059BFC1FBC976495E3DDDC8597201431C9B0425EFE0C2C820F72C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................5.. ..#.....9...9...9............i~...I.r.o...S.e.f.a.....s.k.u.d.o...E.g.y.p.t. .P.T.n...S.u.d.a.n. .P.T.n...B.a.r.e.n. .D.i.n.a...B.r.e.t.e.n. .P.T.n...G.h.a.n.a. .S.i.d.i...G.i.n.i. .F.r.a.n.k...G.y.a.p.a.n. .Y.[.n...I.n.d.i.a. .R.u.p.i...L.i.b.y.a. .D.i.n.a...S.u.d.a.n. .D.i.n.a...I.t.i.o.p.i.a. .B.i.r...K.a.n.a.d.a. .D.T.l.a...K.o.n.g.o. .F.r.a.n.k...L.e.s.o.t.o. .L.o.t.i...A.m.[.r.i.k.a. .D.T.l.a...K.e.n.y.a. .H.y.e.l.e.n...K.o.m.o.r.o. .F.r.a.n.k...M.o.r.o.k.o. .D.i.r.a.m...N.a.m.i.b.i.a. .D.T.l.a...T.u.n.i.s.i.a. .D.i.n.a...A.n.g.o.l.a. .K.w.a.n.z.a...B.u.r.u.n.d.i. .F.r.a.n.k...G.y.e.b.u.t.i. .F.r.a.n.k...L.a.e.b.e.r.i.a. .D.T.l.a...M.a.l.a.w.i. .K.w.a.c.h.a...R.e.w.a.n.d.a. .F.r.a.n.k...S.e.y.h.y.[.l.s. .R.u.p.i...S.t. .H.e.l.e.n.a. .P.T.n...U.g.a.n.d.a. .H.y.e.l.e.n...Z.a.m.b.i.a. .K.w.a.c.h.a...Z.i.m.b.a.b.w.e. .D.T.l.a.....l.g.y.e.r.i.a. .D.i.n.a.....s.t.r.e.l.i.a. .D.T.l.a...M.a.d.a.g.a.s.i. .F.r.a.n.k...M.T.r.e.h.y.e.T.s. .R.u.p.i...N.a.e.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):88
                                                                                                Entropy (8bit):2.706321389987818
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlKelBjlgljl/deNl6l2lkWx:SBtkJTl4P06s+Wx
                                                                                                MD5:684C1B6BFD753BA822EA8D74E056CB7C
                                                                                                SHA1:54554C5264F3AA4A913FE41EC70C78AE092E9725
                                                                                                SHA-256:DD2EC488EAAFDA87F276CF164B7D82BD2CC85B4C1945630C2A42B91EFD5DA63E
                                                                                                SHA-512:F9A62E62E630D08D847F81FE32E6A7C9B07938B886F85A838C9549A8DBCA3A773E1968840BCF2B7016ED35BA9AA54F0F3602F4879F05741813E8E62FE44F2A2E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~...a.r._.S.A.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):10528
                                                                                                Entropy (8bit):5.22841261707209
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:9zBra2qxqD6/IxqGSBixWCpNRhGue6xl/WhjN402thEjTZZKj6muLAO0WP1Pobji:JBrw/IHV8PAQCvxzKJY9DH6lqsqGVJ
                                                                                                MD5:25E937A70C85521D2EB2B81F5285BA5A
                                                                                                SHA1:A02AEF71EFF198FC3069EA3107703E0BB3486ECF
                                                                                                SHA-256:C9BA27BCCE9814AB188A5EFAF429E3A2D1BB899148E474A6DE92DCC0E4EBB000
                                                                                                SHA-512:7872318C367F434E3788AEBC29375AA6174167726F4A5F2E3CE1C1AECE2B952453E806DB9479623911F5D40B5A8052EFDCEF59CC5EFE92A4A309EE2E3C38865E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................9.. ........@...@.........K.-....i~................... .........C.F.P. ......................... ................... ................... ......................... ............... ..... ...........U.A.E. ......................... ..................... ........................... ................... ....................... ....................... ........................... ..................... ......................... ..................... ............................... ............... ....... ..................... ............................. ......................... ..................... ............................. .............. ...... ............................. ......................... ......................... ........................... ......................... ......................... ..................... ............................. ............................. ........................... ....................... ...................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2496
                                                                                                Entropy (8bit):4.225674105997367
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:xs2uGj+skXWtT/bS2sr61LDVlHAcirEKr2kfJKp/CgV+:x/uY+sKW/u2JnlgFom0p/9V+
                                                                                                MD5:05572B51CDD83FD3D81BB148ACB07220
                                                                                                SHA1:A259AC53240764086743A0CEF9B0582E24E5DE68
                                                                                                SHA-256:A8F2E53E5F27A01C1A4C230ADF2628FAAE1D755331A655D07245BBD82ABD115A
                                                                                                SHA-512:4F4ECBB6B074BAED7ED5C485F0B46C5F34D11125658A3CC9D660F477EE498D5069AD3B40A893128F6B5C9619DCDC95AC8A973E6DBA216839DDC430CFCCF6DC08
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................d.. ........h...h...:............i~...t.h.e.d.i. .y.a. .G.h.a.n.a...b.i.r. .y.a. .U.h.a.b.e.s.h.i...f.a.r.a.n.g.a. .y.a. .G.i.n.e...l.o.t.i. .y.a. .L.e.t.h.o.t.o...p.a.u.n.i. .y.a. .M.i.t.h.r.i...d.i.r.h.a.m. .y.a. .M.o.r.o.k.o...f.a.r.a.n.g.a. .C.F.A. .B.E.A.C...n.a.i.r.a. .y.a. .N.i.j.e.r.i.a...p.a.u.n.i. .y.a. .T.h.u.d.a.n.i...r.i.y.a.l. .y.a. .T.h.a.u.d.i.a...r.u.p.i.a. .y.a. .M.o.r.i.t.h.i...d.a.l.a.t.h.i. .y.a. .G.a.m.b.i.a...d.i.n.a.r.i. .y.a. .A.l.j.e.r.i.a...d.i.n.a.r.i. .y.a. .T.h.u.d.a.n.i...d.o.l.a. .y.a. .D.h.i.m.b.a.b.w.e...f.a.r.a.n.g.a. .C.F.A. .B.C.E.A.O...f.a.r.a.n.g.a. .y.a. .B.u.k.i.n.i...f.a.r.a.n.g.a. .y.a. .J.i.b.u.t.i...f.a.r.a.n.g.a. .y.a. .K.o.m.o.r.o...k.w.a.c.h.a. .y.a. .D.h.a.m.b.i.a...k.w.a.n.d.h.a. .y.a. .A.n.g.o.l.a...p.u.l.a. .y.a. .B.o.t.t.h.w.a.n.a...d.i.n.a.r.i. .y.a. .B.a.h.a.r.e.n.i...d.i.n.a.r.i. .y.a. .T.u.n.i.t.h.i.a...d.o.l.a. .y.a. .A.u.t.h.t.r.a.l.i.a...e.t.h.k.u.d.o. .y.a. .K.e.p.u.v.e.d.e...f.a.r.a.n.g.a. .y.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2376
                                                                                                Entropy (8bit):4.511785904113108
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:3SZaekjjUm6NGNEXXlDZVY1/xyJORNEkhxydxSfQIq8TgVz5nnv:3S1SjUm6wg19VY15YObvXsU8zVFv
                                                                                                MD5:D8683BE4C956E7903417885139455F6D
                                                                                                SHA1:81E74E1FF50403380D3C7BCEB7D6C99152923C7C
                                                                                                SHA-256:0E9B8915A5A6B9FDA23CE479A5D454A4F80C6B21F6CCE6D37A4223ADEA3377C0
                                                                                                SHA-512:5D8F493E589E0B07A0BD9C13DD1EDC75CCE53C5A2E4CF1AF87B12A3522BC105E19D608EB739248FE0F79BCFA610F389313663B9F195FFBF8EB9A70CCCC88FCE8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................F.. ........J...J...:............i~.....r.....L...o.n.[.....F.r...K. .g...n.....S...d.i. .g...n.....Y...a.n. .k.i.n.....F.r...K. .k...K.g.o...F.r...K. .s...w...s...R...a.l. .s...u.d.....R...p.i. .+.n.d.......Y.[...n. .y...p...n...B...r. ...t...o.p.......D...n...r. .l.i.b.......D...n...r. .s...d...n...D...n...r. .t...n...s...D.T.l.a. ...m.e.r.k.....F.r...K. .R...a.n.d.....F.r...K. .j...b.u.t.....F.r...K. .k...m.o.r.....L.o.t... .l...s...t.....P.a...n.d. .s...d...n...S.i.l...K. .k.e.n.......D.i.n...r. .B...r.a...n...D.i.r.h...m. ...m...r.....D...r.h.a.m. .m...r...k...F.r...K. .b...r.u.n.d.....K.w.a.c.a. .m...l.a.w.....K.w...c.a. .s...m.b.i.....P.a...n.d. .h...l.e.n.....P.a...n.d. ...g...p.t.....R.u.p...[... .m...r...s...S.i.l...K. .s...m...l.i...S.i.l...K. ...g...n.d.....D.a.l.a.s... .g.a.m.b.......D.o.b.r... .s...o.t...m.e...D...n...r. ...l.g.e.r.......D.T...l...r. .k...n.a.d.....F.r...K. .m...l...g.a.s.....K.w...n.z.a. ...K.g.o.l.....N.a.f.k... ...r...t.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):29460
                                                                                                Entropy (8bit):4.485162904696295
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:6GE+P67DqsdHTXvIubR9VL4SrX72/rrq9WALkXk7OQbYUjkjFdPbZ:k7DqsaulLkXWkf
                                                                                                MD5:ACA178D3F7923220CE3F676284A58FE3
                                                                                                SHA1:0BEFF3E73D3C05ED14259C5F7051237EFB1FEE74
                                                                                                SHA-256:F48DC1EB0C4D9FEA72460090149A80F9273B2B473FD2642ED0F05D3D1E5F2909
                                                                                                SHA-512:DC29ED80EDE0E810B4491674E6298DB0948F4DBCB9941ED963166CDAB31E896C86CB942C5CBCB0099F8CC5D176A456D94C53101BC91D0399480C625769F3EC65
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...........................i~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
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):32436
                                                                                                Entropy (8bit):4.645809034718554
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:vrGVznQRVUXi7gFMn01ftm7OIFhq2vTFy4Y07D1DE:vKZQRVUXi7gX1f7AhVs4Y0nlE
                                                                                                MD5:4F869609848B4ABC169C4CBF13BB6D97
                                                                                                SHA1:3CDD250564CC3627406F57C54D64F8FF7171AF6E
                                                                                                SHA-256:CB1C3858BE09F9F2251A880B8C23A01A27A8B4B66CE97DE6CFC9EE8C9D75D8E7
                                                                                                SHA-512:01939190DD74228817347C25098C8AB9413DDFA0D4E2B8BB006ADB46064B486D7EF7FF34B10B03BEEAB72E6C608E6C41CF09898DF9653B251977D142528EC541
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..b..........................i~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
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):264
                                                                                                Entropy (8bit):4.197496566468057
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SvYofrb9llflNDsVMiDVw9qwD/XRH4kgAShkzqgMg:lMrlf3DsSiDVwvTBKAeYq7g
                                                                                                MD5:91B95B3F641DB68B2EA5064F00CB94CD
                                                                                                SHA1:4064F6DC451F380A5BB2C4A9C3E40F36334A06CF
                                                                                                SHA-256:2E051BF296334CE9A0AD71A283FA450A631DFAEB21A788AE51DE568EF5F7BC4F
                                                                                                SHA-512:742EDECC6C599E8759C2FF3B0108794AF2E1634EEF4FF8D9CAA124448B56CF857783F8DED591F943F5DAFB1A409F8EDCAE01540C8AECE80AA933A71E4B9473D3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................6.. ........:...:.........../....i~...a.t...h.S.....b.......B.b...f...|.b.....h...b.r.`.r...f...|.b.....X...b...|.B.f...T.`.r...S.t.f...X.z.Q...Q.D.t.c...c.|.b...................................o.....?...B...E...H.........../.. ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):116
                                                                                                Entropy (8bit):3.517596863677718
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlEFu4g0reqqdquqllnfBiPUiltllvUNClFn:Sv8vxrb9llOPUfmF
                                                                                                MD5:9FF87E06F0477ADD9846CB21A6F6D48A
                                                                                                SHA1:E30CBBA9C4579206AAA1FD9C49D19B9202ABE9ED
                                                                                                SHA-256:FF1D492C6C011BC2638BA171CF8C0894035549966ADD7C448C3BA92BEED3A8C5
                                                                                                SHA-512:BEB9D941C0558852EBD6E8A138C4B13951692A7CAE748645A6AF3147DE7990DC58A813F2F9628D04ECF68A7AC02C592967E75EA54A13A020998AB78C12F5EC83
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...a.t...h.S................................ ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):20072
                                                                                                Entropy (8bit):5.3992671375665084
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:y7QAvrGONYwEEXYYyyyMFPCJTk6MGy4MWb3knQUSu3y4MYM3U:yQAvrGONnYyEJTk684MWbUn7I4MVU
                                                                                                MD5:F7D631020FD45D1CC35CFFA449E96481
                                                                                                SHA1:22BE0657F6930B398E59CB8D502E442191041E5D
                                                                                                SHA-256:418B1A0D22B60FEBCFBD5CD9ECB0EB6A4995302E5668005D9A0007E646598E3C
                                                                                                SHA-512:81F3B7E837BD26BF6744F16C42072B6EC4436CE664FD40A5E75A21C3105D05E0F0A1A4D990DAA945B9841D104D7B10E245473ED80E64EA860675CAA4D662293C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..l...................7.;....i~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
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9159246284584364
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMwlut6E7lI/jbr+0mun:Sv/0t6gIjbrlmun
                                                                                                MD5:7721B72D6E81A0F713A6D57EBE1A013E
                                                                                                SHA1:1FD64BA1FBD011B96B228AD5B67CD376FC57A45A
                                                                                                SHA-256:4D177F2F8CC658D164AAFAD84AFBB372B7B70C61D4A0E6437AC3FD510B8C7167
                                                                                                SHA-512:F3C3D609AE54033E071A5B79C0916896B651DAD135F0030F0DA6CF1886723A04952A4628E9E0CF3E1B3E4C1FBC691468A565545D8B3310B0938ABC7BB0959B4F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):3.254334286211548
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQ6C8t6/xr9Y/lllQ/kF:Sv48or9Y/l4kF
                                                                                                MD5:1B677BA1FFDDEA7E9012D1A6F9F64AAF
                                                                                                SHA1:AD152F308C5AC32B880ADD0678AEADF1474B03B1
                                                                                                SHA-256:75C44C64718E8ADCF2CD8947E2893396F62251659925D521EE3C1B0180A2CE38
                                                                                                SHA-512:D2422E76A21CA4AC6D3844AC51F3C323AC541F9769863ECAD01C029011AA94D7FCA937059836AA6CDAD1E02ECEE7621EFA4FBB4F45E10063BF8FCCBFBE36006A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..1....................1.....i~........1................... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):804
                                                                                                Entropy (8bit):4.276151774117483
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:9VtHbKY8K1t+87cwAeJCKMz28oC/AeXE9lF1EiEoAQg2OrAhLg/yVz2Ol1V:9HurwPxZU/ylO9DAtxVtf
                                                                                                MD5:D29930D26FF025E995FF0DFE3446BB53
                                                                                                SHA1:2A935AF793B83EB754454657DAA3670CD773185C
                                                                                                SHA-256:3B106AA8533E5A35FB91C0C8891C127FE1503D504181E94C3815852641A2CE3E
                                                                                                SHA-512:55C4F57F66CFA0DA1F19ADD01B2D9C53136DE4476E6D502BD31CF65669699D2D69E4DD2ACC0F3AEE9D07DDA2634059AD1B38C6F08D77D2D91882E1FED1FF440A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .t....................t......i~...U.S. .$...m.g.a. .e.u.r.o...R.u.s.o.n.g. .r.u.b.l.e...D.o.l.y.a.r. .s.a. .U.S...d.o.l.y.a.r. .s.a. .U.S...H.a.p.o.n. .n.g.a. .y.e.n...H.a.p.o.n. .n.g.a. .Y.e.n...I.n.t.s.i.k. .n.g. .y.u.a.n...R.u.p.e.e. .s.a. .I.n.d.i.a...d.o.l.y.a.r.e.s. .s.a. .U.S...I.n.t.s.i.k. .n.g.a. .Y.u.a.n...M.g.a. .r.u.p.e.e. .s.a. .I.n.d.i.a...I.n.g.l.a.t.e.r.a. .n.g.a. .l.i.b.r.a...I.n.g.l.a.t.e.r.a. .n.g.a. .L.i.b.r.a...................h...\.*...........................u...........W.....o...................................s.z...........................................................................W.........+.....o...............................................W.........+...o......P...P...P...P...P...P...P...P...P............... ...P... ...P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):21588
                                                                                                Entropy (8bit):4.913817114459423
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:o9x5StOwB5wgb/gz4cIVJBgDN2JCs7jcbyCIdp1lirywHmH:v08o+W4177Cw0+wq
                                                                                                MD5:BA80ED1E570C9C651412B84777A74747
                                                                                                SHA1:20598C7CE0B9A6C0A1DEA1C99D62814AA1D33936
                                                                                                SHA-256:2D35976B2F18F380691F41C9E5C9D8C7464BF1FB748C401BBBEBE2CDD3C1D31F
                                                                                                SHA-512:6B0B9C66A9B7E3A2CB3911F4B765904FAD77D45615877A9BE049375E42BACBE211B9652BA02BF06FB115A94541D3D95197F76F8516882B1A97F8B25D03D1380D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .KQ.........................i~...E.C.U...E.M.U...S.D.R...G.u.l.d...S...l.v...I.r.s.k. .p.u.n.d...T.y.s.k. .m.a.r.k...F.A.E.-.d.i.r.h.a.m...F.i.n.s.k. .m.a.r.k...I.r.s.k.e. .p.u.n.d...T.y.s.k.e. .m.a.r.k...L.e.t.t.i.s.k. .l.a.t...r.u.m...n.s.k. .l.e.u...F.i.n.s.k.e. .m.a.r.k...E.s.t.i.s.k. .k.r.o.o.n...F.r.a.n.s.k. .f.r.a.n.c...M.a.l.i.s.k. .f.r.a.n.c...i.n.d.i.s.k. .r.u.p.e.e...t.y.r.k.i.s.k. .l.i.r.a.....s.t.t.y.s.k. .m.a.r.k...G.r...s.k. .d.r.a.k.m.e...c.u.b.a.n.s.k. .p.e.s.o...r.u.m...n.s.k.e. .l.e.i...B.e.l.g.i.s.k. .f.r.a.n.c...I.s.r.a.e.l.s.k. .p.u.n.d...L.e.t.t.i.s.k. .r.u.b.e.l...m.o.l.d.o.v.i.s.k. .l.e.u...v.a.n.u.a.i.s.k. .v.a.t.u...E.s.t.i.s.k.e. .k.r.o.o.n...G.r...s.k. .d.r.a.k.m.e.r...L.e.t.t.i.s.k.e. .l.a.t.s...M.a.l.i.s.k.e. .f.r.a.n.c...S.p.a.n.s.k. .p.e.s.e.t.a...t.y.r.k.i.s.k.e. .l.i.r.a...u.k.e.n.d.t. .v.a.l.u.t.a.....s.t.t.y.s.k.e. .m.a.r.k...s.c.h.w.e.i.z.e.r.f.r.a.n.c...B.u.r.m.e.s.i.s.k. .k.y.a.t...G.u.i.n.e.a.n.s.k. .s.y.l.i.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):3.309432036254817
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQwl0t8ts/jbr9SIalk/XllQ/kF:SvDut8Sjbr9SIrf4kF
                                                                                                MD5:480B302B096BBBE6CD67C93DDC98F945
                                                                                                SHA1:5328D6007054F6D0B727DBB886BFD1BB9BD6EA78
                                                                                                SHA-256:671A55A822B1D2D1F56D2E86D98EEF4106FE7CC107B42F31E0B5A9163859437B
                                                                                                SHA-512:5C26E8352BD63CA0900CD634DD4A3EDB22E66F2DAC8A9B161EA3B9FA890932D9FDF3A581BF7056870C516A9CEBC50958E9FA56AC22F68ED0983D58C678205035
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~.....&.h.................... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):824
                                                                                                Entropy (8bit):4.816512518857309
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:jLCsLCV+pmdaf7GtwxG9Mg+M/nXHXHCXnE4T:jpLq+rfG9MgVf33CXE4T
                                                                                                MD5:DA2FA9DC69B9D0979A67B83B05FFDA67
                                                                                                SHA1:1DF72F24492345C85D60517BFDE6510CF609F907
                                                                                                SHA-256:3EFF5FFE90F37E814B839016C729F94BAD790BDB1D9D18817BADAEC4DB3407BD
                                                                                                SHA-512:7E1FE92C575D2841CAE95AE8F311F8E2861CAE59DBE0525407ECE7BA80A534A0DDE808944ED4E53CF862364B340E326695288EF02E5B0125A5BA8CE3AB862083
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..h.............:.......X....i~........8....`U.....8..z.....~..8.....9........f.+.....g...j.,9........n.X&........b..&..............\.=...&.U...r.....*...................;9....m.....J9.................&.....&.....{...........&.."..{....Y9....PU...........'..........,............U...........9....9......U.....'.....8..v. U..w..{.................U.........`hJ.`....v..`.5.`.......`.h.`.......`...`.......`.#.`.......`...`:.....'.C.G.c.s.w.{...........................+./.;._.c.o.s.{.............................#./.3.;.K.c.k.o...............X..............................................."...%...(...+.......1...4...7...:...=...@...C...F...I...L...O...R...U...[...X...[...^...a...d...g...j...m...p...s...v...y...|.......^...a...d...............................g...................j.. ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.4062153517900993
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQ4l/3Ncml9br9+laXF:Svvl/rl9br9+lwF
                                                                                                MD5:66C886025C39619832DE32CBBB59C320
                                                                                                SHA1:44C1F5D3E24FD31CF1BF16A57D1E85E39B1A25E9
                                                                                                SHA-256:B3DABA8E86AB757A149C8E0CF1DA466978447DD909D448B3D2C60A26A50516F5
                                                                                                SHA-512:24FC8BF2AF7619D30C4166C009B9184B5A0E20ECF8DC65BAAD815A84D6D29D780A3B0FAC59A9DDF9FE866CEDF74E1C09DB8112868670F1288DD983EC3EE9E73D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...........7.......=.....X..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.212653166597381
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMohxlrr9Srm:SvTr9Am
                                                                                                MD5:C2E9CF2310BD319B0614A1E34A018123
                                                                                                SHA1:87D8CA6FDE7F41B372ECEF50697E05A516E04E87
                                                                                                SHA-256:AB2E5AC853957BED7597A4879F1F589B909D1817747524D566D316EED84762EC
                                                                                                SHA-512:420280371516D51B3EB4EB58C3F387F3A7A492647D165EAA48448017CB619872BE0261175D9B4E49A02A77F7274585DE3372EED95E96B4DA4C564C1BF8953210
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~.....=...m...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):108
                                                                                                Entropy (8bit):3.3360947400379724
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlNtls/slvl/CtUm59lQlvUJiotWFS:Sv1sEP65wlcJiA
                                                                                                MD5:6DE443A230DAD8CE2BFBF7D149F0A3DB
                                                                                                SHA1:71D6E1E95C1A9211A4B8FEF2B99FE16CFDFA78B8
                                                                                                SHA-256:A135770CC31B84370915424ED197BE648AC2932C5705C83C4EE4684228F5FC56
                                                                                                SHA-512:780EB1A30204932390AC442C12181D046FBDDB0A890FCABFE6297E31429CA325248251702216DA1B6CD8E5FE5BC8D7C14BB080AECA7F2D46A67D30A34386A778
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...F.B.u...........G................ ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.3869845825593305
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQ7lMHc5/ar9kJl+lXF:SvMM3r9kr+xF
                                                                                                MD5:8ADFE63A4EF2890A4683B0FD83BDC8F6
                                                                                                SHA1:9848C61B5E1ABBC181DCAAC5684E8215303F5713
                                                                                                SHA-256:6052AF439E8F9B8060E0BEAE1898F522DBA2F576D8312E8333FD18281DF0E2B0
                                                                                                SHA-512:F4BD3C6CEFE2144F98E8CDE00D57C13726C82B6D1B50B69E3980159B8190413BB1EDC6BDE40B856B12B7F336660AA8C2C2EF9AD5B167FF1CAE7B30ACD1901436
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...........K.......=.....X..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):132
                                                                                                Entropy (8bit):3.7798152455379004
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tldgl/cmlplpl/l/d9pnfFPv5Cg4mPPBlF5mfn:SvCl/lp39p3CSPBlKf
                                                                                                MD5:5D286C21C4D15F50FED5F635140F2B82
                                                                                                SHA1:BA2822324A9421DDFCF06E1B22F0B3EE0465CFF1
                                                                                                SHA-256:4BD93820CBDFB828878E5F93A095C88AA28DA86C97156B356C64419182F8E409
                                                                                                SHA-512:CE7D66521B69B847FF0787867B97939FBB162664D44742C5AC2888F2FD7DAAEBC547338D1B35DA814CC157D3988CDE324265A3A46DAC77BC51D99911E5947246
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .0....................0......i~....... Y......../...s............P..=.........X..`... ... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.360495279653912
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQgslll3NcX9br9iMQlXF:SvellSbr9iMQxF
                                                                                                MD5:4B29BE91DC84E7F6AA49B4DA4C713352
                                                                                                SHA1:8FF7934886BC6C413D73ED9346D0861FC727A593
                                                                                                SHA-256:471E0EAA79EB884F8AD830AEE0E90DBB71D23333BFF6B75BBB81D2C07953992A
                                                                                                SHA-512:D0341D781A179CBC793B461E09739F7B942486196174BA2CDD096C77B05D5214A4A1C8A4D8367C643AD72B047260F6A38F99FE62FD6341C27FF9E1F2FF685A38
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...........'.......=.....X..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.424598104200448
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQmMHcvOar99WDqXF:Svbvnr9iAF
                                                                                                MD5:4D60D12FDE7B39B06BEBA187E81F75E5
                                                                                                SHA1:54F37C003820A5BE07BF3854027B5DDC2D1DFF57
                                                                                                SHA-256:74DD8BC4EACBB1639CAB2A1937CAA8450985798B9D4AFFC74AAD0BCBFBA6B822
                                                                                                SHA-512:B8AB2825F2224723C88B7F95A751F780B1BB3D25B528BAACABDCC4C6D393C5C75B49ED611977DD63BD1BBEED04B2D82495E693966E663F4D4EF7BDD6075BFEC5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...................=.....X..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.360495279653912
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQgslll3NcX9br9iMQlXF:SvellSbr9iMQxF
                                                                                                MD5:4B29BE91DC84E7F6AA49B4DA4C713352
                                                                                                SHA1:8FF7934886BC6C413D73ED9346D0861FC727A593
                                                                                                SHA-256:471E0EAA79EB884F8AD830AEE0E90DBB71D23333BFF6B75BBB81D2C07953992A
                                                                                                SHA-512:D0341D781A179CBC793B461E09739F7B942486196174BA2CDD096C77B05D5214A4A1C8A4D8367C643AD72B047260F6A38F99FE62FD6341C27FF9E1F2FF685A38
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...........'.......=.....X..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.4062153517900993
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQ9lsfcfqlnr9Om+ElXF:SvC2nr9OmNxF
                                                                                                MD5:819DCB2F55D6C2EAC0E11F7DB8CA73A0
                                                                                                SHA1:759659B2A8F1686FB974EBF3B21D98C977E1AE80
                                                                                                SHA-256:69AA0DB5BADBD481311E5346E0DC60C9518F579E8D96720CEAA0FFA12DD76869
                                                                                                SHA-512:554DC94B82587E452967CE047F701B2C38DBBBE33309803446EB5CF5D2FE404B1445D33EEAC8E73F0BA8C36C706E90FED60D8580EE055B428317A35370852557
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .3_...................3_.....i~.......2_..........=.....X..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):244
                                                                                                Entropy (8bit):3.8405147762768803
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SvDMKtwnr1pqMXn+lDopqMyl++lDopqMyl+i9XnAqX3EPBlO:SLMX+RFMuRFMy9XTHEbO
                                                                                                MD5:19A24A4CCB8FCD68C5326FA45213036C
                                                                                                SHA1:93EDE1CC01DF2F24966FEBE20AFE18364E912152
                                                                                                SHA-256:83CD4BA3C9A6CFC7E610F2F2A39F8334CFC24D6DF152DB81BDBD773F675CFFD7
                                                                                                SHA-512:7FFA3B70F684F1FD279D977CC1440F5A9546984CDEE92864C7E3B9C7E7034B6CC73453AFC20E4E22FB7F410FC69108C45E31FA37DA9AF427345662819474B2EA
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..Y.....5...5..........Y(....i~...S.t. .H.e.l.e.n.a. .P.o.u.n.d...S.t. .H.e.l.e.n.a. .p.o.u.n.d...S.t. .H.e.l.e.n.a. .p.o.u.n.d.s........Y.....Y.......Y.Y......2.....{.....5..P8..P..=.........X..`(.. *.. ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):132
                                                                                                Entropy (8bit):3.748616647997833
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlw8+mlplplqlOm9bnTVGa9c0uqqeg4mPPBlF5uf:Svgsp+cm9bBGa93BSPBlSf
                                                                                                MD5:0F8AF8AFB2EB884C5B3F64D61F543A65
                                                                                                SHA1:9CBA67BF10742A50E14117FB13460A5B4E863FC1
                                                                                                SHA-256:BE85546033229C488F2B5867D698B7784C34BC0E01FFE5BF5A6029A711ABE843
                                                                                                SHA-512:52B8EB0956338068B7ECD501D169DD4729356FF4034AA5AE80FE8E34F62A31292A1D531F1A0C6B0E950F9844AA79A33E0DD21E3A4F61FB0B7719CC692CD107C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~.....\.Z.......c....................P..=.........X..`... ... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.375012347003209
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQq2/tNcoul9br93EXF:Svhm5u7br9eF
                                                                                                MD5:2DE5D922F65B17331E3A9686C9016EB2
                                                                                                SHA1:FEBC918CAB9ABCAEB9A56B1CB19097840164CD4B
                                                                                                SHA-256:37FB4759AC2A243D5A496F89ED01434261F009AF131D7BCF3F1FE321CD30E1F9
                                                                                                SHA-512:15A3C4C15D82F0D2463B5AC8066EB3319F18D07BCC9514B807FD3B7D34DF31E99913E48FBCB2AB97350554E8B82D4D381780C0ADB248946DE739A48C8B5CE1E0
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..X....................X.....i~.....F..X..........=.....X..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.36775381332856
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQn2lll3NcRq9br9hvSXF:SvFl/39br9hwF
                                                                                                MD5:9DEDE71A7BA5D19B8E38F49D57C7A61C
                                                                                                SHA1:BA138185D4C22786931D18CA8A26A47B5B0EC4BC
                                                                                                SHA-256:94F002D9121FF120FED40933720C76CC0DB5360EE1FB53AD4F0CBAB81F715D47
                                                                                                SHA-512:528E2AAAAC5F7532A5EABD8626A1EF06B7DFD287BB951D691BF509F3F1B15BB816C03AE8E3FA9A6A4C3C8007BA34CB415CAE767B44B281B591377CDC4203852B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..~....................~.....i~........~..........=.....X..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.212653166597381
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMohxlrr9SF:SvTr9y
                                                                                                MD5:43351F1786026F7875F9B7FD7E906670
                                                                                                SHA1:D0EF80B1795FDBB1C1DC1CDF45A1574301DC9A3B
                                                                                                SHA-256:40747E88F5C7C216DD4F4EBE5034AC39E2DFC8F4DE75E2DDA34644C3F669B043
                                                                                                SHA-512:1EAFA0352F0559F3E97A98924E30C7B29994C3CBCE02F435E650BEA424DD5A89DF09BF6D08CFF19CECC32AD126BBACC15B8A36F4B63939DF4EA2B816B0C6FAE4
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~.....=...X...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):132
                                                                                                Entropy (8bit):3.748616647997833
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlw8+mlplplqlOm9bnTVGa9c0uqqeg4mPPBlF5uf:Svgsp+cm9bBGa93BSPBlSf
                                                                                                MD5:0F8AF8AFB2EB884C5B3F64D61F543A65
                                                                                                SHA1:9CBA67BF10742A50E14117FB13460A5B4E863FC1
                                                                                                SHA-256:BE85546033229C488F2B5867D698B7784C34BC0E01FFE5BF5A6029A711ABE843
                                                                                                SHA-512:52B8EB0956338068B7ECD501D169DD4729356FF4034AA5AE80FE8E34F62A31292A1D531F1A0C6B0E950F9844AA79A33E0DD21E3A4F61FB0B7719CC692CD107C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~.....\.Z.......c....................P..=.........X..`... ... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.4438288734312166
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQAcCnr96gX+lXF:SvBnr96gXwF
                                                                                                MD5:8ACE823D7120F17D44DC8087C868375D
                                                                                                SHA1:249F56849ACF7729A97E12BDD10BBABDBCEBFADB
                                                                                                SHA-256:9AA37AEE2850A9441912D00F6E616F8D43D2BE529DEEE2C2C55C847B84A29942
                                                                                                SHA-512:1278EA7F6111524137ED7EFEC7AEC3AE6655F695590EDCBEDA6CA15D879F029867D9C74233BA155676490429982C072A73C02A8294F431235FEB57E1D182BA84
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .K....................K......i~.......J...#.......=.....X..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.394243116233978
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQQscEar9EksaXF:Sv+ar9EkswF
                                                                                                MD5:BA94F370052DB09825F99DC21C13A818
                                                                                                SHA1:F7BC0A8C9635D066FAE0115788DDE43DA3ACDC33
                                                                                                SHA-256:7E1293C620A4A3D213DE5E1DC26A96A20220D67089F44560FD7BF4427A53B647
                                                                                                SHA-512:23CF1673391B14881EFFA4E64E5F8E50B708371B94702EC5A47275BF74B4E969CA1F0C096CC3A1125CBF3AC8A146846C44EAD4B0629C693DFC8B83AE0199E97A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .y....................y......i~.....).x...........=.....X..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):88
                                                                                                Entropy (8bit):2.683594117260545
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlKelBjlgljl/daAOklr:SBtkJTl4Pokx
                                                                                                MD5:30216BD52DB9E5F6903C7D289F9EA3CF
                                                                                                SHA1:32764706890683BDD4418636CFCDFFA3441E0F2F
                                                                                                SHA-256:C7A5FC96F44A5F07D49ABC3329850B4F96F009A155841DEF1608458ECDF8DE25
                                                                                                SHA-512:86FCBF850BFC0BAC769B0BFC0D52D55D1AD4EED7FCDCE22E01603479FC263CDAF2D81066165E2B7654035862569D51C4E538723844713EB2DEF30A45CA428CDC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~...e.n._.V.U.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.212653166597381
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMNsbxlH/d9SrJin:SvUu/d9Asn
                                                                                                MD5:B47E9660FE30618F88039419C8475F23
                                                                                                SHA1:7F17666DC08D5983D42E4845520CA1CBC4088338
                                                                                                SHA-256:7333C0831AC0A4C4D05C97BC62933652EDDA4990B3DB1639F12667FC667CDE3E
                                                                                                SHA-512:950310ACF817E4C35725969FFDD8D30B358806C1B0C992BA01710EFE2F032C48DE7AB5238904363AF8F49C5DE864BA7367C3A1AE222A29B57C5F5AFEA51B729E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~.....=...m...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.424598104200448
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQmMHcvOar99WDqz:Svbvnr9iS
                                                                                                MD5:05C3D8C04759ADEECBAD23C2BDFB0F38
                                                                                                SHA1:391DFDB927C9E899D03E36E4194CCCCA7BA0A49C
                                                                                                SHA-256:6B1389234982B98E25ECEDDF46CDEE506D0CF54262C4A939708642C6B1D7126D
                                                                                                SHA-512:46129707EC0BE21605331CF8356F7D744548E21F9199B8D0F4986916EABD9BB41365022FD54747E6655C1424AD2BE53503E2382FA5027F350D92993DCCEB463E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...................=.....X..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.424598104200448
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQmMHcvOar99WDqdn:Svbvnr9io
                                                                                                MD5:B883698CF77CDB996E857F341B1C9BA1
                                                                                                SHA1:CD942555047C2BDEA5D6184C02FD9A32490A17F9
                                                                                                SHA-256:DA890EC860D17697A5617E9A5C14FC440C3B2F09B676A55CA0D9E6A0C3470777
                                                                                                SHA-512:AF5CAA818857C18DFE92AF5F3E150BCD9B2CB6E93623C4785826936F0FEC440AC58BBEB1EFF3ACC3F2C6BAD46D37670422EF9D738E1AB61605744F8585AAFA14
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...................=.....X..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):112
                                                                                                Entropy (8bit):3.559288179865805
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlr6slzbmxrVNlQlomluYS:SvGsluxrVIomm
                                                                                                MD5:726CEF86D8C1B011252C5A66A94BA04E
                                                                                                SHA1:D1EC906BEF4E91022BEC578868CC45668BC8E739
                                                                                                SHA-256:DF8AE86A8D5419C01E79CC462744E59AE4C49EAE6E4644D1BFEF6B5E32AC87B2
                                                                                                SHA-512:403E51D974D5736494B105A3F1FA2E0FF1500A2CFB39D8D9C0FD31009B553DE19522CA9A17FA61FE5B21DDBCB1137202090BAF6621F579A8F394F5BE22485445
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~.........l..`...`..........=.....X..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.375012347003209
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQuslltNcRcMbr9yDklAll1Sz:SvsltMbr9QkilI
                                                                                                MD5:FB4EA48950E7CC41BD80093DAC47DA67
                                                                                                SHA1:5BB6736C1A64ACBBADCC4BA5C90BC0728D75AE2C
                                                                                                SHA-256:0271DAD13365259EB62E45A6256F72A7066202FFD4C2918EF1CBAD3666CDEE4C
                                                                                                SHA-512:E22A79683B03A57AE09EC7D7853DBA93D89E659649EFC33366418C2922BF478745F4C5C2FBDF3C989BDF334E41A22A5AD6A81AA730468798FD0F40A88A3856DF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .1f...................1f.....i~.......0f..........=.....X..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.212653166597381
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMNsbxlH/d9SL:SvUu/d94
                                                                                                MD5:D6186AF2D25663529A1670149401C51A
                                                                                                SHA1:CC73AAA889E5F7DA2FCED52A80448C64C5756A9D
                                                                                                SHA-256:C3DD2043CDD9A4430624CF43FE1D7C65938E1A6D029ED3EE2632796A8D4ABB5A
                                                                                                SHA-512:C94E2E44C785414BF4894CAECE699225411498CAC344F761A8A047A4F82C15BD26D9F78834D515264805ED6454BCB3EF05E7E622E241F2E2C9678CDD0376CE31
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~.....=...X...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.4412840416380397
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQa2/tNc4ul9br9PsnEsliFqle:SvRmJu7br9PsXIH
                                                                                                MD5:27B69829128A9AEA476CE90876BECA03
                                                                                                SHA1:8208E75E95D0CC4A2035BC668C91B576B4562521
                                                                                                SHA-256:13641991A8FB83034EA5D0FF316CBCF6281F0C28A7DAB5C5BCF5C883AC9352CC
                                                                                                SHA-512:357D5D189F2540D7826C520C26228891967D46D4F8AE64EAD47C1EC4306CE05C4EB147A6A168043590BC98E6E9C4567B2E44E2476A771FD4A989A87BFDA28389
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..X....................X.....i~........X..........=.....m..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.4330652630584884
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQaCFcwutxr9orz:Sv5Crufr9o/
                                                                                                MD5:12C3DF8B34F6047DC34F8A9CF0ECA3F6
                                                                                                SHA1:795C14C238D93EA6A66DA60AFFDE3FB123397ED8
                                                                                                SHA-256:BAE05A5C78161EA471EF68C780B785397BA658757C6EEB1F336844B3AD70D0B0
                                                                                                SHA-512:D0F677BAFEF78B121F28CD6B82F9AA91AC47196886115A6D27F747FBE7F1F8E3E611E0C2F673F6D055C53628ED754EB9D1D4BDE169E67CDF4FFA2E1C86CF349B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~.....D.....;.......=.....X..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.424598104200448
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQmMHcvOar99WDqz:Svbvnr9iS
                                                                                                MD5:05C3D8C04759ADEECBAD23C2BDFB0F38
                                                                                                SHA1:391DFDB927C9E899D03E36E4194CCCCA7BA0A49C
                                                                                                SHA-256:6B1389234982B98E25ECEDDF46CDEE506D0CF54262C4A939708642C6B1D7126D
                                                                                                SHA-512:46129707EC0BE21605331CF8356F7D744548E21F9199B8D0F4986916EABD9BB41365022FD54747E6655C1424AD2BE53503E2382FA5027F350D92993DCCEB463E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...................=.....X..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):112
                                                                                                Entropy (8bit):3.477119983253645
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlfFzbiMXpreNQPsihMYVS:SvVXpKN9BYo
                                                                                                MD5:36BCDBB7F2D4F58E9B7401E1F1384F9D
                                                                                                SHA1:2A18EB208FE57FFEA76980870D325DE35E6926E6
                                                                                                SHA-256:283CCD85A7189582FA49525D1C8F066B0596DE4BF24E1D9772206FEF06804064
                                                                                                SHA-512:E477A781AA3FE20F274791DD67868920A3B5B49930AE7BD891350E2C2D341F45156DE2A46E296EF69B1ECF2E7D3A8FECF4645D347F2F7FDEAC39114E36641B3F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .i;...................i;.....i~...V.T.....j;h;............=.....X..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.4485425753126884
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQL/tNch9br9Qkl5/slz:Sv4Sbr9j5EF
                                                                                                MD5:62E083A9E3C1BACD700A6095B3A14810
                                                                                                SHA1:E3B3CE33AE8DC6F6F5BD38BB4836B3B4300417D7
                                                                                                SHA-256:5FAC493F3A9915B55444A4943A346A8A1AEF6604AC3F104BEBBA498BB040F050
                                                                                                SHA-512:729FBBE9264445DD32DA3C3F21A06A60481AB4363469B4527496BDD9184E909615F5472284C85C1BA47633E5E851DEFB51DD95F9701EEA2F1DEC9D0EFC676276
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..(....................(.....i~.....n..(..........=.....X..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.405367334969678
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQxNcL7br9D/slz:Svz7br9DEF
                                                                                                MD5:5DDA0B8154CBC304A15D4F511F049B3A
                                                                                                SHA1:591C8A22B0328F5A5052CCF6ED1C818E258CC3AE
                                                                                                SHA-256:81029AA2C6FE3B71B79E3CC25D826A0FF11778E58F53C2CF7B278ED9816B4EB4
                                                                                                SHA-512:E38D104DA53639A1299D752FC52AA7D5E0F896EA33DB4C86CFA80466F8C09B2C04BFCF02FBCD9285DCC3EE7B43B5BBD03C49A04827B243D121F7C225893AEC57
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..~....................~.....i~.....l..~..........=.....X..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):132
                                                                                                Entropy (8bit):3.7970284625854323
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlVmtcmlplplTlr93ldkwll1hl73l7jDAslF:Sv8tlp993lmw9zDlMEF
                                                                                                MD5:3CAA273CCC454EE69A3C91F94E11C29E
                                                                                                SHA1:24A54C7DBDC89A6DB85BCC2C959E3131C21A1281
                                                                                                SHA-256:A28EA23FC85CAE42EACA4678CF0342A038FF39CCCDFC65FA6B7AB0CCB7ECEFFA
                                                                                                SHA-512:6C2625B29651E4B240E111B5095F49706C7C110DAC6CB8EE3CA39D02A5AF6818C6D7F6BA5D17F0A6B7CC52619017B927A8A308C47C8398E0A75EA8359039D328
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~........8..........~...#.o.............=........._..`... ...P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):120
                                                                                                Entropy (8bit):3.7082150446225457
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlEFutrpll8lC19VkkXUBl1hlaY1ozS:Sv8utGlC19OkXU5zaY1
                                                                                                MD5:5F1014D7784FE3BFA8417EA8D7B4C247
                                                                                                SHA1:E22EB6BFFB5CCF95989E4982AEC7F02F009CAD19
                                                                                                SHA-256:24F545236E1C6BF5D62A7C62C194BE99AD7D4EBCF3C5681B5FC864A2EADD3172
                                                                                                SHA-512:166B8F926FDD69F9F73E27FE75151E1CFA0270C939FEA7A05DF1F325976A17BBEE51EF21DD49B74DC0B0481644FF9B2E1907A0EC637CEE16255E1DCB8AA95056
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~.....f..U..........o.............=....._..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.4485425753126884
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQUt9cWlnr93sKk9SAp:SvDt95r93I1
                                                                                                MD5:35371BB3EBCAE55EC196350C1C608F4A
                                                                                                SHA1:1BB4EE0D26E57059FCC5D32B5A114753B480921D
                                                                                                SHA-256:33301B54393153E40A050A5819DCAD5078D4B4AE9EB7E1CA906E7B05F0DF1D23
                                                                                                SHA-512:C4159219F10DC6FD4ADED5F194A5EF1BB7FDA7ADB508F063D989A52DAF51C5F6B47C737547B7BFC665456E478B5175F4A7AC1BC17A22F0F31487A4DCEF8AE320
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...........o.......=....._..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):164
                                                                                                Entropy (8bit):3.8935098827237504
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlErzmxrOZWpAlWllllK6BnoIF7nF5Y8q3x4k5w2lM9slF:SvamxrppAMPK6aIit3bah9EF
                                                                                                MD5:7CD5AA960C6BFB7C8FFF96CD2D315564
                                                                                                SHA1:F14D9F0E0454A6CAEB6D4D2EB20E5DF4D6FCBC63
                                                                                                SHA-256:F48A782BF243A05698C41EBDCACCA858262DAD9A17761D740756AC69406E0CD2
                                                                                                SHA-512:BE9283EA427E4F9C0F7FFEDE8F2A537918BDF8DFA9E434B703DEBDDE98CFCCBD6FA98DD3B1835E255BEC85DA616718325F33EABF6A2E8B51B3736D34A1167BCA
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........!...!................i~...q.u.e.t.z.a.l.e.s.....L.....................................P..=........._..`... ... ...P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.4438288734312166
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQcmtNceeOMbr9EpqAp:Svzmr/Mbr9Et
                                                                                                MD5:A5C60D56F43207237479BE610F5BE0CF
                                                                                                SHA1:1AB7587C63ADCAFEA047ECFBE6C377019D41053C
                                                                                                SHA-256:A56D216132D5352D4A1012A54C73DC18783EB2DEE6FDB425D6223B232A003875
                                                                                                SHA-512:A6F25D17150EC39A9A55E50E44FF1772E34B581B55008C3C740B13F1E4086315B1DFD5039D52922F1A613A2A2B03FFC5915C37A0C4195FF3E6923F6B70F50673
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...................=....._..`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):112
                                                                                                Entropy (8bit):3.4168084876986144
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlCextbxrsS3hY1ohXF:SvSexLYc
                                                                                                MD5:6F4C386E2317A667B4C3EF5CFD97D309
                                                                                                SHA1:1AD06427484402B86ACB7EAA010ACBD9F52FD337
                                                                                                SHA-256:7B5820ADEEEF375B97F582BC21A64B4B804CD1BD9220F6A0E263C54BEB4C9CF8
                                                                                                SHA-512:82AD316C884980798B73F4E7C6DA2F81BB7E201E8FFB54F8DBA103C705EED2B0905DA619ACCF36D8233CD2DFE6FE1E39ED66C1963505117CA07702EC59F03AB8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .4~...................4~.....i~...S./.....5~3~............=....._..`... ~..`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):512
                                                                                                Entropy (8bit):4.772456815902694
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:7RJOmy5z+8sc+8s+IGzIVIcm2ZsOI27kAvH3rNBF:emk+Vc+V+Zsmqxr3rNz
                                                                                                MD5:0826A2157AE706C4A6A968E592F14FB2
                                                                                                SHA1:BC8A32BD1C15429DA3E1ED6CA5603F85933AFD36
                                                                                                SHA-256:D56C9F54B84F30BB7ACD65DABB8D2EEA8A835A48AE4C0394CCAF73E9799C44B0
                                                                                                SHA-512:6454ADB3FB79C677134946E2866BC5B8CA68C6046BFA2C07DF8B8E2B5590AC18E204C4243DE66DC9FACE666E8AC49EB129BD597401228DB993FBFBADF1C15E76
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................p.. .|S.....x...x...........J....i~...b.a.t...b.a.t.s...f.r.a.n.c.o. .C.F.A. .d.e. ...f.r.i.c.a. .c.e.n.t.r.a.l...f.r.a.n.c.o.s. .C.F.A. .d.e. ...f.r.i.c.a. .c.e.n.t.r.a.l........8........N...........Z.................2.........+.7.{.\..%\.\.,......'.................................................6..`.L.`....+...3.?.o.w.....E...H...K...N...Q...T...W...Z...J............S.`.S.`.........L.`{S.`........3.?.w.......h..Pk..Pp..Ps..Px..P}..P[.. _.. ..=........._..`M.. ]..Pc.. ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):27996
                                                                                                Entropy (8bit):4.614504697030006
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:JixwghJkN9+1vaogHqIKFhHUj7Wet0OueGyINABb0en3dMN/0DJaJo+mKCFsoGsQ:Jl79yLH3uuAi7pPRpF+BvmSQ6866XMgn
                                                                                                MD5:ED7C6D771A4BABCA93BC6422C1F35913
                                                                                                SHA1:526ACC093266F03C969A4EBAF0820F06DAB18C18
                                                                                                SHA-256:200A825E3A04F4870E89FE87396ED8D4F07D7886180E856D0AE4E2D4F52C7DF6
                                                                                                SHA-512:B5701D0C817816C89B4489167AFF08DD2AAF9BBDE54B1857DCB30430AD6C7ED5E1F5259D44C45E199C2A38A5F81FD067E6B21863E34A003EFE3EEC896EACCF37
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................G.. ..b.....O...O...............i~.......e.k.......h...b.e...k.u.l.d...e.k.....d...e.u.r.o.t...T.a.i. .b.a.a.t...p.l.a.a.t.i.n.a...I.i.r.i. .n.a.e.l...L...t.i. .l.a.t.t...T.a.i. .b.a.a.t.i...L...t.i. .r.u.b.l.a...G.h.a.n.a. .s.e.d.i...H.a.i.t.i. .g.u.r.d...L.a.o.s.e. .k.i.i.p...L.e.e.d.u. .l.i.t.t...M.a.l.t.a. .l.i.i.r...M.a.l.t.a. .n.a.e.l...P.e.r.u.u. .s.o.l.l...S.o.o.m.e. .m.a.r.k...T...r.g.i. .l.i.i.r...U.S.A. .d.o.l.l.a.r...I.i.r.i. .n.a.e.l.a...L...t.i. .l.a.t.t.i...P.e.r.u.u. .i.n.t.i...p.a.l.l.a.a.d.i.u.m...B.i.r.m.a. .k.j.a.t.t...E.e.s.t.i. .k.r.o.o.n...H.i.i.n.a. .j...a.a.n...K.o.n.g.o. .f.r.a.n.k...K.u.u.b.a. .p.e.e.s.o...N.o.r.r.a. .k.r.o.o.n...P.o.o.l.a. .z.l.o.t.t...S.a.m.o.a. .t.a.a.l.a...S.....r.i.a. .n.a.e.l...T.a.a.n.i. .k.r.o.o.n...G.h.a.n.a. .s.e.d.i.t...G.u.i.n.e.a. .s.y.l.i...L.a.o.s.e. .k.i.i.p.i...L.e.e.d.u. .l.i.t.t.i...M.a.l.i. .f.r.a.n.k.i...M.a.l.t.a. .l.i.i.r.i...M.a.l.t.a. .n.a.e.l.a...P.e.r.u.u. .s.o.l.l.i...S.a.i.r.i. .z.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2956
                                                                                                Entropy (8bit):4.406725586917464
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:CnrX51pSqfDsOqQOzyLIi1qVkABdmg0rXNINLIsgl+EtrDVEb4DVCktMcocsdqdn:CnDNSiQfzyLIi1qVkABAtisQEtrDVEba
                                                                                                MD5:EFC42652F7B90751789113B87FD388B1
                                                                                                SHA1:223811661ABA35BFD654380275908215D7EF8366
                                                                                                SHA-256:A921EF4BE3B6891E69ABD1196B4EBC7DA7BA6B66A9E52E236292735D6EA9ED38
                                                                                                SHA-512:C96C038DF51F289EC0990E93B20B517FFAA5226DFC81259D58D1B874871097CC0EE8FA2BC522BF9477E34919C317A18BCC792D830C34D73D23B0E1D3C998243B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................:............i~...Y.r.....S...l.i. .y... .G.i.n.....D.i.n...r. .y... .L.i.b.....F.Y.l...K. .y... .S.u...s...R.u.p... .y... .M.o.r...s...T.z.e.d... .y... .G.a.n.....D.i.r...m. .y... .M.a.r...g...F.Y.l...K. .y... .K.o.n.g.o...L.o.t... .y... .L.e.s.o.t.....R.u.p... .y... .S.[.s.[...l...R.u.p... .y... .[...n.d...a...S.i.l...K. .y... .K.e.n.i.....Y.[...n. .y... .H.a.p.T...n...B...r. .y... .E.t.s.i...p.i.a...D.i.n...r. .y... .T.u.n.i.s.....D.o.l...r. .y... .K.a.n...d.a...D.o.l...r. .y... .N.a.m.i.b.....K.w.a.t.s.a. .y... .Z.a.m.b.....L...v.Y.l.Y. .y... .S.u.d...n...S.i.l...K. .y... .S.o.m.a.l.....D.a.l.a.s... .y... .G...m.b...a...D.i.n...r. .y... .A.l.e.h...r.....D.o.l...r. .y... .L.i.b...r.i.a...F.Y.l...K. .C.F.A. .(.B.E.A.C.)...F.Y.l...K. .y... .B.u.r.u.n.d.....F.Y.l...K. .y... .K.o.m...r.i.a...F.Y.l...K. .y... .R.u.w.a.n.d.....F.Y.l...K. .y... .d.z.i.b.u.t.....K.w.a.t.s.a. .y... .M.a.l.a.w.....N.....r.a. .y... .N.i.h...r.i.a...P...l... .
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9159246284584364
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMcmt6E7lMUMbr+0mCn:Svwt6gmbrlmCn
                                                                                                MD5:A60E02569784AC9D5C76E3021322C822
                                                                                                SHA1:471960A6448F26BF0216F28F071E3860F1D6A271
                                                                                                SHA-256:338496AD90DF4581131F024DD945F5D7455F0B9969EA0C924E9F1BC142083B18
                                                                                                SHA-512:A2D57F8EFBE4E5D0B50FAF54C6C44CEECF0ADE4577872AF3CACE9DF64D1733A68325494694B03E3517877560BF12CC124F662AADDF8C1F68B97862E75FC0CEF2
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):3.2245297862980866
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQBC8t9llUar9ctl7XllQ/x:Sv98sar9ctlz4x
                                                                                                MD5:4A4E3D003D05BB8B278D0482597BFFC0
                                                                                                SHA1:EF4D6632CB69E3D5ED90CD095966880CA30BC12F
                                                                                                SHA-256:DABB9431C7A2E8250BE1B94B959ECA790C62490E5C5AB82CA5F0381940A491E0
                                                                                                SHA-512:684EF0B3E3B83A81EF3DD71CFD1384D0FBD8EF842E69800D5B9DBDA0E6E38772068C4C756E576FD7CD72EB220BA01FDB535FA94A6C756D2B4C93E6C90465D6DB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .%....................%......i~.....F.F.................... $..`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):3.2054117237913244
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQc8t8twUMbr9eFXllQ/gn:SvGt88br9y4g
                                                                                                MD5:1E989F3CEB870F9ACE7CDB1C12459DA5
                                                                                                SHA1:C78A750241DCB7EFE69760BF84347A0C68A101E5
                                                                                                SHA-256:FB43E042B00EEC2D254953C37E777FE897084789DD9C3DED684D25402E419AEB
                                                                                                SHA-512:ECBDC7549C704B5D8C2155497CA88B060F9681F909FB9C72AC7BC24127FEDDC299E07C2E5739A21CF25B23FD900C04DCFCBB3069E1418FAA4C5179B224E86D7B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~.....A...................... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.463875210299606
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/xr+yhll:SBtkJ1li6gml/xrjJ
                                                                                                MD5:C64F71AE20060954B9E32C5B9DA51C65
                                                                                                SHA1:1E33967C51E09874F6A1DE9A9C3539DB9CA82A63
                                                                                                SHA-256:1F132CA885D786C508137E5A798DCA175FDD0D486A134931FCC3803DB934B735
                                                                                                SHA-512:CAAAD60303A93E38E881D7FC3C711D7A52ACB59511A65BEE549193067F88B870BFF2DAEBDDFAE6D4ED366F93D3D7003EC5B0AC13890B9187F9A37D2BE8831D17
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.897999040607968
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/dZmM9s0S:SBtkJYlU8g8l/dZmis0S
                                                                                                MD5:18812932A15AD38E6B9A8F570566656B
                                                                                                SHA1:405A965EA0765E855D77FE0C6EA7191E46CE23B7
                                                                                                SHA-256:62C7A572C1EA458431FDC9F85585CE9113EE58B11A5340A7C567077BE20E9A0D
                                                                                                SHA-512:4FFE48BF81A068FC2979A3A275263E1041C71F86D29EED05DC4CE79C81F42BF29D6B2837F7205DB0C4DEEF7EB8974E585EB405AD605E2EDCEA9B7F2F99286C46
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~...f.f._.L.a.t.n._.M.R...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.917999040607968
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/dZmMd6:SBtkJYlU8g8l/dZmz
                                                                                                MD5:9C62F30A229149AC950F1786FB0D529A
                                                                                                SHA1:1A2B897218A0E117C4688552FDA7DB0810979785
                                                                                                SHA-256:623EB91E2BA74412CFBC5C2F849173566557BDCFB4E37C81CCEEDF058AA1025D
                                                                                                SHA-512:DA73A2038E6D8A938FAF656EDB8301D21270573F3C299C523780A096B9D42821F8417988BC89811CE267A3B43D2B9B6A411D672130200DE44FE212D92B7CC30D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~...f.f._.L.a.t.n._.S.N...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.463875210299606
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/xr+yhll:SBtkJ1li6gml/xrjJ
                                                                                                MD5:C64F71AE20060954B9E32C5B9DA51C65
                                                                                                SHA1:1E33967C51E09874F6A1DE9A9C3539DB9CA82A63
                                                                                                SHA-256:1F132CA885D786C508137E5A798DCA175FDD0D486A134931FCC3803DB934B735
                                                                                                SHA-512:CAAAD60303A93E38E881D7FC3C711D7A52ACB59511A65BEE549193067F88B870BFF2DAEBDDFAE6D4ED366F93D3D7003EC5B0AC13890B9187F9A37D2BE8831D17
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):108
                                                                                                Entropy (8bit):3.354613258556491
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlPllmslvl/etd5blHcd3WbS:Sv9/P25q7
                                                                                                MD5:EDFDD366A4DFFAD79CFF45EF6FCFB82A
                                                                                                SHA1:451163F2EBE883DE81408F6BBA915289B41BA064
                                                                                                SHA-256:D364DA1D51DDB165BE99BD14E24A5FEF6F3D31DC9DB124A37EEE96A5AF81022F
                                                                                                SHA-512:852B989E9F9CBEE6BC33D85545D0C199AC719B3DD905DD6AA02390142442957579CCE98D6DC350D31DDA70D5D72DCBB0EF06AC6E74AC9DDD025F302E40997653
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...F.d.j............................ ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):3.2017664440253215
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQLt88tJlllxr95Ulaa/lllQ/e:SvU88Dfr9Klaat4e
                                                                                                MD5:F8D80FD6868C07AF457898561E8F4C3F
                                                                                                SHA1:AC8103B233797E1A85F5FB788E3082488FB589F3
                                                                                                SHA-256:F42501F923C7700F356F3B652F854C6E2F464050FF83BBEDDFC359F5A02B1465
                                                                                                SHA-512:FD5F4532C3DA8BA1340A7CB5E946D1DA126BDDA7D4F0EF11014A865B37B16FF6603A487DF2998E8BB8AB2693BBCC5CD4B4BF2EFF7BDCAAAAE5A3D7A40FD86F4C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...........................i~........................... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):3.320723765282722
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQQC8t8llxr9I/lllQ/e:SvnC8S/xr9I/l4e
                                                                                                MD5:9B935877F813A2158ECC72B3081D68E0
                                                                                                SHA1:74F80FE301B832599BB9CB2C6F6D4BD364B45FAB
                                                                                                SHA-256:764184F3C340EA43C47DBCCD57EC8B19CAA26716E9357ACF537D701828C11E23
                                                                                                SHA-512:F3EE16A8A81EDA40C58298D56BC54AD542E36FDAAACC13A7BE1FBC960D1FEA073BC05F632E598693FC0A90C6B347DA2DCA45347A03F7EBC5595F96152C4AFD01
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..J....................J.....i~........J..;................ ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):116
                                                                                                Entropy (8bit):3.518319734704497
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlEF1WyX9B/foEPPk/rlt/WbS:Sv8wyX9uEU/x7
                                                                                                MD5:3719864E845355E3AC1AF00991891781
                                                                                                SHA1:FD147748238B438580FFDCA88BE1CF56B77B90D4
                                                                                                SHA-256:32F686CBD6DE7F4FF7DE32E9F27DF09C1AC6B8DF5CF3B83104A2D9A4310B19D6
                                                                                                SHA-512:BE93B370190DC51B912E5003CFB621A1632BDACDC6902BE466C0E2765EEBAD593107CA1FA11AD3F3EA9FF888D33FEB5804DA044A1B265EFDAAEFDD8C25C60C9E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~.......*J................................... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):3.305626015239453
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQ2lU8til5r9coclllQ/e:SvhlU8Al5r9coi4e
                                                                                                MD5:A6F612B423C5B86E264AA30697698016
                                                                                                SHA1:2E92ADD395C97940B342A4C838119CB26A379DDB
                                                                                                SHA-256:F56D1903151E6996EACDA571FCAB55C0A3B2EE8AA47197E1FB830D621404B116
                                                                                                SHA-512:2B2D995CF082B00A0B2FDE045C355B5E1ADAC2651B190D9400BFD0F356F8D4BBE8E3564DB1B115F4012AE82CD1F19BBACF38E9154EA642D2E63DF44C2A1C4E4D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..<....................<.....i~.....S..<..K................ ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):108
                                                                                                Entropy (8bit):3.3743856528799516
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlH/sE/slvl/vlrpzdk4hf/WbS:SvnEPFpC4v
                                                                                                MD5:C63F4F940C5BFEAD79B829A247416BE8
                                                                                                SHA1:4BDA3981C9AA407683E9117C9B5FAE57781659F3
                                                                                                SHA-256:591276400E07155857ECE28AE494590F0AB31C4E4867819004B6A30A4F279872
                                                                                                SHA-512:4130A1C0ED4A9F09366C343A243D250519ADEB75041DBB9CFC939E559B231BC0AED92D47E436A84CEBE42E6AA1CEABCCA951A6466DEEC7E8B760128F79573681
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .q@...................q@.....i~...V.T.....r@p@..................... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):19300
                                                                                                Entropy (8bit):5.000586913903977
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:BELRUwy6FqW5aSpszoLYsTrqk2rhMdrNHAkfAQ968lh/y4j4wLiBTyqrx5:wVpszUfAQI540w+B2qrx5
                                                                                                MD5:82FFC675162421EEDB1B596B8E01CCAF
                                                                                                SHA1:2FD40735088CF2E3369FC7ED0A622C3FA5F5AD1F
                                                                                                SHA-256:7D654883517084A91A74FF12C31DFA634E14956F5AB057F6B37B4AA2DDE7A20A
                                                                                                SHA-512:A374086DE168A47028AE98BE7491519739CA632184E2501EF729A9FC4700189001754A1B241E94A5A44864B52DADF8F5AFDD1E38842BE5E19A82461DBAE242C5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..i..........................i~.....S...S.i.l.b.e.r...B.o.l.i.v.a.r...C.o.r.d.o.b.a...S.c.h.e.k.e.l...D.D.R.-.M.a.r.k...J.e.m.e.-.R.i.a.l...M.o.l.d.a.u.-.L...i...N...i.i. .Z.a.i.r.e...I.r.a.k.-.D.i.n.a.r...J.e.m.e.-.D.i.n.a.r...R.i.a.l. .O.m.a.n.i...U.A.E. .D.i.r.h.a.m...W.I.R.-.F.r.a.n.k.e...N...i.i. .D.i.n.a.r...N...i.e. .D.i.n.a.r...N...i.e. .Z.a.i.r.e...R.I.N.E.T.-.F.u.n.d.s...S.a.u.d.i.-.R.i.y.a.l...N...i.i. .K.w.a.n.z.a...N...i.e. .K.w.a.n.z.a...A.r.u.b.a. .F.l.o.r.i.n...K.o.m.o.r.e.-.F.r.a.n.c...T.e.s.c.h.t.w...h.r.i.g...A.l.t.i. .M.e.t.i.c.a.l...A.l.t.e. .M.e.t.i.c.a.l...Z.y.p.e.r.e.-.P.f.u.n.d...T.....t.s.c.h.i. .M.a.r.k...B.e.l.a.r.u.s.-.R.u.b.e.l...B.e.l.a.r.u.s. .R.u.b.e.l...F.i.d.s.c.h.i. .D.o.l.l.a.r...F.i.n.n.i.s.c.h.i. .M.a.r.k...I.n.d.i.s.c.h.i. .R.u.p.i.e...I.i.r.i.s.c.h.i. .P.f.u.n.d...M.a.l.i.s.c.h.i. .F.r.a.n.c...I.i.r.i.s.c.h.s. .P.f.u.n.d...L.e.t.t.i.s.c.h.i. .L.a.t.s...M.a.u.r.i.z.i.u.s.-.R.u.p.i.e...S.a.l.o.m.o.n.e.-.D.o.l.l.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):820
                                                                                                Entropy (8bit):4.814630826299895
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:qlFttOax2QZw0nzJJWUNxupOhjQXHmIXclwYZg4YgQYYw0YgwY4DfP:qvT92QdzJJWuxusg5M+hHXHcXHDn
                                                                                                MD5:1392EA69A62CF00BA85CE95AB6EB8AB9
                                                                                                SHA1:4C11C54D4042DE6114AD7D3A1EC4BE769E6C896B
                                                                                                SHA-256:2BE1D03A372174CAE7B1A3FB840FD907DC3B386A36E4919E773F9C0C753E64BF
                                                                                                SHA-512:BD0C8942F12D7DB14BCD278ED6C0FBB78D11862F2FDEE746793923091216AB54A0D4A5856672C393B576891B4FCA8FFDAEAAE210A060BA073D7674A39EEE1588
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..j.............9.......S....i~.......ez..........,...z.....~..z....i8.....z..f....j..........n......Z8..b.vz....pT........\.x...&..%..r.!z..*.0T....K8........".$...........@T.....8.... T.....z.....z...........T....Tz..".......PT.....z..........`T...........T..................................R......z..v.Cz..w.......2z.....z.......`.).`.......`$..`....v..`HJ.`.......`.j.`.......`.<.`.......`.#.`.......`;..`.......`.5.`9.....'.C.G.c.s.w.{...........................+./.;._.c.o.s.{...........................#./.3.;.K.c.k.o.............S...................................V..............."...%...(...+.......1...4...7...:...=...@...C...F...I...L...O...R...Y...U...X...[...^...a...d...g...j...m...p...s...v...y...\..._...b...|.......................e...h...................k.. ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.463875210299606
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/xr+yhll:SBtkJ1li6gml/xrjJ
                                                                                                MD5:C64F71AE20060954B9E32C5B9DA51C65
                                                                                                SHA1:1E33967C51E09874F6A1DE9A9C3539DB9CA82A63
                                                                                                SHA-256:1F132CA885D786C508137E5A798DCA175FDD0D486A134931FCC3803DB934B735
                                                                                                SHA-512:CAAAD60303A93E38E881D7FC3C711D7A52ACB59511A65BEE549193067F88B870BFF2DAEBDDFAE6D4ED366F93D3D7003EC5B0AC13890B9187F9A37D2BE8831D17
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):10328
                                                                                                Entropy (8bit):5.378216758722473
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:3Kf0cw5YaCLA/By5ElFqp0H965qGRdzPIDubtA+NwLztfrXCXuNfF5F49gfXFX:3Kf4O3LApyKlFqp0d65vdzPIDmAuGrX3
                                                                                                MD5:1C375201EF871D78B9AF4541FCFBAEB7
                                                                                                SHA1:3F78A9335BB7B06FDB50D2F60524E004687464BF
                                                                                                SHA-256:6262C801357F2F55A21099750B822A4FBE92F57AD61E9A24DBA67C514EC18BFD
                                                                                                SHA-512:EF6FF223443F54D6D250E9020CFFC7BB4AD9117854C6132495B6AFEB6411DA7F92AE325E70053AC7F221053141BE7B3B5BA05EF9EE5C66DF2C10CA238E4C8EAF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..(..........................i~...2.G...../.B.0.K...%.>... .,.9.$...!... ...>.0.M.......@.(.@. ./.B...(...+.<.?...@. .!.I.2.0.../...(.@. .0.?./.>.2...8...&.@. .0.?./.>.2...8...K..... .$.>.2.>...$...>...@. .0.B.,.2.....0.>.(.@. .0.?./.>.2.....(.>.!.>... .!.I.2.0.....<.$.0.@. .0.?./.>.2.....>.(.?./.(. .8.G.!.@.....K.....(. .*.>.....>...!.H.(.?.6. ...M.0.K.(...,.0...B.!.>. .!.I.2.0...,.9.>...>... .!.I.2.0.....?.8.M.0. .*.>.....!...5.(.A...$.B. .5.>.$.B...(.G.*.>.2.@. .0.A.*.....-.>.0.$.@./. .0.B.*.....2.G.8.K.%.K. .2.K...@.....M./.B.,.>... .*.G.8.K...../.>.(.@...<. .!.I.2.0...*.G.0.B.5.?./.(. .8.K.2...,.9.0.@.(.@. .&.?.(.>.0...,.M.0.B.(.G... .!.I.2.0...9.H.$.?./.>... ...0.M.!...(.G.*.>.2.@. .0.A.*./.>...[.C.F.P.]. .+.<.M.0.H.........%.?./.K.*.?./.(. .,.?.0.....H...,.?./.(. .!.2.>.8.@.....H...M.8.?...(. .*.G.8.K.....K.0...M...K. .&.?.0.9.......K.2.M.!.K.5.(. .2.?./.B...2.@.,.?./.>... .&.?.(.>.0...2.G.,.(.>.(.@. .*.>.....!...5.?./.$.(.>...@. .!.K.......8.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):24104
                                                                                                Entropy (8bit):4.712237459846695
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:VgdtirpPXIYuDvJ3cIPJ6LflILdNs5w+Be5wbNNAoiyBvdjQC/HyBvxuH:WarltaJ9//ae58NNhB1QCKBpW
                                                                                                MD5:F1A01E4D112CCEC206A8D4B4487A9F3C
                                                                                                SHA1:AA33CAE756D82EDAB0979F6DF594C74E009CBD33
                                                                                                SHA-256:F2C01BF31365CDDE555E5A8916C157BD07300E9C2568D4A1CB1E705DF6DD290B
                                                                                                SHA-512:3469C820F73402BB76990447954EAF725A98A197A844ECF677401925527A10AEC2325BED8EB1523D47CF97BAD30F4DF37B8B0627651DF69536AE9DBDB78583F3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................z.. .Ek.........................i~...e.u.r.a.j...e.u.r.o.w.......s.k.a. .k.r...n.a...C.F.P.-.f.r.a.n.k.a.j.......s.k.e. .k.r...n.y...d.a.n.s.k.a. .k.r...n.a...j.a.p.a.n.s.k.i. .y.e.n...k.u.b.a.s.k.i. .p.e.s.o...r.u.m.u.n.s.k.i. .l.e.u...u.z.b.e.k.s.k.i. .s.u.m...Z.A.E. .d.i.r.h.a.m.a.j...c.h.i.l.s.k.e. .p.e.s.a...d.a.n.s.k.e. .k.r...n.y...k.u.b.a.s.k.e. .p.e.s.a...m.e.x.i.s.k.e. .p.e.s.a...b.o.B.h.a.r.s.k.i. .l.e.w...m.o.l.d.a.w.s.k.i. .l.e.u...n.j.e.z.n.a.t.a. .m...n.a...a.w.e.d.s.k.a. .k.r...n.a...a.l.b.a.n.s.k.e. .l.e.k.i...i.r.a.n.s.k.e. .r.i.a.l.e...j.a.p.a.n.s.k.e. .y.e.n.y...l.a.o.s.k.e.j. .k.i.p.a.j...n.j.e.z.n.a.t.e. .m...n.y...o.m.a.n.s.k.e. .r.i.a.l.e...u.z.b.e.k.s.k.e. .s.u.m.y.......s.k.e.j. .k.r...n.j.e...a.w.e.d.s.k.e. .k.r...n.y...g.i.n.e.j.s.k.i. .f.r.a.n.k...g.u.y.a.n.s.k.i. .d.o.l.a.r...t.u.r.k.o.w.s.k.a. .l.i.r.a...a.r.m.e.n.s.k.e. .d.r.a.m.y...a.r.u.b.a.-.f.l.o.r.i.n.a.j...b.o.l.i.w.i.s.k.e. .p.e.s.a...b.o.B.h.a.r.s.k.e. .l.e.w.y...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):152
                                                                                                Entropy (8bit):4.1638619626994275
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlEEl9c8mar2EK/quyUF9l9leLtj4ln1WJpQblNSn:Sv9xmarYLFH9sql1H6
                                                                                                MD5:E99F8FE932619D1E5334493348CF1FAA
                                                                                                SHA1:C8EDF32EE0C1355487DAD53962CDC89A1FB04BF2
                                                                                                SHA-256:8B822DC2CBE588F01B5BEB687D94A357A6067B6642E5CCB11D5EE50FEE18FBCC
                                                                                                SHA-512:4F6D3B3ED47671D0371BDC7B4135EA77620E7F8AE99F1D784AAE216314F0FA16F5B6DF68E1BB2F2BDC8CCD7DD20F5FC059A1326DD822DDED1847AFE6C9C59BC1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...I..... ............... .................................................. ...P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):84
                                                                                                Entropy (8bit):2.629834328222692
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlZelgylslplglcmW+r:SBtkJQltWpglcm5r
                                                                                                MD5:F32320EA5FE246573DD5431780C8E7D1
                                                                                                SHA1:6A5690A8AFD89298CC72539969EFFAE2C28AC0D5
                                                                                                SHA-256:A0D8434CF75D4905D038721A9A08BD937E892340D562066E635BE15B2732A47C
                                                                                                SHA-512:54EC429700159CDD16565586F7B6608616C94B9A45934942DF424A21E2B68A1E0F73A799583D839C36467B4ED0F4A940CADE4CB0F892DFF5B676B36B479074B7
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~...i.d...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):836
                                                                                                Entropy (8bit):4.807826091118605
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:mlUNtOaxijlw0+CzJ1WUNxupJLjQXHm3XcfwYXg4YgQYYwS/YgwYYCS9lgAF:mE9i1+wJ1Wuxu/g+M4PHXHCXnCS/gAF
                                                                                                MD5:F09BA6EC637887BF827CE42F664D181E
                                                                                                SHA1:E8B2FB8468FE264361EC4A788641E06461A94764
                                                                                                SHA-256:CD71CE1AFEB8C8186B7EFE0554748EE91D8F1B9CB38F8E7E96BA39BF29594523
                                                                                                SHA-512:17A26D4186AAECAE49AE06F9A992580DD3A11A20DB5E22486F2B76A4ED192074CE6911CF920ACA84614EAFE758124C1BC9455282318C07B78CC8783FD8133573
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..j.............:.......U....i~.......ez..........,...z.....~..z....i8.....z..f....j..........n......Z8..b.vz....pT........\.x...&..%..r.!z..*.0T....K8..........$...........@T.....8.... T.....z....~............T....Tz..".......PT.....z..........`T...........z.....T..........................*.......R......z..v.Cz..w.......2z.....z.........`.).`.......`$..`....v..`HJ.`.......`.j.`.......`.<.`.......`.#.`.......`;..`.......`.5.`:.....'.C.G.c.s.w.{...........................+./.;._.c.o.s.{.............................#./.3.;.K.c.k.o...............U...................................X..............."...%...(...+.......1...4...7...:...=...@...C...F...I...L...O...R...[...U...X...[...^...a...d...g...j...m...p...s...v...y...|...^...a...d...........................g...j...................m.. ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1060
                                                                                                Entropy (8bit):4.7221842930318525
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:eZJ99kEMjDA3WkPsgUA8GQHraBJ7xuxhlusg5Mu60nioHKw1Yy4vN8:eZJ3kEMjk3WkPsEQHk9xClusg+u603Kk
                                                                                                MD5:8EEE1A017181DBDB2F476DCDB3BAD06E
                                                                                                SHA1:9D00AF947B0257F63EE7C73A147A586903D433BC
                                                                                                SHA-256:59BE5709F034598424DFA7D0EDA9732CE8DF91BF15F4304D3A6F86570B9CDD64
                                                                                                SHA-512:92FFE2B7BB52829E3D3011530B43D4EE7F64DE27965EF04845EC430EA46D19D34B1BE6E31B29F0D0B22AC24F5B5703EA324E2C11BD6A26F5E9AA0B8F6A82C19C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..j.............9............i~...V.a.u.n.d.i. .y.a. .M.i.s.i.l.i...V.a.i.n.d.i. .y.a. .S.u.d.a.n.i...S.i.l.i.n.g.i. .y.a. .U.g.a.n.d.a...S.i.l.i.n.g.i. .y.a. .S.o.m.a.l.i.a...S.i.l.i.n.g.i. .y.a. .T.a.n.z.a.n.i.a...V.a.i.n.d.i. .y.a. .S.a.n.t.a.h.e.l.e.n.a.......ez..........,...z.....~..z.....^.....z..f....j..........n..........b.vz....pT........\.x...&..%..r....*.0T....K8........".c...........@T.....8.... T.....z.....z...........T....Tz.."........~.....z..........`T...........................................v.Cz..w.......2z...............`.).`.......`$..`....v..`HJ.`.......`Kk.`.......`.j.`.......`.<.`.......`.#.`.......`7k.`.......`;..`.......`.5.`9.....'.C.G.c.s.w.{...........................+./.;._.c.o.s.{...........................#./.3.;.K.c.k.o.................r...u...x...{...~...................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):932
                                                                                                Entropy (8bit):4.788982151830266
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:+lEycUANa5Oax1Sjlw0+CzJfUNxupJLjQXHm3XcHQY/g4YgwYYQZqC9137F:+hNA0591S1+wJfuxu/g+MwnnXnaqCf7F
                                                                                                MD5:20F7805D337BD52D7A12418CB764963E
                                                                                                SHA1:414B34F58AB8DE66AD29539FDD305E3AA7EEEBE1
                                                                                                SHA-256:939679C5B4476543E75D3CCCE43CAEF45B4C14BF2586939B6291DAA49FFE3BB6
                                                                                                SHA-512:4103B49304C8AEE969ECC3511EB61AE85BE1E6B311784E7A1FC9C3B2AA586CB6DB918BD8BF75C704172664979F9E7D1565F85734891A56AFFB076C6DF670326F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..j.............:.......m....i~...S.a.r.a.f.u. .y.a. .C.h.i.j.a.p.a.n.i...D.i.r.h.a.m. .y.a. .F.a.l.m.e. .z.a. .C.h.i.a.r.a.b.u.......ez..........,...z.....~..z....i8.....z..f....j..........n......Z8..b.vz....pT........\.x...&..%..r.!z..*.0T....K8..........$...........@T.....8.... T.....z....~............T....Tz..".......PT.....z..........`T...........z.....T..........................*.......R......z..v.Cz..w.......2z.....z.........`.k.`.......`$..`....v..`HJ.`.......`.j.`.......`.<.`.......`.#.`.......`;..`.......`.5.`:.....'.C.G.c.s.w.{...........................+./.;._.c.o.s.{.............................#./.3.;.K.c.k.o...............m...1...4...7...:...=...@...C...F...p...I...L...O...R...U...X...[...^...a...d...g...j...m...p...s...v...y...|...........s...........................................................v...y...|...................................................... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):5008
                                                                                                Entropy (8bit):4.886877793642687
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:I9hgUnLJ5R/z6xYa+Joas55k23iLMGcZMGjJvLkl8a/kfudw1SbO5X3a7MF:IFz9aENdLgZFDkzZag0
                                                                                                MD5:3F199424F472D4CAFF20AA10D70EC0C3
                                                                                                SHA1:8B7FBC7B6282D5D59BA2EFFD389501B191BAD9E3
                                                                                                SHA-256:21EB2C74131DE72B3A7A3A1A7CABEDD1BC8FC9904AB28FC04E71F93AB229665D
                                                                                                SHA-512:CABF7A8F94C72200B764C2B4804E3B57D98D530A3D36F49C7D6C2DF58B828C654B0CF392283F4EEEE8CB40DBC0FF148F45364CC96C66CDC3AB59B85665A6CCE2
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~........ ..S.i.l.i...O.u.g.i.a...K.u.a.n.z.a...2...1...4.8...9...L.i.l.a.n.j.e.n.i...B.i.r. .e.t.i.o.p.i...I.u.a.n. .x.i.n.e.s...L.i.r.a. .t.u.r.k.u...D.i.n.a.r. .l.i.b.i.u...K.u.r.o.a. .s.u.e.k.u...D.o.l.a. .m.e.r.k.a.n.u...F.r.a.n.k.u. .s.u.i.s.u...I.e.n.i. .j.a.p.o.n.e.s...Z.l.o.t.y. .p.o.l.a.k.u...L.i.b.r.a. .e.j.i.p.s.i.u...L.i.b.r.a. .s.u.d.a.n.e.s...P.e.z.u. .m.e.x.i.k.a.n.u...R.u.p.i.a. .i.n.d.i.a.n.u...X.e.l.i.n. .k.e.n.i.a.n.u...B.a.h.t. .t.a.i.l.a.n.d.e.s...D.i.n.a.r. .a.r.j.e.l.i.n.u...D.i.r.e.n. .m.a.r.o.k.i.n.u...D.o.l.a. .k.a.n.a.d.i.a.n.u...D.o.l.a. .l.i.b.e.r.i.a.n.u...D.o.l.a. .n.a.m.i.b.i.a.n.u...F.r.a.n.k.u. .r.u.a.n.d.e.s...K.u.a.x.a. .z.a.m.b.i.a.n.u...K.u.r.o.a. .n.o.r.u.e.g.e.s...R.i.a.l. .b.r.a.z.i.l.e.r.u...L.o.t.i. .d.i. .L.e.z.o.t.u...D.i.n.a.r. .d.i. .B.a.r.a.i.n...D.i.n.a.r. .t.u.n.i.z.i.a.n.u...F.r.a.n.k.u. .b.o.r.u.n.d.e.s...F.r.a.n.k.u. .k.o.n.g.o.l.e.s...K.u.a.x.a. .d.i. .M.a.l.a.u.i...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):364
                                                                                                Entropy (8bit):4.294839676088542
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SviaSSpfr98gF8Mzlh2NjNxklNXNLXVn+r4pwOVQXqxs8Lp4Xi6fXBFn:2SS78gVlhib+ZXo4agwYJSXi6fBFn
                                                                                                MD5:AAC55F615221DA508B258FCD517BBA24
                                                                                                SHA1:B942A5A847FBC777638DE99EE017905882A6AB81
                                                                                                SHA-256:3B88AFE697D2A8D855FDD591800BE0C4AD03CCAAABF931451239771BCCDFC51F
                                                                                                SHA-512:FDC03E9543757D6A3B4214BC2689BA234D39B467BCCB17B3DC75A027485FC8B90813E56F1B731ABABCB2F0D4B55A6D0AFBC2BD17CACF66FA0DADF6993CF2BC6F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................K.. ........S...S.........../....i~...................&...\...................................W.........+...o.......\.........................&...............................................W.........+...o.........................................W.........+...o...-..P0..P3..P6..P9..P<..P?..PB..PE..P............/.. ...P=.. H..P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2404
                                                                                                Entropy (8bit):4.21439333941771
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:bsOEqrA+YnU8F8EP5QwsknLT7A4jUi/i4GFoj2ridQzgVeWnnCn:bp9rA+gU8Fv513vBjbhGFoj2eFVeWCn
                                                                                                MD5:AC9586A6D853904F6949275BD92C9A6A
                                                                                                SHA1:F026ACAFC78522944C9AC217CB294DA608035A46
                                                                                                SHA-256:7B40D21D049043F6AEF7BE0B9779FA00BB34653059DF800A9D26EB70BFEF52FA
                                                                                                SHA-512:F4725F4D08DCB759FCB439E4060158D2854F4F2CEF0DFE93505A6DC6358EA6CE070298FC9858910A1BFC72D8CDA57B9AD30C67B788E34AB80C88596EC9FCE5E0
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................M.. ........Q...Q...:............i~...y.u.l.o...s.e.d.i. .y.a. .G.h.a.n.a...l.o.t.i. .y.a. .L.e.s.o.t.o...l.u.p.i.a. .y.a. .I.n.d.i.a...p.a.u.n.i. .y.a. .M.i.s.l.i...b.i.l. .y.a. .U.h.a.b.e.s.h.i...d.i.n.a.l.i. .y.a. .L.i.b.y.a...d.o.l.a. .y.a. .L.i.b.e.l.i.a...f.a.l.a.n.g.a. .y.a. .G.i.n.e...l.i.y.a.l. .y.a. .S.a.u.d.i.a...l.u.p.i.a. .y.a. .M.o.l.i.s.i...p.a.u.n.i. .y.a. .S.u.d.a.n.i...d.i.l.h.a.m. .y.a. .M.o.l.o.k.o...d.i.n.a.l.i. .y.a. .S.u.d.a.n.i...d.o.l.a. .y.a. .M.a.l.e.k.a.n.i...f.a.l.a.n.g.a. .y.a. .K.o.n.g.o...n.a.k.f.a. .y.a. .E.l.i.t.l.e.a...d.i.n.a.l.i. .y.a. .A.l.j.e.l.i.a...d.i.n.a.l.i. .y.a. .T.u.n.i.s.i.a...d.o.l.a. .y.a. .A.u.s.t.l.a.l.i.a...f.a.l.a.n.g.a. .y.a. .B.u.k.i.n.i...f.a.l.a.n.g.a. .y.a. .J.i.b.u.t.i...f.a.l.a.n.g.a. .y.a. .K.o.m.o.l.o...f.a.l.a.n.g.a. .y.a. .L.w.a.n.d.a...f.a.l.a.n.g.a. .y.a. .U.s.w.i.s.i...n.a.i.l.a. .y.a. .N.a.i.j.e.l.i.a...p.a.u.n.i. .y.a. .U.i.n.g.e.e.z.a...d.i.n.a.l.i. .y.a. .B.a.h.a.l.e.n.i...e.s.k.u.d.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):96
                                                                                                Entropy (8bit):2.8008721598698436
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlu112lFvlslpl9lcmNIlh+T/+k:SBtkJK0lslL8mNIl0Ck
                                                                                                MD5:9DD8151D818086771071512D5D9FF53F
                                                                                                SHA1:AF9D1CA60F5409F23BA1BB9313C07D7EDA5450A1
                                                                                                SHA-256:A93CC1B747B7EDD0A3D8EEC3E93B7B8DB002C0F761461233FC5EE403CE9BA983
                                                                                                SHA-512:80C17F667BD2128E552E59738162AD142EECAC4A37140E7E7648E69084C072329CB26A21471F1E0FE1E4D1B8372A0C8069FC0342F23DFFCF94CCEDFAB9AA40F3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~...2...1...4.8...5.6.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2136
                                                                                                Entropy (8bit):4.392005258298755
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:ItKPgrqPYL1O9ebsttOuRID/Kl31fPW14CwlUUNl2TGQQ/gVQOYDm/1:XPgrqPYL1dbYO7KfxWUNoQ4VQOYU1
                                                                                                MD5:A183C17F3D86F1A50A0ABAD447046767
                                                                                                SHA1:AB019CA7552CEB0A2DA87827A426298827D945A3
                                                                                                SHA-256:FE719F9605B06633985335ECCCE90086EF63114FACBFA688F6146B981377BA58
                                                                                                SHA-512:2B5C4E0043808952593E56C4C32BFFC0DAAF5FAF51C54CEAC0EC0442180D95908F9C31F53091B56BC16A7F1546B3D192327352E8451A5195BAE94A5D663EDDE5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .sl.............:.....f.|....i~...L.e.w.o.n.e...S.e.d.i. .e.y.. e.G.a.n.a...L.o.t.i. .e.y.. e.L.e.s.o.s.o...Y.e.n.i. .e.y.. e.J.a.p.a.n.i...B.i.i.r.u. .e.y.. E.s.y.o.p.y.a...D.o.o.l.a. .e.y.. e.K.a.n.a.d.a...F.a.r.a.n.g.a. .e.y.. e.G.i.n.i...K.w.a.n.z.a. .e.y.. A.n.g.o.l.a...D.a.l.a.s.i. .e.y.. e.G.a.m.b.y.a...D.i.n.a.a.l.i. .e.y.. e.L.i.b.y.a...D.o.o.l.a. .e.y.. e.L.i.b.e.r.y.a...F.a.r.a.n.g.a. .e.y.. e.K.o.n.g.o...S.i.l.i.n.g.i. .e.y.. e.K.e.n.y.a...D.o.o.l.a. .e.y.. e.N.a.m.i.b.i.y.a...F.a.r.a.n.g.a. .e.y.. e.K.o.m.o.r.o...P.a.w.u.n.d.i. .e.y.. e.M.i.s.i.r.i...P.u.l.a. .e.y.. e.B.o.t.i.s.w.a.n.a...R.u.p.i.y.a. .e.y.. e.B.u.y.i.n.d.i...D.i.n.a.a.l.i. .e.y.. A.l.i.g.e.r.y.a...F.a.r.a.n.g.a. .e.y.. e.J.j.i.b.u.t.i...F.a.r.a.n.g.a. .e.y.. e.b.u.r.u.n.d.i...N.a.k.i.f.a. .e.y.. E.r.i.t.u.r.e.y.a...P.a.w.u.n.d.i. .e.y.. e.S.u.d.a.a.n.i...D.i.n.a.a.l.i. .e.y.. e.B.a.a.r.e.e.n.i...D.o.o.l.a. .e.y.. A.w.u.s.i.t.u.r.e.l.y.a...P.a.w.u.n.d.i. .e.y.. e.B.u.n.g.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1152
                                                                                                Entropy (8bit):4.689701312866842
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:JadneOOsz4RDMJ8rxeYtUUECUAmRdCJ1vXuxusg5MEn2Gsn:JadnEszsDMCrxBtJUHRgfPlsg+U2Go
                                                                                                MD5:F7549BA4E2B54F0B20C5BA3ED9DADFDE
                                                                                                SHA1:76EDFFE824583140DE9260FE557E44E584A64159
                                                                                                SHA-256:AF88C435B7F8A71DAEFFD949AA22EA804C94B7EA6B48203D9AD80C575EDBB869
                                                                                                SHA-512:CEB0D078053DDFE408A0A6EC38D50298B1CD9153DCEB38E73B3202C94A6528F2537652C4B6F20132597067A0BB979BC8B88AFF8EED81226764B707C7B608818B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..j.............9............i~...D.o.l.a...Y.e.n. .m.a.r. .J.a.p.a.n...S.e.d.i. .m.a.r. .G.h.a.n.a...D.o.l.a. .m.a.r. .K.a.n.a.d.a...P.a.u.n.d. .m.a.r. .M.i.s.r.i...D.o.l.a. .m.a.r. .L.i.b.e.r.i.a...S.i.l.i.n.g. .m.a.r. .K.e.n.y.a...B.i.r.r. .m.a.r. .E.t.h.i.o.p.i.a...P.u.l.a. .m.a.r. .B.o.t.s.w.a.n.a...P.a.u.n.i. .m.a.r. .U.i.n.g.e.r.e.z.a.......ez..........,...z..............z..f....j..........n..........b.vz........&.....r.!z..*.0T....K8........"....................8.... T.....z.....z...........T....Tz..".......PT.....z..........`T...........T..................................R.........v.Cz..w.......2z.....z.........`.).`....~..`fk.`.......`$..`.......`Tk.`....\..`xk.`....v..`HJ.`.......`.j.`.......`.<.`.......`.#.`.......`;..`.......`.5.`9.....'.C.G.c.s.w.{...........................+./.;._.c.o.s.{...........................#./.3.;.K.c.k.o.........................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):3176
                                                                                                Entropy (8bit):4.059150453036504
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:quxuRuW4u/uyukunLuuuEuNucusu9uRutuCuHux6ubuYWuYuujuhu2uSusuZuNui:quxuRuVu/uyukuLuuuEuNucusu9uRutF
                                                                                                MD5:11579580FF3CF5452330D88EDA9EDCEB
                                                                                                SHA1:A5EAEAD3D1F90889631FCDB0EACF4FE703DB62A2
                                                                                                SHA-256:D120179E43075CE550A4E3C40BF69E578379FE494204301AA0BDA3DA6FDEE44B
                                                                                                SHA-512:F6A139A1E6D1611947564C0919392401351C3295D55A65EADE888A1D9305F888D658BFC4C39D1AF7E4DB8A78608B2E6C3318E69F7BC98D536C5EDDFCB9A75CF8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................9............i~...I.r.o.p.i.y.i.a.n... .e. .G.i.n.e...I.r.o.p.i.y.i.a.n... .e. .C.h.i.n.a...I.r.o.p.i.y.i.a.n... .e. .G.h.a.n.a...I.r.o.p.i.y.i.a.n... .e. .I.n.d.i.a...I.r.o.p.i.y.i.a.n... .e. .K.e.n.y.a...I.r.o.p.i.y.i.a.n... .e. .K.o.n.g.o...I.r.o.p.i.y.i.a.n... .e. .L.i.b.y.a...I.r.o.p.i.y.i.a.n... .e. .M.i.s.r.i...I.r.o.p.i.y.i.a.n... .e. .S.a.u.d.i...I.r.o.p.i.y.i.a.n... .e. .l.e.o.n.i...I.r.o.p.i.y.i.a.n... .e. .A.n.g.o.l.a...I.r.o.p.i.y.i.a.n... .e. .B.u.k.i.n.i...I.r.o.p.i.y.i.a.n... .e. .G.a.m.b.i.a...I.r.o.p.i.y.i.a.n... .e. .J.a.p.a.n.i...I.r.o.p.i.y.i.a.n... .e. .J.i.b.u.t.i...I.r.o.p.i.y.i.a.n... .e. .K.a.n.a.d.a...I.r.o.p.i.y.i.a.n... .e. .K.o.m.o.r.o...I.r.o.p.i.y.i.a.n... .e. .L.e.s.o.t.o...I.r.o.p.i.y.i.a.n... .e. .M.a.l.a.w.i...I.r.o.p.i.y.i.a.n... .e. .M.o.r.i.s.i...I.r.o.p.i.y.i.a.n... .e. .M.o.r.o.k.o...I.r.o.p.i.y.i.a.n... .e. .R.w.a.n.d.a...I.r.o.p.i.y.i.a.n... .e. .S.a.m.b.i.a...I.r.o.p.i.y.i.a.n... .e. .S.u.d.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):168
                                                                                                Entropy (8bit):3.8675109447643528
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tloFelfdll8lCtVXMXlWtKlFiO6PePllnuW5vTVntRb1hp0lFuQFn:Svo6mlCtVXMsKlv62eW5b4/F
                                                                                                MD5:02EE73C7EDDE3DC0377FCE196E3FA6A0
                                                                                                SHA1:F4CC1350E289EC27383C3BBDAFBFDBB9D96B1B70
                                                                                                SHA-256:11D7D17E54504159416F09275A922376D8E961E3D3AD5380CDD959A513E8E33F
                                                                                                SHA-512:AAC5AD50A6DA2D3E43FE918F5274F2DD98DA622222C9C9D4B84AC239A5C122A2BDF44C2C93307D5866AAEB5E3075D166C589A9D6B94B3529E1C27BB550949C27
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........"..."................i~...s.h.i.r.....i.k.u. .i.k.a.p. .m.T...T.....v.............................................. ...P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):6440
                                                                                                Entropy (8bit):5.321424177187323
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:e2YmABKNZXPhwk3f/7VRt/giMw7qX8FoX:e8ABKN8Sjnt/JJ7qXb
                                                                                                MD5:C7C7AD6300F54EEB29208C8051E2A48E
                                                                                                SHA1:FE566931939B0F2789E2BF2B6846E37DEFE5E8E5
                                                                                                SHA-256:BD1A97A7CD9271408CA39E365B93572A47A9043FFD5844E6D25959FDB2A4BE30
                                                                                                SHA-512:C982A08641087A4EEC661F29DD13C23AE8039CAA037C9880E540EEC429E2A9746CC2E387F38FF3C1C43A43DA4975E65B9CE52CE72270F24BA3E3D46E490F6121
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................8.. ..h.....B...B................i~...D.o.l.a.r. .A.S...2...1...4.9...2...Y.e.n. .J.e.p.u.n...D.i.n.a.r. .I.r.a.q...P.a.u.n. .M.e.s.i.r...P.a.u.n. .S.u.d.a.n...P.a.u.n. .S.y.r.i.a...P.a.u.n. .L.u.b.n.a.n...K.r.o.n.e. .N.o.r.w.a.y...P.a.u.n. .B.r.i.t.i.s.h...R.i.e.l. .K.e.m.b.o.j.a...Z.l.o.t.y. .P.o.l.a.n.d...D.o.l.a.r. .B.a.h.a.m.a.s...D.o.l.a.r. .J.a.m.a.i.c.a...D.o.l.a.r. .S.u.r.i.n.a.m...F.r.a.n.c. .C.o.m.o.r.i.a...K.r.o.n.a. .I.c.e.l.a.n.d...P.a.. a.n.g.a. .T.o.n.g.a...S.y.i.l.i.n.g. .K.e.n.y.a...R.u.b.e.l. .B.e.l.a.r.u.s...P.a.u.n. .G.i.b.r.a.l.t.a.r...P.e.s.o. .D.o.m.i.n.i.c.a.n...S.o.m. .K.y.r.g.y.s.t.a.n.i...S.y.i.l.i.n.g. .S.o.m.a.l.i...S.y.i.l.i.n.g. .U.g.a.n.d.a...D.i.r.h.a.m. .M.a.g.h.r.i.b.i...H.r.y.v.n.i.a. .U.k.r.a.i.n.e...L.i.l.a.n.g.e.n.i. .S.w.a.z.i...L.i.t.a.s. .L.i.t.h.u.a.n.i.a...C.o.l.o.n. .C.o.s.t.a. .R.i.c.a...S.y.i.l.i.n.g. .T.a.n.z.a.n.i.a...C.o.r.d.o.b.a. .N.i.c.a.r.a.g.u.a...D.o.l.a.r. .N.e.w. .Z.e.a.l.a.n.d...D.o.l.a.r. .T.a.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):3.309432036254817
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQw68t1ar9nRillQ/6n:SvW83ar9nRi46
                                                                                                MD5:B0E942760DB021CF5F6A685A52F93393
                                                                                                SHA1:C82429E77F6595E40CEFB6B20AA5E0A71CA07625
                                                                                                SHA-256:CF21EE5E58ED6E2911AABD6D9FEA7B7258C3483B46ED4706A6CDBA9254E06CBC
                                                                                                SHA-512:9E347D9C136C9DD64F6E6EE52D8AAFA34BDF719ECB3721459484C923CB89E118686A4E57478B10BE7B6A9BE3FCE5ECB07F3300993EED928BA979016CBF8779BE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...........O................ ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):3.3446273605383543
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQ7sC8t0/Uar9wRPfllQ/6n:SvSf82r9wRX46
                                                                                                MD5:F674503A784DB3D59664FE097D5ADDBE
                                                                                                SHA1:6163F03FEDFBE16B37BA26CE2B3DED856E02C831
                                                                                                SHA-256:F9557DA8973FE1AA3F34253D0B457197517AF1D0FACEF3D8CC279D8E55A11F0C
                                                                                                SHA-512:C5B9815666E193317E3FD48448BC74B7D5590D4B825199DF00BAEDC4E30DDAE93032B754D81CBB2D9D50F47DDFE444166298A566DD2385648B11C6D7FBB5B595
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .AU...................AU.....i~.......@U................... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2552
                                                                                                Entropy (8bit):4.169327394737595
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:EtVvGUGWKAQsUj0XSAbcCA1LmkBtZKUPl7hpCa/kHlZbnZ57qXIgVIy:xfzt5Aw55mFMlfCa8HlZjZZaVIy
                                                                                                MD5:3ADC590CE77F36881EE933974FF2B2F3
                                                                                                SHA1:230B8CB512EE56978149C3F20DF3A2CEFCED36C6
                                                                                                SHA-256:36B5EE66B95FDC5E5EC1018E9D230D1AD30C8818A8DADD22F9C9A457636FF43B
                                                                                                SHA-512:C4C0EB48F167AB6B8CA6CF07C95CF8AD80A5F36E565F820FEFA39D99DEBB0156B87947E1D02D49D17FBE77710BBC8D2501CA189E2B185CCB42E36B1D40488360
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................r.. ........v...v...:............i~...s.o.l.a.i. .B.E.A.C...s.o.l.a.i. .E.u.r.o...s.o.l.a.i. .G.a.n.a...s.o.l.a.i. .S.y.i.K...S.o.l.a.i. .M.a.r.o.k...S.o.l.a.i. .S.w.i.s.s...s.o.l.a.i. .B.C.E.A.O...s.o.l.a.i. .E.g.y.p.t...s.o.l.a.i. .G.u.i.n.e...s.o.l.a.i. .I.n.d.i.a...s.o.l.a.i. .J.a.p.o.K...s.o.l.a.i. .K.e.n.i.a...s.o.l.a.i. .K.o.n.g.o...s.o.l.a.i. .L.i.b.y.a...S.o.l.a.i. .H.e.l.e.n.a...S.o.l.a.i. .M.a.l.a.w.i...S.o.l.a.i. .R.w.a.n.d.a...S.o.l.a.i. .U.g.a.n.d.a...s.o.l.a.i. .A.n.g.o.l.a...s.o.l.a.i. .E.r.i.t.r.e...s.o.l.a.i. .K.a.n.a.d.a...S.o.l.a.i. .A.m.e.r.i.k.a...S.o.l.a.i. .A.r.a.b.i.y.a...S.o.l.a.i. .M.a.u.r.i.c.....S.o.l.a.i. .S.a.i.c.h.e.l...S.o.l.a.i. .S.a.u.d.i.y.a...S.o.l.a.i. .Z.a.m.b.i.y.a...s.o.l.a.i. .A.l.g.e.r.y.a...s.o.l.a.i. .B.a.r.e.n.y.a...s.o.l.a.i. .B.u.r.u.n.d.i...s.o.l.a.i. .E.t.i.o.p.i.a...s.o.l.a.i. .G.a.m.b.i.y.a...s.o.l.a.i. .K.o.m.o.r.y.a...s.o.l.a.i. .L.e.s.o.t.h.o...S.o.l.a.i. .N.a.m.i.b.i.y.a...S.o.l.a.i. .N.i.g.e.r.i.y.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.463875210299606
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/xr+yhll:SBtkJ1li6gml/xrjJ
                                                                                                MD5:C64F71AE20060954B9E32C5B9DA51C65
                                                                                                SHA1:1E33967C51E09874F6A1DE9A9C3539DB9CA82A63
                                                                                                SHA-256:1F132CA885D786C508137E5A798DCA175FDD0D486A134931FCC3803DB934B735
                                                                                                SHA-512:CAAAD60303A93E38E881D7FC3C711D7A52ACB59511A65BEE549193067F88B870BFF2DAEBDDFAE6D4ED366F93D3D7003EC5B0AC13890B9187F9A37D2BE8831D17
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.463875210299606
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/xr+yhll:SBtkJ1li6gml/xrjJ
                                                                                                MD5:C64F71AE20060954B9E32C5B9DA51C65
                                                                                                SHA1:1E33967C51E09874F6A1DE9A9C3539DB9CA82A63
                                                                                                SHA-256:1F132CA885D786C508137E5A798DCA175FDD0D486A134931FCC3803DB934B735
                                                                                                SHA-512:CAAAD60303A93E38E881D7FC3C711D7A52ACB59511A65BEE549193067F88B870BFF2DAEBDDFAE6D4ED366F93D3D7003EC5B0AC13890B9187F9A37D2BE8831D17
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):116
                                                                                                Entropy (8bit):3.4731032476541825
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlEFu4gG98G4PPfXkhlt/WVGFn:Sv8vH98pnfUzzF
                                                                                                MD5:8EC60D7E1E4F6BDD711B9202D84A910B
                                                                                                SHA1:F38271A99673959E89952ABA17CBAC11300789DE
                                                                                                SHA-256:4753735BDA4C84D96BDB31FE7308CCF3E51EFD4F69CE5D979061AE1BB96ABCBF
                                                                                                SHA-512:2A351102B47C019D100B7A62EBEC2FBFBFF897AFEF61BBA479893F5093AF69BC80F2EBFB59D5AAC9826C62E75EAF13DA6C54854C0227F2A3EA2BB300B776561F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~.....:.....\.........+...................... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):708
                                                                                                Entropy (8bit):4.586640180253403
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:tyoaYzmu+SDy4hH4Bfky4p45ky4O4uIy6TT3HktNpkZDzgICpA4S:twSe4hYB94aL4LnWpQIICLS
                                                                                                MD5:4DD053ED8488B02A8264823DC7E50691
                                                                                                SHA1:0B270780E4D4B76FCA61A5C81B31E98AD44D0DC1
                                                                                                SHA-256:0B775254239B2E0CB70F743F8441354B0201D4CACF940EB1B9E0A46034936895
                                                                                                SHA-512:A9D1A615846F376548049A23A88E1135F1707FCB323EA1F89536545E10DB1030D6E95FCD1CD6B8AD6204503BFFD630B0F45D7E7C8045EF9F7565C7380A522F35
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..........................i~.....0.@...!.>.<...A.>.<.K...5.2.@.>.9.K.......(.-.K. ...>.;.;.0.@.......(.-.K. .4.>.;.;.0.@.......(.-.K. .4.>.;.;.0.@.K.....@.0.7.8.;.8.0.3. .@.5.0.;.....@.8.B.0.9.=.0.3. .$.C.=.B.......7.>.=.3... .2.0.;.N.B.....1.@.0.7.8.;.8.0.3. .@.5.0.;...1.@.8.B.0.9.=.0.3. .D.C.=.B...=...7.>.=.3... .2.0.;.N.B.....1.@.0.7.8.;.8.0.3. .@.5.0.;.K...1.@.8.B.0.9.=.0.3. .D.C.=.B.K...=...7.>.=.3... .2.0.;.N.B...9.K.......%.........\.4.....................C.......R...................a...........s.......Q.................p.................W.........o.................................W.........o......P...P...P...P...P...P...P............... ... ...P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):41240
                                                                                                Entropy (8bit):4.439275441009488
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:4MWl4GCF3R4k4NRAzE/d9rPqTsMexxQ9WPrzhlhBxNub88L2lCypZ2VshQd:ICFmc8ywMGCuNL/pwVvd
                                                                                                MD5:4E193E33C0CB5628701FD1C9C9E1CEE9
                                                                                                SHA1:39ACD137987D552F2E2CAC2776CF8AF0CA008F53
                                                                                                SHA-256:3D1029D5A6C0807CFAC45A2B9077E5FAC91EC14D52FD8E65653C8A63AC6E6FD1
                                                                                                SHA-512:6D538F1DCAA611CC873B6C155BA993AB32094792BB288A2DA53202A250432C9DC0A6B1EB182EDFD1984466A220F10A9A404D44DBAE37C3CD409CFA7A006A2FCE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................4(. ..f.....>(..>(..........."...i~...E.C.U...z.B.o.t.o...p.a.l.l.a.d...p.l.a.t.y.n.a...f.r.a.n.k. .C.F.P...f.r.a.n.k.a. .C.F.A...f.r.a.n.k.i. .C.F.A...l.i.r. .w.B.o.s.k.i...b.a.h.t. .t.a.j.s.k.i...s.o.m. .u.z.b.e.c.k.i...f.r.a.n.k...w. .C.F.A...f.r.a.n.k...w. .C.F.P...l.o.t.i. .L.e.s.o.t.o...p.a.t.a.c.a. .M.a.k.a.u...c.e.d.i. .g.h.a.D.s.k.i...d.i.n.a.r. .i.r.a.c.k.i...f.u.n.t. .e.g.i.p.s.k.i...j.e.n. .j.a.p.o.D.s.k.i...j.u.a.n. .c.h.i.D.s.k.i...l.e.j. .r.u.m.u.D.s.k.i...l.e.k. .a.l.b.a.D.s.k.i...l.i.r.a. .t.u.r.e.c.k.a...l.i.t. .l.i.t.e.w.s.k.i...r.i.a.l. .i.r.a.D.s.k.i...r.i.a.l. .o.m.a.D.s.k.i...s.o.m. .k.i.r.g.i.s.k.i...z.B.o.t.y. .p.o.l.s.k.i...B.a.t. .B.o.t.e.w.s.k.i...m.a.r.k.a. .f.i.D.s.k.a...b.i.r.r. .e.t.i.o.p.s.k.i...f.u.n.t. .l.i.b.a.D.s.k.i...f.u.n.t. .s.u.d.a.D.s.k.i...f.u.n.t. .s.y.r.y.j.s.k.i...k.i.p. .l.a.o.t.a.D.s.k.i...k.o.r.o.n.a. .c.z.e.s.k.a...k.o.r.o.n.a. .d.u.D.s.k.a...l.e.j. .m.o.B.d.a.w.s.k.i...l.e.w. .b.u.B.g.a.r.s.k.i...m.a.n.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.3715072703051296
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQ0ElHc0ar9Hs9k9ScVn:SvZRr9XHV
                                                                                                MD5:C194FF74C6B65FAE4832F1ABDAA218A1
                                                                                                SHA1:712282E2B74418EE0CD6FC661A72A88486A9E3B2
                                                                                                SHA-256:0E986C574F9E6AA4F786ED2A4A1B825759062EB04FED0938679010A2E6CBA24B
                                                                                                SHA-512:715B11D01C31819B2BFB80EC36624F4D59F1670853E265365D95405EEE53583D55FA25CAC03CBE7EDD72287062C963A293E713AA117BB81C2E4A0C8698E8E6AC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...................=........`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):112
                                                                                                Entropy (8bit):3.4368702719143505
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlud4tbwmyPmKPrR1mCFofGFn:Sv+/mjKTRxFo+F
                                                                                                MD5:EE2F8917C4703ED35301B8302B298E2D
                                                                                                SHA1:9BF02E717B3D8B199D63D92C4776E24032F9BC5B
                                                                                                SHA-256:42A9D4F0CE1791C474F85337BA0896FDB2312AB5CF2035B70AB28D6AB1DFEF82
                                                                                                SHA-512:2512CF617BD7A2BC1721A5169EA5EA8D6B8FCC2C479CB7CC9592F8AF9A80A9CCE4F0A08D0290E424C67EA894EB0D10CAEA8547413265835D471C99F9F2B30D85
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...M.T.n..................=........`... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):116
                                                                                                Entropy (8bit):3.4571882910706795
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tldc4jUMXsSGTkRolJpxK9Cfn:SvPjdgTkRoz+y
                                                                                                MD5:91E165EABC558593B37DC907C2363727
                                                                                                SHA1:93FC06CEE99BA16800A6CDAFD0726ED42047118A
                                                                                                SHA-256:C9589538FCEB262D36E1F687FEC5870853CFC51D63F5F6C27E5969B274C9B238
                                                                                                SHA-512:CB31FCCA7B53F825683BE4895E6F137CB1E024A40C80D95650223382ED0BFB0C4C7ADC1E2407E084D05AB1C3AD3AF89C97297CDB6E0E7E9591A4D91DB8B2F1B5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...S./.......6.......................... ...P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):4372
                                                                                                Entropy (8bit):5.024738835036758
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:rDb3gZi8lV09u1gAmcN0wBLVcXyRubMNpRPNpT8zWgjHZ98053f7qhnxBxB1YX0O:rH3qi5+gAyY1/TH4c053zqhnx84+97td
                                                                                                MD5:CE5342334637D420ADBEEAAB1563E387
                                                                                                SHA1:8695516224B0998CA0C1A8C0420D63D9AF1C17D0
                                                                                                SHA-256:D2CABE6B3BDC84B56F8C091DC908714FFEA4C7EE2598B97CD1F5E4647D018258
                                                                                                SHA-512:AC2A1C5F4F1B720F42786E381B6ECFD75EDD214D0FBA5BC83483D513F71EDFDAC6EDC3F5680B868319466E75DE450DFAD10D958CBA287112AA593984D6A439AC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................;.. ....i...=...=...........;...InstalledLocales.af.af_NA.agq.ak.ar.ar_AE.ar_DJ.ar_ER.ar_KM.ar_LB.ar_SA.ar_SO.ar_SS.asa.ast.az.az_Cyrl.az_Latn.az_Latn_AZ.bas.be.bem.bez.bg.bm.bn.bo.bo_IN.br.brx.bs.bs_Cyrl.bs_Latn.bs_Latn_BA.ca.ca_FR.ccp.ce.ceb.cgg.chr.ckb.cs.cy.da.dav.de_CH.de_LI.de_LU.dje.dsb.dua.dyo.dz.ebu.ee.el.en.en_001.en_150.en_AE.en_AG.en_AI.en_AT.en_AU.en_BB.en_BE.en_BI.en_BM.en_BS.en_BW.en_BZ.en_CA.en_CC.en_CH.en_CK.en_CM.en_CX.en_CY.en_DE.en_DG.en_DK.en_DM.en_ER.en_FI.en_FJ.en_FK.en_FM.en_GB.en_GD.en_GG.en_GH.en_GI.en_GM.en_GY.en_HK.en_IE.en_IL.en_IM.en_IN.en_IO.en_JE.en_JM.en_KE.en_KI.en_KN.en_KY.en_LC.en_LR.en_LS.en_MG.en_MO.en_MS.en_MT.en_MU.en_MW.en_MY.en_NA.en_NF.en_NG.en_NL.en_NR.en_NU.en_NZ.en_PG.en_PH.en_PK.en_PN.en_PW.en_RW.en_SB.en_SC.en_SD.en_SE.en_SG.en_SH.en_SI.en_SL.en_SS.en_SX.en_SZ.en_TC.en_TK.en_TO.en_TT.en_TV.en_TZ.en_UG.en_VC.en_VG.en_VU.en_WS.en_ZA.en_ZM.en_ZW.es_419.es_AR.es_BO.es_BR.es_BZ.es_CL.es_CO.es_CR.es_CU.es_DO.es_E
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):24380
                                                                                                Entropy (8bit):4.718477782947421
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:dvdWxbAQaQQxdMODSYSYNeMXxXCcT85onhisI9TIx/8g+oo1eymmBTB6bfC50r:dvCAvVeOtS5MhXCcTSLTIx/h5mY
                                                                                                MD5:84CCB1F6770ED93059C5E781CB0E9D9E
                                                                                                SHA1:40ADA8F09F839F36BBFA39F38C464C9690178AD5
                                                                                                SHA-256:B36FAC95691F1C1F747750B15EE68A1E3888B8004168E495169DF0D2BD8534DF
                                                                                                SHA-512:B446363EAD158FB35428CBCAEE5946FF4E8194354FF9076C8FDB333A9ACF33A73D274D4BD98B3CB725DAE6E317540BB60D66D1A1F4FEE61D029F760D6B5631AD
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..b.....................z....i~...a.r.g.i.n.t...p.a.l.a.d.i.u...p.l.a.t.i.n.....z.a.i.r. .n.o.u...z.a.i.r.i. .n.o.i...f.r.a.n.c.i. .C.F.P...m.a.n.a.t. .a.z.e.r...s.o.m. .k...r.g...z...{.0.}. .d.e. .{.1.}...c.e.d.i. .g.h.a.n.e.z...f.r.a.n.c.i. .M.a.l.i...k.i.p. .l.a.o...i.a.n...k.u.n.a. .c.r.o.a.t.....r.i.a.l. .o.m.a.n.e.z...y.e.n. .j.a.p.o.n.e.z...t.a.l.a. .s.a.m.o.a.n.....a.f.g.a.n.i. .a.f.g.a.n...c.e.d.i. .g.h.a.n.e.z.i...c.o.r.o.a.n.e. .c.e.h.e...c.o.r.o.a.n... .c.e.h.....d.i.n.a.r.i. .Y.e.m.e.n...d.o.l.a.r. .f.i.j.i.a.n...l.e.u. .r.o.m...n.e.s.c...l.i.r.e. .m.a.l.t.e.z.e...l.i.r.e. .s.i.r.i.e.n.e...l.i.r... .m.a.l.t.e.z.....l.i.r... .s.i.r.i.a.n.....m.a.n.a...i. .a.z.e.r.i...p.e.s.o. .c.h.i.l.i.a.n...p.e.s.o. .c.u.b.a.n.e.z...r.i.a.l. .y.e.m.e.n.i.t...s.o.m.i. .k...r.g...z.i...t.e.n.g.e. .k.a.z.a.h.e...t.e.n.g.e. .k.a.z.a.h.....z.l.o.t. .p.o.l.o.n.e.z...a.r.i.a.r.y. .m.a.l.g.a.....b.i.r.r. .e.t.i.o.p.i.a.n...d.i.n.a.r. .s.u.d.a.n.e.z...d.i.n.a.r.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):37816
                                                                                                Entropy (8bit):4.615966856428233
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:yKdeOm8jlvhrjl2dVK2sEN+FOVcCy4qPCmGQBtIUHPm:BoJulvhrjQdVK2yX4qPTf0UO
                                                                                                MD5:0A898D04EBF2E9C7EEBB86D9430F0CF6
                                                                                                SHA1:BB516A6BF5A411D1AEF14094842A47311CFB3BAB
                                                                                                SHA-256:F7EE4E84B49780925AE392BD4391B9A947333DFD91D7A6FEC6B69B10C46A071F
                                                                                                SHA-512:3A9EE20AB8A2BACFC22287C5BE4A22406A4A8A287885F19F3C779298B1818AF5CA64395E9AC831836A0693CF50428E75DDE1AA35E90B98FD701F1335217663DC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB.................$. ..b......$...$...............i~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
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):132
                                                                                                Entropy (8bit):3.60831568269038
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlJFKEUmlulWd9glXliw3swle8vfJ14fn:SvTUo9g1iwp9n0f
                                                                                                MD5:CC74A2097053DC548206C81764063E94
                                                                                                SHA1:74A461B6439B0C1EBF728D88595953A15CEF968E
                                                                                                SHA-256:21AD8327F53E7313F5D10DBDE8387142224D5BC1A19FD83AD620A78463FAB4CD
                                                                                                SHA-512:ADC7BBA96E869A725CEB8496FF09DBAD2A8AA0AC28FD193E5D5E45A9637EE1AB5ED1A7EAD812BE4246A9301BEDE9D633F01101E55E84558C9F379B3B1B69DE74
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .1;..........................i~.....S.P...g.S..........`0;.`..g........................ ...P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):3.276980911276452
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQ4lf8t86Uar94IvlllQ/6n:Svzlf8W6xr9Xl46
                                                                                                MD5:0828EB96C1B6E0F15F5C95D0564A64AD
                                                                                                SHA1:9B72702525956135133A07C4D2B1C1A2BCBBE583
                                                                                                SHA-256:B6AFE46C829E2D15754F70FEFC455724BB87335394E9BAEFB6529A50EBA7F0BD
                                                                                                SHA-512:F507AAE3DC873E1A49C5D640384187CE01B0508954A315743F3835A65497ECF20234FDC5EEC90FB611A93BC1380372D94317A9B0D6509AEFA03BF0936CC88B66
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..Q....................Q.....i~........Q..w................ ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):112
                                                                                                Entropy (8bit):3.448304786330961
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlVh5tb59VPtjf+lbp4lF7Cfn:Svd9V1Bcf
                                                                                                MD5:030FC17C5A0B806EA7CE68877FD66081
                                                                                                SHA1:1EDBC17FF5B099F241BCFF57EC4E327D57C2FDD4
                                                                                                SHA-256:AFA2AAAABC93D20AE86EED279BAD1C6711264220B072B25825395DB6E0391B41
                                                                                                SHA-512:A2434CFCFE52DEA2ABF783F1135BEE0B6B720FEA51379E6F259D346FBA5A43238FC1849B879756C07C7460D5DAA136264790BE6F295E0EAD8521E553E1568D51
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~.................................... ...P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):836
                                                                                                Entropy (8bit):4.807826091118605
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:mlUNtOaxijlw0+CzJ1WUNxupJLjQXHm3XcfwYXg4YgQYYwS/YgwYYCS9lgAF:mE9i1+wJ1Wuxu/g+M4PHXHCXnCS/gAF
                                                                                                MD5:F09BA6EC637887BF827CE42F664D181E
                                                                                                SHA1:E8B2FB8468FE264361EC4A788641E06461A94764
                                                                                                SHA-256:CD71CE1AFEB8C8186B7EFE0554748EE91D8F1B9CB38F8E7E96BA39BF29594523
                                                                                                SHA-512:17A26D4186AAECAE49AE06F9A992580DD3A11A20DB5E22486F2B76A4ED192074CE6911CF920ACA84614EAFE758124C1BC9455282318C07B78CC8783FD8133573
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..j.............:.......U....i~.......ez..........,...z.....~..z....i8.....z..f....j..........n......Z8..b.vz....pT........\.x...&..%..r.!z..*.0T....K8..........$...........@T.....8.... T.....z....~............T....Tz..".......PT.....z..........`T...........z.....T..........................*.......R......z..v.Cz..w.......2z.....z.........`.).`.......`$..`....v..`HJ.`.......`.j.`.......`.<.`.......`.#.`.......`;..`.......`.5.`:.....'.C.G.c.s.w.{...........................+./.;._.c.o.s.{.............................#./.3.;.K.c.k.o...............U...................................X..............."...%...(...+.......1...4...7...:...=...@...C...F...I...L...O...R...[...U...X...[...^...a...d...g...j...m...p...s...v...y...|...^...a...d...........................g...j...................m.. ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):240
                                                                                                Entropy (8bit):4.337546316588306
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SvTl//l1vWt2DkThj5vmzU+9/OkDc5YL9LLgbfBF:4HWU6j5vmznOkDEYL9LMbL
                                                                                                MD5:3D5B99E8470EC21F627C8453DA480C72
                                                                                                SHA1:6F4F2FB089A0565DF90E42AA4F64DC6FC34AED9B
                                                                                                SHA-256:27E2AC546C139873EB16767286C90C6027FB935EB50F342C53D2C87B70A263DD
                                                                                                SHA-512:D974B040ABFB16B4880EF78AE0DC584CC4FCFF4F0213BEC8B28A9650797642314280F6D0710CBCC8E5D17431973A1F2337E86EA0D1DCBDAD7F30B0777113614D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................,.. ........4...4...........$....i~.....%.(. .4.C.>.;.;.0.@.0.....@.0.A.A.K.K.9.0. .A.>.;.:.C.>.1.0.9.0.............................................o...#...&.......o...,..P/..P............$.. )..P(.. 2..P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):3184
                                                                                                Entropy (8bit):4.009649867978744
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:VpGbUkgX2TBNUH3ZpIYz+7hHqH2H+CGjJvjmnzk5PsJ+4AyHFdIXfVHZPzc6vguL:sUkA2TBKXZpIYz+7hKWeCGjJvjmnI5PR
                                                                                                MD5:9D908D79C457772F1210E708881D3352
                                                                                                SHA1:B5206B61F24DA701A52FC3C255C0F06ED1D2D257
                                                                                                SHA-256:A64389DAA078FB7CFD8544C7FAA53D451ACFD84DC6A09B985442E7B007B02D29
                                                                                                SHA-512:CF2EB99E43E6B34C56C51E1628095F60D1BFD07A478EF7603A1DAD4E0BF59E551C901C95DA68114FAC31BC67432E3AB7A02313728AA34B324705EF8C0DCAC11F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..#.............9.....#......i~...D.o.l.a. .e.e.l. .L.i.b.e.r.i.a...P.a.u.n.t. .e.e.l. .S.u.d.a.n.i...D.o.l.a. .e.e.l. .M.a.r.e.k.a.n.i...D.o.l.a. .e.e.l. .Z.i.m.b.a.b.w.e...N.j.i.l.i.n.g.i. .e.e.l. .G.i.n.e...N.j.i.l.i.n.g.i. .e.e.l. .C.h.i.n.a...N.j.i.l.i.n.g.i. .e.e.l. .G.h.a.n.a...N.j.i.l.i.n.g.i. .e.e.l. .I.n.d.i.a...N.j.i.l.i.n.g.i. .e.e.l. .K.e.n.y.a...N.j.i.l.i.n.g.i. .e.e.l. .K.o.n.g.o...N.j.i.l.i.n.g.i. .e.e.l. .L.i.b.y.a...N.j.i.l.i.n.g.i. .e.e.l. .M.i.s.r.i...N.j.i.l.i.n.g.i. .e.e.l. .A.n.g.o.l.a...N.j.i.l.i.n.g.i. .e.e.l. .B.u.k.i.n.i...N.j.i.l.i.n.g.i. .e.e.l. .G.a.m.b.i.a...N.j.i.l.i.n.g.i. .e.e.l. .J.i.b.u.t.i...N.j.i.l.i.n.g.i. .e.e.l. .K.a.n.a.d.a...N.j.i.l.i.n.g.i. .e.e.l. .K.o.m.o.r.o...N.j.i.l.i.n.g.i. .e.e.l. .L.e.s.o.t.o...N.j.i.l.i.n.g.i. .e.e.l. .M.a.l.a.w.i...N.j.i.l.i.n.g.i. .e.e.l. .M.o.r.i.s.i...N.j.i.l.i.n.g.i. .e.e.l. .M.o.r.o.k.o...N.j.i.l.i.n.g.i. .e.e.l. .R.w.a.n.d.a...N.j.i.l.i.n.g.i. .e.e.l. .S.a.u.d.i.a...N.j.i.l.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):9364
                                                                                                Entropy (8bit):5.225150716244356
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:2I0H5647jBH3V7R1XtnXo76WD2IZ8siBjaEj+mi9:2HZrBl7R1XVJBjhj+mM
                                                                                                MD5:921B49506470F58E8B1B53E2C6286CC4
                                                                                                SHA1:4B4E0B6EEC20EFEDA2CE45E3016701DA49B37778
                                                                                                SHA-256:FCB3F4F60866BEA6B4034D7412515592F36C58C48F5363CFD6AC21C2690C720A
                                                                                                SHA-512:F9ED955871E1AED9DC4B4CA961368DEC822EC494F3DD36FED464A130D1BA8C0DEF033C99055CCDF0CA444D908D61CAF59E058914900D8F8C3B248247EAC374B6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..Q.....................V....i~...*.1...J. .D.1.'...1.H.3.J. .1.(.D...3.4.D.J. .1.~.J...A.,.J. ...'.D.1...~.J.1.H. .3.H.D.....D.J. .~.J.3.H...C.F.P. .A.1.J.F.....'.F...J.F. .1.~.J.../.'.F.4. ...1.H.F...B.7.1.J. .1.J.'.D...J.E.F.J. .1.J.'.D.....'.&.J. .(.'.G.*.....J.F.J. .J.H.".F.....J... ...1.H.F.'.....F.J. .A.1.J.F.....'.1.E.'.F.J. ...1.E...'.D.(.'.F.J. .D.J.....'.....'.*.D. .3...H...(.J.D.J.2. ...'.D.1...,.'.~.'.F.J. .J.J.F...3.9.H./.J. .1.J.'.D...3.H.&.3. .A.1.J.F.....9.E.'.F.J. .1.J.'.D...E.'.D./.J.~. .D.J.H...F.J.~.'.D.J. .1.~.J...G.J.}.J. ...H.1...J...~.H.D.4. .2.D.'.}.J.....J.H.(.F. .~.J.3.H.....J.'.F.'. ...'.D.1...".E.1.J...J. ...'.D.1...'.1./.F.J. ./.J.F.'.1...'.1.H.(.F. .A.D.H.1.F...'.J.1.'.F.J. .1.J.'.D...(.1.'.2.J.D.J. .1.J.D...(.1.E.H./.J. ...'.D.1...*.H.F...F. .~.'.F...'...*...H.F.3. ./...F.'.1...,.(.H.*.J. .A.1.J.F.....3.'.E.H.".F. .}.'.D.'...3.1.(.J.'. ./.J.F.'.1...3.H.E.'.D.J. .4.D.F.....9.1.'.B.J. ./.J.F.'.1...E.5.1.J. .~.'.&.H.F...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.897999040607968
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/dMNl6lLMhk:SBtkJYlU8g8l/d66JGk
                                                                                                MD5:8E09780D6328508528DB22AEBEAF32FB
                                                                                                SHA1:99B4A5839E27A40B666E7DDF17B390A92B6A5221
                                                                                                SHA-256:0E8549291B006F7636CDD4EE7763B91C526C8391BE5A3422873A70D63EFE83A2
                                                                                                SHA-512:0AA73AE239A6B5B8FDD5DB3999B5604AD5BA884EAB33F6409CDD7EB7DA8C7BA5B68C913D4BD418F3E97C6110CD19CEB729CE1EBF54E8023F9E09BD5EC54FFCDD
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~...s.r._.L.a.t.n._.B.A...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):912
                                                                                                Entropy (8bit):4.994000974815492
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:kOG4+SH+cmjfu16bQVuqkPlE9g+MDLYXHX/KXnUMtv:mSenjf6a7X0gVD03iXU4
                                                                                                MD5:3824BCF45CF52B4B40990164AC1B9D03
                                                                                                SHA1:4BABA32CCB5DD2900EC77DAC1BA549FF4743F7D7
                                                                                                SHA-256:926B62B8568086D42EFAB81199C3C6723921A6D0D67C1FAC1DD9CD68172BFAA3
                                                                                                SHA-512:F2DE263C9FEEF45BC9F26CA867DB802A0FF89647CD3AB6E0B7CAE49732400BD1B3A1A6AFEB856FE3A9C566AEC248DEC57580C008671E1A3B330009CDDC9C402A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .*J.............:.......k....i~...S-T-S-..M-I-b-S-O-..<-T-0-O-=- .O- .V-I-O-b-0-..0-7-S-M-0-T- .O- .c-I-N-1-0-1-a-I-.......x....@y...........x..z. y..~.......x.....7..f..x....v7..j......0y..n.]S.....%..b.?......7........&.....r..y..*.......L7....h7.....S.....7...........7....lS....{S....C.....V.....Z7.....S..".............Py.....x...........S.....x.....S.................y.........".....>7..........x..v.....w........x....\..`2..`....v..`)J.`.......`.<.`.......`...`.......`J..`.......`45.`.......`CJ.`:.....'.C.G.c.s.w.{...........................+./.;._.c.o.s.{.............................#./.3.;.K.c.k.o...............+.......1...4...7...:...=...@...C...F...I...L...O...R...U...X...[...k...^...a...d...g...j...m...p...s...v...y...|.......n...........................................................q.......................t...........w...z.......}.............. ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2688
                                                                                                Entropy (8bit):4.105742011442069
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:BGzsgdTywCf/2DHGdqtA3aPboz+wp21Umtr7F0bCddFr7ogVvXXX3+:ssU+7f/2DGdD3aPboz+waUmtr7F0mdd6
                                                                                                MD5:BAB56F22917D77B2E2BD1753D1215932
                                                                                                SHA1:D2E6EEE295F388D5ADC950FD5328B9F37D7CBFCF
                                                                                                SHA-256:6AC667347A956A659DAF44F6E7D1D08FEF43376734ECADDB8D62DE9532F0858D
                                                                                                SHA-512:22030D1FB5E1CB53845C5A9108E90DF4188A99C47BA3C76DA2526F6D6787326DFEEE989B0CC8372A76DC5DCFD8C724384C1A4B60186B9438F272DD6C9729F23D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................:.......;....i~...u.r.u...l.i.y.u.n...l.i.l.a.n.j.i.n.i...f.r.a.n.k. .c.i.f.a...s.i.d.i. .n. .c.a.n.a...a.j.n.i.h. .n. .m.i.c.[...a.d.i.n.a.r. .n. .t.u.n.s...a.r.u.b.i. .n. .l.h.i.n.d...a.r.u.b.i. .n. .m.u.r.i.s...a.y.a.n. .n. .c.c.i.n.w.a...a.y.a.n. .n. .l.y.a.b.a.n...b.i.r. .n. .i.t.y.u.b.y.a...f.r.a.n.k. .n. .k.u.n.g.u...f.r.a.n.k. .n. .q.u.m.u.[...f.r.a.n.k. .n. .c.i.n.y.a...l.u.t.i. .n. .l.i.c.u.m.u...a.c.i.l.i.n. .n. .k.i.n.y.a...a.d.i.n.a.r. .n. .d.z.a.y.r...a.d.i.n.a.r. .n. .l.i.b.y.a...a.d.r.i.m. .n. .l.m.c.r.i.b...a.j.n.i.h. .n. .s.s.u.d.a.n...a.r.u.b.i. .n. .s.s.i.c.i.l...k.w.a.c.a. .n. .m.a.l.a.w.i...a.c.i.l.i.n. .n. .u.c.a.n.d.a...a.c.i.l.i.n. .n. .c.c.u.m.a.l...a.d.i.n.a.r. .n. .b.%.r.a.y.n...a.d.i.n.a.r. .n. .s.s.u.d.a.n...a.d.r.i.m. .n. .l.i.m.a.r.a.t...a.d.u.l.a.r. .n. .k.a.n.a.d.a...a.f.r.a.n.k. .n. .r.w.a.n.d.a...a.f.r.a.n.k. .n. .s.w.i.s.r.a...a.k.w.a.c.a. .n. .z.a.m.b.y.a...d.a.l.a.s.i. .n. .g.a.m.b.y.a...f.r.a.n.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.8446240823663436
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlgelU8gl8l/dMXltDelOpG:SBtkJZlU8g8l/dMoleG
                                                                                                MD5:9107D4EEED5BE9E2DC1199A9DAA9BA61
                                                                                                SHA1:42CCE7BB3F740ACCB0114EC93FBB199271B99A45
                                                                                                SHA-256:82FEFA4EF189E698F8444D5A2DEF07A8067444321718F521A47CB44D14DE2F92
                                                                                                SHA-512:4ACC1BA39FF5F77DE961974E19A204F2B2DED8A4AC932A9BF4262CDA5AD42E96882A75E89B18B77FFB8C18A5ACFEECB6A160310E4B908D05D7EE5DD6D9905D02
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~...s.h.i._.T.f.n.g._.M.A.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):57992
                                                                                                Entropy (8bit):4.573804019962586
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:SMchF2PbODZWMWBmMagLKOwFUIOFzI62AYjfRbeKBu6GxFv3U2z4obj4H:CzbZnW5C4tywv3UL
                                                                                                MD5:E01C63C31993FD27550D0EDC1A9EF563
                                                                                                SHA1:8FC6EF9B0A786C3AF6F965EE17F5AA6BE87E6123
                                                                                                SHA-256:8850EF5B32EA979AC3282632FC68EA273FE2558202DD8B4CB7D2DCF44154FE48
                                                                                                SHA-512:663E5CDB7F60EC4D7A9566BD6D76676DD018CC6ACFA34755D7F2C9528E9AE051117C8AE6B3C55D0295A4C208406C685792640F047E4AA278AAC298FF62E559A1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB.................8. ..b......8...8........ .&1...i~...S.D.R...N.I.S...p.a.l...d.i.u.m...s.t.r.i.e.b.r.o.....r.s.k.a. .l.i.b.r.a.....i.l.s.k... .p.e.s.o.......n.s.k.y. .j...a.n...C.F.P. .f.r.a.n.k.o.v...f.o.n.d.y. .R.I.N.E.T.....r.s.k.e. .l.i.b.r.y...a.l.b...n.s.k.y. .l.e.k...f...n.s.k.a. .m.a.r.k.a...i.r.a.c.k... .d.i.n...r...i.r...n.s.k.y. .r.i.a.l...m.a.l.t.s.k... .l...r.a...o.m...n.s.k.y. .r.i.a.l...p.o.>.s.k... .z.l.o.t.....r.u.m.u.n.s.k... .l.e.i...s...r.s.k.a. .l.i.b.r.a...t.u.r.e.c.k... .l...r.a...S.A.E. .d.i.r.h.a.m.o.v...f...n.s.k.e. .m.a.r.k.y...m.a.l.t.s.k... .l...r.y...n.e.z.n...m.a. .m.e.n.a...p.o.>.s.k... .z.l.o.t.....s...r.s.k.e. .l.i.b.r.y...t.u.r.e.c.k... .l...r.y.....r.s.k.e.j. .l.i.b.r.y.....i.l.s.k... .p.e.s.o.s.......n.s.k.e. .j...a.n.y...a.r.m...n.s.k.y. .d.r.a.m...b.u.l.h.a.r.s.k... .l.e.v...d...n.s.k.a. .k.o.r.u.n.a...e.t.i...p.s.k.y. .b.i.r.r...i.n.d.i.c.k... .r.u.p.i.a...j.e.m.e.n.s.k... .r.i.a.l...k.a.t.a.r.s.k... .r.i.a.l...k.e.n.s.k... .a.i.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9159246284584364
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMe/ut6E7l+Vbr+0mli:Sv6t6gYbrlmli
                                                                                                MD5:1960AD3959332481F6D916F056B52339
                                                                                                SHA1:CEA9C67AFC66F20E4104CB6AA2DF781BCCADFD5A
                                                                                                SHA-256:DCB5A6234F2F38BECE4039140F59EA549C5CEF8191CDA68FDAE9D5B6106D9B4F
                                                                                                SHA-512:C7BE9FB55877D5418AFB221F94F131E02A2C88C55216E2A1B9967B3DDE70B47336D8878B97CB64228A7DDDA55DC4665517F1F8E8DF2B997E2895AFE62F9A3986
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.8697433784015027
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMl06E7l9llxr+uh9:Svu06g9llxr/n
                                                                                                MD5:CE55127B1FCC3888A81797703F5EBB94
                                                                                                SHA1:41C9A2D294B61F92B88107680AD46243B40C3699
                                                                                                SHA-256:10DAC042284C569D4DA24E29FD3C0274B89A0B32FA06CADA191F2D3873553FCA
                                                                                                SHA-512:D62C664647CFED4859287CA9F3948FACA795B1D300AE885B446A65134D36AA6FD216A6CA19FDD6BA97A76A3297A27CD7F742789421D6E1281CF4C917B923C835
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.X....................X......i~.......W.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.463875210299606
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/xr+yhll:SBtkJ1li6gml/xrjJ
                                                                                                MD5:C64F71AE20060954B9E32C5B9DA51C65
                                                                                                SHA1:1E33967C51E09874F6A1DE9A9C3539DB9CA82A63
                                                                                                SHA-256:1F132CA885D786C508137E5A798DCA175FDD0D486A134931FCC3803DB934B735
                                                                                                SHA-512:CAAAD60303A93E38E881D7FC3C711D7A52ACB59511A65BEE549193067F88B870BFF2DAEBDDFAE6D4ED366F93D3D7003EC5B0AC13890B9187F9A37D2BE8831D17
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9486907468225554
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMLs06E7lA5r+uh2vn:Svz06gA5r/gvn
                                                                                                MD5:A1A03E4AE0BB3120DAA7F925F9754736
                                                                                                SHA1:244855F29A028C974B0E908CD8E4CEE11F65E56C
                                                                                                SHA-256:FD67C6594B5413B30F3D04973480904EC2179107B767666C37A8A55C90918EA6
                                                                                                SHA-512:04C5B3FFB40B64422F94929E0181879CB7DE1E8D07D5B2C59ACA1E5E88A33503BA3A6E377C064C5675D0522C49F6853BD28E5141B9227846336F2686D551E987
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.897999040607968
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/dMNl6lSU5Wul/kB:SBtkJYlU8g8l/d66/5WutkB
                                                                                                MD5:AD95203D99A7C8F9EDD9D394D1CBB580
                                                                                                SHA1:9E28470FEAA13EAF13FE2EE15CDE3355CCFBB39B
                                                                                                SHA-256:BE427B86712AAD38000658279D1EB25EAF9BE9D839A97EC6143E8E9723B01E87
                                                                                                SHA-512:9D94B0CA833F5CC51C76B0394A4F3247AE282BBDFA1849F8E3536548955AF53DF80D24C3F34E97D1FAD9C17914FF81C1760848126138E65150719AD6E763187F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~...s.r._.C.y.r.l._.X.K...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9486907468225554
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMLs06E7lA5r+uh2vn:Svz06gA5r/gvn
                                                                                                MD5:A1A03E4AE0BB3120DAA7F925F9754736
                                                                                                SHA1:244855F29A028C974B0E908CD8E4CEE11F65E56C
                                                                                                SHA-256:FD67C6594B5413B30F3D04973480904EC2179107B767666C37A8A55C90918EA6
                                                                                                SHA-512:04C5B3FFB40B64422F94929E0181879CB7DE1E8D07D5B2C59ACA1E5E88A33503BA3A6E377C064C5675D0522C49F6853BD28E5141B9227846336F2686D551E987
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):20696
                                                                                                Entropy (8bit):4.281117984299618
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:d968do9Rh2/kHr5C00gT50gNDl74TJ+qNe3r676aHHO:IKgNh4JBJU
                                                                                                MD5:D067C8CE3452D85AD93C2F10BA372D81
                                                                                                SHA1:13330649673116449AB65AEC08A4DA8E3DEEBE26
                                                                                                SHA-256:14982A5C5EE07293DCBD3DA536B20CFC2BBB7BDC0B88912D38100A59E5B43EC0
                                                                                                SHA-512:E4A5BF0CE83ADD26E89A9ED41642BD8C62DFCD0AAE43896633303D440AA13E832C870BD982F00313A981312BB260C8C11A3D2CCCEDBAC0B9D1A138596D8058DF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................$.. ..j..........................i~...S.o.l. .y.a. .P.e.r.u...S.o.l. .z.a. .P.e.r.u...P.e.s.o. .y.a. .C.u.b.a...D.o.l.a. .y.a. .F.i.j.i...K.i.p. .y.a. .L.a.o.s.i...P.e.s.o. .z.a. .C.u.b.a...R.i.a.l. .y.a. .I.r.a.n...d.o.l.a. .y.a. .F.i.j.i...d.o.l.a. .z.a. .F.i.j.i...k.i.p. .y.a. .L.a.o.s.i...k.i.p. .z.a. .L.a.o.s.i...r.i.a.l. .y.a. .I.r.a.n...r.i.a.l. .z.a. .I.r.a.n...P.e.s.o. .y.a. .C.h.i.l.e...r.i.a.l. .y.a. .Q.a.t.a.r...D.i.n.a.r. .y.a. .I.r.a.q...P.e.s.o. .z.a. .C.h.i.l.e...R.i.a.l. .y.a. .O.m.a.n.i...R.i.a.l. .y.a. .Q.a.t.a.r...R.i.a.l. .y.a. .Y.e.m.e.n...T.a.l.a. .y.a. .S.a.m.o.a...c.e.d.i. .y.a. .G.h.a.n.a...c.e.d.i. .z.a. .G.h.a.n.a...d.i.n.a.r. .y.a. .I.r.a.q...d.i.n.a.r. .z.a. .I.r.a.q...r.i.a.l. .y.a. .O.m.a.n.i...r.i.a.l. .y.a. .Y.e.m.e.n...r.i.a.l. .z.a. .O.m.a.n.i...r.i.a.l. .z.a. .Y.e.m.e.n...t.a.l.a. .y.a. .S.a.m.o.a...t.a.l.a. .z.a. .S.a.m.o.a...D.o.l.a. .y.a. .G.u.y.a.n.a...R.e.a.l. .y.a. .B.r.a.z.i.l...D.o.l.a. .y.a. .B.e.l.i.z.e...D.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):3.272176235559989
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQC2l/88tuq5r9VUillQ/6n:SvJC/88Iyr9546
                                                                                                MD5:F7CC579D402A7319CC4673C12D1317ED
                                                                                                SHA1:193ECB9B1A3A797CDFD31A8734F34E0D7D747D72
                                                                                                SHA-256:34648DAE797C375677666B965AE5701BBE64C6E1242C13D7F1E3CE0CFEE8EBA9
                                                                                                SHA-512:1D822DD38EB48000D2F196DA8DB6DF77EC4491FAD52DB53CC1E159B5853AAC5A7759A4611D2D19BFD19343202AB7D4E62C3E37A205CBA42BDE05CDB3F1C7B365
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .S....................S......i~.....B.R...k................ ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):17184
                                                                                                Entropy (8bit):4.686950440861322
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:gg6mRRdJebKkyOVIUvy5QF24rNLw/snW19CDKj2/TLmXWf:ddusfMKjOLd
                                                                                                MD5:9F553ACCE6CEAD76C65B70125AC45AB0
                                                                                                SHA1:72D47638F170575C63C74B88F52DB732BB978F93
                                                                                                SHA-256:0105681B01A06828ACD598DCF8B267C12E1A7F5FD6398C256B7CF66B0F2FBE2D
                                                                                                SHA-512:3A1304C6315759E169D32F6750AA4E3A451B3F0CB312DB1F2139BCAFA1513A573BD2C0804DEC8E955D309056BBA4C72BC678A6DF70A9FC648263AD70A0E49FAC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~..................... ..................................... ....................... ........................... ......................... ..................... ............................. ..................... ............................. ....................... ......................... ............................. ............... ........... ....................... ............................. ........................... ......................... ........................... ............................. ......................... ............................... ....................... ............................... ............................. ........................... ............................. ................................. ........................... ............................... ........................... ............................... ........................... ........................... .....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):124
                                                                                                Entropy (8bit):3.5980244129747705
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tluMmvn95lWhiTCkznwOt/V/+Fn:Sv7mvn95l+iTCkLwOt9/+F
                                                                                                MD5:169F2FF7D98CB2A54449E789069B9A06
                                                                                                SHA1:5513F0CE09DE00CAEAA0050967FDE6477A670F38
                                                                                                SHA-256:5B658B61B81993EC1F7D12FAAF2DA0A165B72E8ACA451C57C2A5441955D95DD0
                                                                                                SHA-512:C666A467DD062CC22442AA4D42BB18DE3A22E794D203EF15B9E3026560244726871BC0B57E7765A0FD9CD301A64CFDF67C3A466F6BAE779D385018EA1360F134
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...................NS......o........................ ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):904
                                                                                                Entropy (8bit):4.60945162615726
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:5bAWyfWyci/eihnaMLqKHzFaMXMB7milLDL4lln4EfDkKVL2bUvvzrz2GTjnHXsF:hAT1/damNc0+NX4X4ukY2Azrz2GTr8F
                                                                                                MD5:2F40F00FA94A048A0CE73AA75C55B2DA
                                                                                                SHA1:B879C9C4FC85A2AB99A54203CE6D657F5340114E
                                                                                                SHA-256:5BCB82754164C667256BAF6AF1D6037ECDCDB2DAEAE4B7BCAD44C271DCC148B4
                                                                                                SHA-512:B9F69C43765F9AA3295D213CA0D507C70DD742504DF841EC00BC98C4F4BB55E5D11A7E049D4E512D2E3103E4A07F0F3E3FDB9289976159C9BBEE1EAD30ECBFDE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~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c.....?.................................W.........+...o.......\...............................z.....Q.............................-...........W.........+...C.o...............................................W.........+...C.o.....0..P3..P6..P9..P<..P?..PB..PE..PH..PK..P............... ...P... N..P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):2.9886793699589003
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtldelFal9lcmdk/9Y4V:SBtkJUlY8md+B
                                                                                                MD5:85CEE841BDC8B2D3A0B6544576DBEAD7
                                                                                                SHA1:05C1647984FB86E890697B162A14E86D77506A9E
                                                                                                SHA-256:2C2D2E70731EE8D8A596F4DAAE3C37AFDBDA3E1D4749C1CAE3CC0A0F089457BE
                                                                                                SHA-512:80E6371924D1358C1CE7698E9EE1242E1B1121D48C00CCED521D0E60ABF4F62BF6D2BFFB15039DB7C0C335BA0A0BCF39A59C23AFE591BC95220ACF20572096A1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~...b.u.d.d.h.i.s.t.....S.......J....P
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):92
                                                                                                Entropy (8bit):2.768295007707197
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlF112lYlilljXZl916:SBtkJclIil9XZl9s
                                                                                                MD5:4A961CCB7DD7A06BCD13A045A1B5A1E4
                                                                                                SHA1:7F4A21794BE6C657423B6A14995EB9CB9700B788
                                                                                                SHA-256:06919C5A4235F272011337486F6316740FC36D66C1966EE60961B5FF2592E04A
                                                                                                SHA-512:F232D010796C3F65C9B1DF10CE98DB4EF4CAC6D91F74388A13EF6F009372C5043D7D602F72D380F71E00E1FF6C03571BDA9CB800D55257DBF50975E6CE5C9019
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~...f.i.l._.P.H...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):368
                                                                                                Entropy (8bit):4.213539328812314
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SvyCllhbrul8+vTCkXz3EEW+ElHEleEeezlvPKYVAClfWLlmVehszUbtk1dkREF:BmK8+L1EdElQtxsc8Ihs1+Rs
                                                                                                MD5:88C867D25268AC1462F923C728294CAB
                                                                                                SHA1:4447F50A2AB23E12DC3C2D9E82D3161ADA35F2C8
                                                                                                SHA-256:888C29490B9F2E42E14C42FF5DCAA69ED6873DF6B5C9465CF9F7247B47F290C5
                                                                                                SHA-512:2FFC654CDE020005755FC091D04F0785FC17B876AB2A4CB9AE901FBE169507C8513FDF60ABF28DE05615EB8791700ADFAB3B1AA295B2EFAB7E60AF48B53C5F00
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................L.. ........T...T...........;....i~...A.U.D.$...N.Z.D.$...P.a.. a.n.g.a. .T.a.. e.. i.l.o...T.a.l.a. .f.a.k.a.h.a...a.m.o.a...P.a...a.n.g.a. .f.a.k.a.t.o.n.g.a.......................?.@...../.......................@...../.................'.W...O.......?...B...E...H...K...N.....'.O.......T..PW..PZ..P]..P............;.. Q..PE.. `..P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):25244
                                                                                                Entropy (8bit):4.889800301143363
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:LJsomVIGBnJGp2F3JPKEow0+GJuWYT+XI4CBPiI75Of:LJsomVIGBnJGp2F3J1ow0+Gmi44Sb9Of
                                                                                                MD5:B4769B615A8F5D94CAC4D9EE8B305ABB
                                                                                                SHA1:3BE922C8EC92D36E7B9CB4B036F45F8D981F7896
                                                                                                SHA-256:4AB0B84C8AF30FC853A97B267A24022E5458C58F643F4CDEDF90EFF2FE0EEF63
                                                                                                SHA-512:2C6E390F46EFB9D1F5CDE00E10C013F0B97D299D77D1AD5512AD332CE11FE2B09FC4DC2F513F88B5464C94BDC6DC66F9DA54348F6CE99DC10A3305CE6701EC36
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..b...................K.....i~...A.l.t.1.n...G...m..._...P.a.l.a.d.y.u.m...P.e.r.u. .0.n.t.i...P.e.r.u. .s.o.l.....P.e.r.u. .S.o.l.....W.I.R. .A.v.r.o.s.u...W.I.R. .F.r.a.n.g.1...A.B.D. .d.o.l.a.r.1...C.F.P. .f.r.a.n.g.1...J.a.p.o.n. .y.e.n.i...R.o.m.e.n. .l.e.y.i...A.B.D. .D.o.l.a.r.1...C.F.P. .F.r.a.n.g.1...F.a.s. .F.r.a.n.g.1...J.a.p.o.n. .Y.e.n.i...B.u.r.m.a. .K.y.a.t.1...F.a.s. .d.i.r.h.e.m.i...F.i.j.i. .d.o.l.a.r.1...G.i.n.e. .f.r.a.n.g.1...H.a.i.t.i. .g.u.r.d.u...I.r.a.k. .d.i.n.a.r.1...R.u.s. .r.u.b.l.e.s.i...S.1.r.p. .d.i.n.a.r.1...T...r.k. .l.i.r.a.s.1...0.r.a.n. .r.i.y.a.l.i...^.i.l.i. .p.e.s.o.s.u...F.a.s. .D.i.r.h.e.m.i...F.i.j.i. .D.o.l.a.r.1...G.a.n.a. .S.e.d.i.s.i...G.i.n.e. .F.r.a.n.g.1...G.i.n.e. .S.y.l.i.s.i...H.a.i.t.i. .G.u.r.d.u...I.r.a.k. .D.i.n.a.r.1...M.a.l.i. .F.r.a.n.g.1...R.u.s. .R.u.b.l.e.s.i...S.1.r.p. .D.i.n.a.r.1...0.r.a.n. .R.i.y.a.l.i...^.i.l.i. .P.e.s.o.s.u...F.i.n. .M.a.r.k.k.a.s.1...M.a.l.t.a. .L.i.r.a.s.1...Y.e.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.917999040607968
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/dKSlH3s0S:SBtkJYlU8g8l/d/d3s0S
                                                                                                MD5:DDBF4F267F436E5B2BF36BA490D37A57
                                                                                                SHA1:AAFBD9B971C2E02CB86BB9789AD00C3128E54084
                                                                                                SHA-256:FD7452416A9A0690CCC83D32596EAFC58C9F279402582FD2934F81D4D1DF69FB
                                                                                                SHA-512:044BE61439C98901029DC0F8BCC246396E6E836D35E6DEB26ED34B190EBAD43FC1C3A9FFD522E9AB86A29A07A1A5C573C80099BEFED69B3EF739FCD946B2482B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~...u.z._.A.r.a.b._.A.F...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9159246284584364
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMe/ut6E7l+Vbr+0mli:Sv6t6gYbrlmli
                                                                                                MD5:1960AD3959332481F6D916F056B52339
                                                                                                SHA1:CEA9C67AFC66F20E4104CB6AA2DF781BCCADFD5A
                                                                                                SHA-256:DCB5A6234F2F38BECE4039140F59EA549C5CEF8191CDA68FDAE9D5B6106D9B4F
                                                                                                SHA-512:C7BE9FB55877D5418AFB221F94F131E02A2C88C55216E2A1B9967B3DDE70B47336D8878B97CB64228A7DDDA55DC4665517F1F8E8DF2B997E2895AFE62F9A3986
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):836
                                                                                                Entropy (8bit):4.807826091118605
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:mlUNtOaxijlw0+CzJ1WUNxupJLjQXHm3XcfwYXg4YgQYYwS/YgwYYCS9lgAF:mE9i1+wJ1Wuxu/g+M4PHXHCXnCS/gAF
                                                                                                MD5:F09BA6EC637887BF827CE42F664D181E
                                                                                                SHA1:E8B2FB8468FE264361EC4A788641E06461A94764
                                                                                                SHA-256:CD71CE1AFEB8C8186B7EFE0554748EE91D8F1B9CB38F8E7E96BA39BF29594523
                                                                                                SHA-512:17A26D4186AAECAE49AE06F9A992580DD3A11A20DB5E22486F2B76A4ED192074CE6911CF920ACA84614EAFE758124C1BC9455282318C07B78CC8783FD8133573
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..j.............:.......U....i~.......ez..........,...z.....~..z....i8.....z..f....j..........n......Z8..b.vz....pT........\.x...&..%..r.!z..*.0T....K8..........$...........@T.....8.... T.....z....~............T....Tz..".......PT.....z..........`T...........z.....T..........................*.......R......z..v.Cz..w.......2z.....z.........`.).`.......`$..`....v..`HJ.`.......`.j.`.......`.<.`.......`.#.`.......`;..`.......`.5.`:.....'.C.G.c.s.w.{...........................+./.;._.c.o.s.{.............................#./.3.;.K.c.k.o...............U...................................X..............."...%...(...+.......1...4...7...:...=...@...C...F...I...L...O...R...[...U...X...[...^...a...d...g...j...m...p...s...v...y...|...^...a...d...........................g...j...................m.. ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):584
                                                                                                Entropy (8bit):4.407512034023909
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:blmebAeeQMe4OCtqFNwuL8iJmRWiJXbR8TM0Ftavt7uNcsCSFz:bLAQ7rKR9R8o03avBuNcsC2z
                                                                                                MD5:A8EE52CBA875B8C8E3CE9AC7FE4B8180
                                                                                                SHA1:8C8CA9D1DDEF698405887FA0386CED852F5E528A
                                                                                                SHA-256:C73552857FB89A29804AD6684FAEA24FFC6301C4A55D039DEE0D6A878A139EC1
                                                                                                SHA-512:F0D266D850F7AC7023707759463FAAACE788CB407A76B3EDA5FEAB72275AB86DE7855674630C811F5342AC46A8904A8A3EF7F675A3F0EA3D75552A1CE18A1E1B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .2....................2.g....i~...I.n.d.i.a.i. .R.u.p.i.e...I.n.d.i.a... .R.u.p.i.e...C.h.i.n.e.s.i.a.i. .Y.u.a.n...C.h.i.n.e.s.i.a... .Y.u.a.n...U.n.b.e.k.a.n.n.t.i. .W...r.i.g...B.r.a.s.i.l.i.a.n.i.a.i. .R.e.a.l...B.r.a.s.i.l.i.a.n.i.a... .R.e.a.l.......|.....M.....h...\.._....3...........1......X....k.........|.......\.M.......h.h........_._......@.3.................1.1........X.X......k.k...............W.........+...o...n...q...t...w...z...}.................W.........+...o......P...P...P...P...P...P...P...P...P............g.. u.. ...P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1892
                                                                                                Entropy (8bit):4.384562017949789
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:nYSLiPgL11tOOaIRiq31vQcolFDow2T+5QsgV3zb:nYSLiPgL15DRiPZopDTV3zb
                                                                                                MD5:B89B57691C731C580E4B2597F2016B73
                                                                                                SHA1:8BE9AF989ED73CB75497C3EC31E4D06D1F13D475
                                                                                                SHA-256:04A7133D4591A127D31C2C411B2B3AB0602E3CC1DC612D2F729C497928604A6F
                                                                                                SHA-512:E0D20BFBDD093454B95126A70936F678871B987CA3E43BEF6F93A55764E04261AA5F92603506B5F56844729B4FAC5BB31C9526C8C453F438AC1406708F3BFE25
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .sl.............9.......D....i~...L.e.w.o.n.e...L.o.t.i. .y.a. .L.e.s.o.s.o...Y.e.n.i. .y.a. .J.a.p.a.n.i...D.o.o.l.a. .y.a. .K.a.n.a.d.a...F.a.r.a.n.g.a. .y.a. .G.i.n.i...K.w.a.n.z.a. .y.. A.n.g.o.l.a...B.i.i.r.u. .y.a. .E.s.y.o.p.y.a...D.a.l.a.s.i. .y.a. .G.a.m.b.y.a...D.i.n.a.a.l.i. .y.a. .L.i.b.y.a...D.o.o.l.a. .y.a. .L.i.b.e.r.y.a...P.a.w.u.n.d.a. .y.a. .M.i.s.i.r.i...P.u.l.a. .y.a. .B.o.t.i.s.w.a.n.a...R.u.p.i.y.a. .y.a. .B.u.y.i.n.d.i...D.i.n.a.a.l.i. .y.. A.l.i.g.e.r.y.a...F.a.r.a.n.g.a. .y.a. .J.j.i.b.u.t.i...F.a.r.a.n.g.a. .y.a. .b.u.r.u.n.d.i...D.i.n.a.a.l.i. .y.a. .B.a.a.r.e.e.n.i...N.a.k.i.f.a. .y.a. .E.r.i.t.u.r.e.y.a...P.a.w.u.n.d.a. .e.y.. e.S.u.d.a.a.n.i...D.o.o.l.a. .y.. A.w.u.s.i.t.u.r.e.l.y.a...P.a.w.u.n.d.a. .y.a. .B.u.n.g.e.r.e.z.a...E.s.i.k.u.d.o. .y.a. .K.e.e.p.u. .V.e.r.e.d.i...P.a.w.u.n.d.a. .e.y.. e.S.e.n.t.i. .H.e.r.e.n.a...Y.u.w.a.n.i. .R.e.n.i.m.i.n.i.b.i. .y.a. .C.a.y.i.n.a...F.a.r.a.n.g.a. .y.a.m.u. .A.f.i.r.i.k.a. .y.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):988
                                                                                                Entropy (8bit):4.654054242383244
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:c5eYEblPclOJE1kO/hE+RnZDcCpH4GLFXo:4+uyjO/h1RZwW4Ko
                                                                                                MD5:F4AABC6B23D3BD25C09A1BBDEC63B447
                                                                                                SHA1:BFA3FE017BC6580327DA5929CCC8A9FF4F77E942
                                                                                                SHA-256:5E8CA212EB5698FD2F6B6AE266B3000B0EF0606C52CEADF3461C34E9D9AF13BE
                                                                                                SHA-512:2577B047A299EB21F0F4D6335FFEFB594FF65DA7FDF2616617BF6E8B8935F3D6610A10FA7F4AC3B1D619625CDE5311980D69A14BB251AD7CDB7E8CD3505ED048
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .............................i~................................................... ....................... ......................... ......................... ..................... ........................... ............................. ........................... ..................... ..................................... ............................... ......................... ................................... ............................. ............................. ..................................... ......................................... ...........................z.....f.h...............\.............G.........:.8.....W...........................+...o...\.................................................................G.).................W.y.............W.o.{.........+.....o.+./.........................!...$...'...*...-...0...3...6...9.....W.........+...o...I..PN..PS..PX..P]..Pb..Pg..Pl..Pq..P............... <..P... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.8446240823663436
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlgelU8gl8l/dGKlAl6lazlI/kx:SBtkJZlU8g8l/dDal6leGkx
                                                                                                MD5:75B011D02D63B77CA0C21C3F35552109
                                                                                                SHA1:2D1B0EC3BD811D1D74B726036BAF731F4E9C9194
                                                                                                SHA-256:A564B942279C3F05AC249F7148F6C925C5199A10DFF6702F57C97965A2247D7E
                                                                                                SHA-512:061B71932A3020B9030EB5C291F30E87683110FA75E7CF6496C398609104A1F95E82670DFF8AB5763510D1A1D3C07A4258FC296C6F9C66A6F8BDD800F4DE272C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~...y.u.e._.H.a.n.s._.C.N.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.948690746822556
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM0E/66E7lXr+uhL:SvO/66gXr/N
                                                                                                MD5:26EA16780F22AEE7F9C7214AE43A2112
                                                                                                SHA1:7B1B1CB9DA311A503EF14177139AD5E19F569A01
                                                                                                SHA-256:4CF80C1BEB6035861DB18C3E0EE97998B37948A3087B9D3984B19517E5567749
                                                                                                SHA-512:CB3FAA598B8862EED58EAE2874666D58E161B9A5559D47BE9618F5744FA4DC38E56C8FF9A75D9E49D00611D19C5AAE558D087D3C91D61D60917EFD18050629E9
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.#....................#......i~.......".
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.937999040607968
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/dFZRysr:SBtkJYlU8g8l/dFZv
                                                                                                MD5:9646047BCCEACAEAB2803D2396A9C46D
                                                                                                SHA1:FA843E3E3DEDE95B251AE0858A52C2C1773D28F0
                                                                                                SHA-256:41176DB75B4AA71856B7284865D41DD2C37DD8FEFF838DEC665F4B29D2915BEB
                                                                                                SHA-512:A3786F18538D2080E2FE5C8C0E6675C33B8A958D59520B0A0B62E737B258E5A0AFB3453B4C9DB100226FFA3AAB178427C979B8E6F5ED4EA2EE3CBC58509CE594
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.............................i~...z.h._.H.a.n.t._.M.O...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
                                                                                                MD5:CF788FA9793FEA6104E904FBA48B9ADE
                                                                                                SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
                                                                                                SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
                                                                                                SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):19332
                                                                                                Entropy (8bit):5.419925826094204
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:BCH7yddL0RIuwGjIaE89EGh2hupscziGV5UzhxKUyShhpCSMx9UGauBrKeS:BCH7yL/uwGUzBhuphz5exHyShhaxmGXi
                                                                                                MD5:7F2F2773D81477A2BA2DC5334E418CC1
                                                                                                SHA1:490CD01A6D1A2B249BE2EDD25BF649C9DF09C72C
                                                                                                SHA-256:28990FB74EE58F9136E37FD097DB00A50A662FD8791AEBBD4677C74DA34AC1A8
                                                                                                SHA-512:5D0508B329D13E227D52038208F1599EC05FC0573E55132CE814398B0868E0CF9E6D44339E72A9F30DC2909E2EC29D2705D56D616E45474BB425DA122296B1B9
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................V................A.w...D.i...S.o...W.T...D...i...O.r.t...T./.J...W./.M...T.o.b.i.....s.a.r...l.Y.r.r...A.f.f.e...F.r.a.u...H.a.h.n...H.a.s.e...H.e.r.z...H.u.n.d...K.a.n.a...M.a.n.n...T.i.e.r...P.a.o.n.i...P.a.o.p.i...T.h.o.u.t...$.a.m.l.e...*.Y.d.a.r...A.b.e.n.d...N.a.c.h.t...h.e.u.t.e...I.j.j.a.r...S.i.w.a.n...V.o.r.m.....N.a.t.u.r...P.f.e.r.d...R.a.t.t.e...S.e.p.t.....S.p.o.r.t...T.a.s.t.e...Z.i.e.g.e...j.e.t.z.t...G.Y.n.b.o.t...H.a.t.h.o.r...M.e.s.o.r.i...T.a.+.[.a.[...l.Y.q.Y.m.t...M.i.t.t.a.g...M.o.r.g.e.n...a.b.e.n.d.s...n.a.c.h.t.s...K.i.s.l.e.w...N.a.c.h.m.....T.a.m.m.u.s...n.a.c.h.m.....A.n.d.e.r.e...B...f.f.e.l...D.r.a.c.h.e...F.l.a.g.g.e...K...r.p.e.r...P.e.r.s.o.n...P.f.e.i.l.e...R.e.i.s.e.n...S.m.i.l.e.y...W.e.t.t.e.r...Z.e.i.t.z.....A.s.h.a.d.h.a...C.h.o.r.d...d...E.s.s.f.a.n.d...M.e.s.c.h.i.r...V.a.g.u.m.e.n...m.o.r.g.e.n.s...S.c.h.e.v.a.t...T.i.s.c.h.r.i...F.l.a.g.g.e.n...G.e.b...u.d.e...G.e.p.a.a.r.t...O.b.j.e.k.t.e.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):588
                                                                                                Entropy (8bit):4.57320275301365
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:oXEfyl2CBXlU+pjxrUxXlU05p4wP8TppiPPUotr8oVs0:oXuRaOkxAxOUP83iPcAIG
                                                                                                MD5:E670379BAD562D53F6C9D9E05A7EE576
                                                                                                SHA1:4960472CE76A72BB21E0A03D0E3CD15685FAF82D
                                                                                                SHA-256:837DC87AEB9BDC01B18DDE833EF23D10AA2406491CED00BFC4EA47F8FFAD8B8B
                                                                                                SHA-512:5C586A977B20DE758210770FFB935DAD159BE32D8CF51EBE0B31A3DCCA844D65A6A1C898FF1725495B460290A7F7F62B572FD4464AA4813FF4C86600F0E74C40
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................\........D.i...S.o...T.a.g. .d... .J.....W.o... .i... .M.....W... .i... .M.o.n.....W.o.c.h.e. .i.m. .M.o.n.a.t...W.o.c.h.e.n.t... .i... .M.o.....W.o.c.h.e.n.t... .i... .M.o.n.....W.o.c.h.e.n.t.a.g. .i.m. .M.o.n.a.t.........y......................T.Ts#.Q................H..s.b....*..................%....Z.....I.....9.........H.!.W.C.M..B..........i..Pn..P....\.. ..!.s.......b.. ....d.. ..`.f.. .......P....>...........'.6.L...{..P~..Pj.. ...P...P...P...P...P...P...P..O.......W.|.. ....[...o.w...D....`...``.. ...`h.. l.. ~..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
                                                                                                MD5:CF788FA9793FEA6104E904FBA48B9ADE
                                                                                                SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
                                                                                                SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
                                                                                                SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):10024
                                                                                                Entropy (8bit):5.547764666835321
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:ctlyalAJEBJMInGA64W/H5q3aiAlt0VV50dg5QyL4pkbB6HTWlp1+:crWP5/9thQQDelp8
                                                                                                MD5:B3F6199FDE5D1E86BD090D721D01C041
                                                                                                SHA1:812E437F5F438312739F106D0B4A7C74D61937C5
                                                                                                SHA-256:B2CE4567252D640C2B266DB61A85F1C9DF924E45EDDCC334FAB7C94D93BF542A
                                                                                                SHA-512:15167646D16A155B878020507C8C1C06FF7B9BEE0BCB8936CE629F6FC2A6C09523D39B601AF47A72D0E4B823548A3A810CE6FDD3464DBDB3CE521362CB5031E7
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................1...............n.j...p.....p.....s.r...p...n...p...t...s.o.b...s.r.j...s.t.w...w.a.B...a.w.g...m...r...a.w.g.....c.o.r.a...m.a.j.....m.a.j.a...m...r.....m...r.c...n.o.w.....B.o.n.i...a.p.r.y.l...m...r.c.a...w.i.t.[.e...w...t.p.....z.n.o.w.a...z.i.n.s.a...s.r.j.o.d.a...a.p.r.y.l.a...e.p.o.c.h.a...g...z.i.n.a...j.u.l.i.j.a...j.u.n.i.j.a...l...t.o.s.a...t.o. .p.......t.u. .n.j.....t.u. .s.o.....t.u. .s.r.....t.u. .w.a.....n.j.e.z.e.l.a...w.a.B.t.o.r.a...a.w.g.u.s.t.a...j.a.n.u.a.r.a...o.k.t.o.b.r.a...t.e.n. .p.......t.e.n. .s.t.....t.u. .n.j.e.....t.u. .s.o.b.....t.u. .s.r.j.....z.a. .{.0.}. .z...z.a. .{.0.}. .g...z.a. .{.0.}. .m...'.z.e.g.'... .H...a.m.e.r.i.s.k.i...b.r.i.t.i.s.k.i...f.e.b.r.u.a.r.a...m.e.t.r.i.s.k.i...n.o.w.e.m.b.e.r...n.o.w.e.m.b.r.a...t.e.n. .p...t.....t.e.n. .p...t.k...t.e.n. .s.t.w.....t.o. .p...n.j.....t.u. .w.a.B.t.....p.[...n...l...c.....p... .C.h.r...n.....p.[...C.h.r...n.....t.e.n. .t.y.z.e.D...t.u. .s.r.j.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2172
                                                                                                Entropy (8bit):5.152976967217277
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:s3ASPkvcjdXeM82L8hGwQeyYalIGMhmVbWpFVkme:sXKidXebJvyDlVXdW7I
                                                                                                MD5:D30165FDE0C4929AE82A4BD11846D1AA
                                                                                                SHA1:D0E4AB8445DA08A0E7FEBD99C8BCBB09DDFB9091
                                                                                                SHA-256:5C0DCF5801B243528806DF4E40B332712CE4FA79C7D8FA656B808CE7C7F8B62D
                                                                                                SHA-512:2480C3C355F9EDE0093E42E38C9C34F6423B1BF74E97046CD0EA95F8353734A694C399FA33232A7520AC99D6C8659146293F1AE6B822176595A24FAE7157A503
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................................W.....t...s.T.K...d.i.K...d.i.S...e.l.....e.m.i...e.s.a...e.s.T...k.w.a...m.a.d...m.b.....m.u.k.....t.i...K.g.i...W...n...m.T...s...n.y.[.t...n.d.u.1...n.d.u.2...n.d.u.3...n.d.u.4...s.T.K.[...K.g.T.n...S...Y.s...i.d.i.S.a...k.w.a.s.....k...[.l.[...m.b...Y.s...m.T...s.....n.d.T.k.T...p...n.d.....p...n.d.....K.g.i.s.....e.b.y...m.u...d.i.S...S.....t.i.n...n.....K.g.a.n.d.[...K.g.T.n.d.[...W...n.[.s.....d.i.m.T...d.i...e.l...K.g.[.....e.s.a.S.a.s.....m.a.y...s.[.....m.u.k.T...s.....n.y.[.t.[.k.i...w.[...K.g.[.....d.i.K.g.i.n.d.i...e.m.i.a.s.e.l.e...e.s.T.p.[.s.T.p.[...[.h. .q. .v. .x. .z.]...m.a.d.i.S.[...d...S.[.....e.p.a.s.i. .a. .b...n.y.....k...[.l.[. .n...t...m.b.......m...n.y... .m... .d.i.s.a.m.a...n.d...m.b.k. .n.y... .S.o.s.....S.o.s.o. .S.w... .y...S.e. .l.....m.b...s.a. .k.w...d.i. .a. .Y...s...n.d...m.b.k. .n... .l...n.d.[... ...S.a.....n.d...m.b.k. .n... .l...n.d.[... ...l...l.o...n.d...m.b.k. .n... .l...n.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):10376
                                                                                                Entropy (8bit):5.1589056607368
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:QWCjUNAvEMlKNZgsaHq8EWktI55Ha2aJ761id7lYl1:BCQNpDaK8E/toHD1GlQ1
                                                                                                MD5:43924655E6FE7A25523653D0B54F7BD6
                                                                                                SHA1:4403ED81E4633A7D4086F4C3DFDA9635DD9ECAF5
                                                                                                SHA-256:90E119321C04C1E8849149CB409F38C9022072D8AAD4974E68629FA9B2B90CE7
                                                                                                SHA-512:326B7BA34792B96E87327C72F0706F150134E2EA76B4F4A3F2AE1F278F6EE947FCB317A30130471C46A574EB338A9481A2C179B545A90159ABA7F661A7FFF60F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................/.......)........c...z.......e...B.K...E.K...k.1...k.2...k.3...k.4...Y.K...u.k...K.d.i...f.i.....K.d.T...k.T.s...b.l.a...d.z.o...f.i.V...k.u.V...m.e.m...y.a.w...a.f.T...a.n.y...d.a.m...d.e.a...d.z.d...d.z.m...d.z.v...k.e.l...m.a.s...t.e.d...........m.n.n...k.u.V.a...k.T.t.a...d.a.m.a...f.i.V.a...k.e.l.e...m.a.s.a...e.g.b.e...f.i.f.i...c.e.t.r.T...f.T.K.l.i...c.l.e.t.i...b.l.a.V.a...d.z.o.m.e...d.z.o.v.e...d.z.o.V.a...a.f.T.f.).e...a.k.p.e. .0...d.z.o.d.z.e...k.T.s.i.V.a...t.e.d.o.x.e...y.a.w.o.V.a...s.e.k.e.n.d...{.0.}.l.i.a.....e. .s.i.a...s.i.a.m.l.T.m...a.k.p.e. .0.0...a.n.y.T.n.y.T...m.e.m.l.e.V.a...a. .'.g.a.'. .h...a.k.p.e. .0.0.0...b.i.l.i.T.n. .0...m.i.l.i.T.n. .0...f.i.V.a. .s.i.a...k.u.V.a. .s.i.a...0. .t.r.i.l.i.T.n...b.i.l.i.T.n. .0.0...m.i.l.i.T.n. .0.0...c.l.e.t.i. .s.i.a...Y.e.s.u. .K.T.l.i...a.V.a.b.a...o...o...b.l.a.V.a. .s.i.a...d.z.o.V.a. .s.i.a...K.k.e.k.e.a. .m.e...b.i.l.i.T.n. .0.0.0...d.e.a.s.i.a.m.i.m.e...k.T.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):20080
                                                                                                Entropy (8bit):5.594840726632198
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:CWjQdrQwga499PIt1nj7RVVV/QnSlR8L/M7FyBUJB13:YgjGj7RVVV4ZxUt
                                                                                                MD5:AE5A517806D5DD37E2AB2EF0367F226D
                                                                                                SHA1:32AC730310CE8BDCB2AC320C7382B332DF1608FF
                                                                                                SHA-256:58C4267DE832932A98607547B1860B352E7506098DA9D7306ECDF7230FE13CC5
                                                                                                SHA-512:067D7E55FD64D6CF856F1D5722D056DD7A5E047727AB1195C415DDC3F99BA89CCF6F97EA2DD915B3E26E8D8CA8BB0F98775513E099242247E5850BE8E99B3539
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................z.. ................V....................................................................1.....2.....3.....4.....................................................................................................................................................................................................................................................................................................................g.r.e.k.........................................................................................................................................................................................................................................................................................................../...................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
                                                                                                MD5:CF788FA9793FEA6104E904FBA48B9ADE
                                                                                                SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
                                                                                                SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
                                                                                                SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):3412
                                                                                                Entropy (8bit):5.584446588534467
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:Hg0uiTualeUQgHi2rp+Ff1oNmck+lV9YL9r:Hg0uiT1AxNDcF98r
                                                                                                MD5:3FEC1D99E7260B742A5FE169CF298877
                                                                                                SHA1:909CAC90785875A4815C9FB0C9B09CD1180919C3
                                                                                                SHA-256:49765DE09FBCD1BF53A893F6509FF2EF0884D7CCBC6077915B0DF38D336DD179
                                                                                                SHA-512:C4D496CC65E80F9B578451E241D25FE47B80D35BFA3459361A00EB99606283309ACFA974AEB619BA4219840B7CFE93CCE6473038A9FBB29AB9A6F6FCBB61272C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................H.. ........M...M... .......$........w.k. .o.f. .m.o...l.a.s.t. .F.r.i...l.a.s.t. .M.o.n...l.a.s.t. .S.a.t...l.a.s.t. .S.u.n...l.a.s.t. .T.h.u...l.a.s.t. .T.u.e...l.a.s.t. .W.e.d...n.e.x.t. .F.r.i...n.e.x.t. .M.o.n...n.e.x.t. .S.a.t...n.e.x.t. .S.u.n...n.e.x.t. .T.h.u...n.e.x.t. .T.u.e...n.e.x.t. .W.e.d...t.h.i.s. .F.r.i...t.h.i.s. .M.o.n...t.h.i.s. .S.a.t...t.h.i.s. .S.u.n...t.h.i.s. .T.h.u...t.h.i.s. .T.u.e...t.h.i.s. .W.e.d...i.n. .{.0.}. .w.k...i.n. .{.0.}. .y.r...i.n. .{.0.}. .h.r...i.n. .{.0.}. .m.o...d.a.y. .o.f. .w.k...d.a.y. .o.f. .y.r...i.n. .{.0.}. .m.i.n...i.n. .{.0.}. .s.e.c...{.0.}. .h.r. .a.g.o...{.0.}. .m.o. .a.g.o...{.0.}. .w.k. .a.g.o...{.0.}. .y.r. .a.g.o...{.0.}. .m.i.n. .a.g.o...{.0.}. .s.e.c. .a.g.o...w.k.d.a.y. .o.f. .m.o...{.0.}. .F.r.i. .a.g.o...{.0.}. .M.o.n. .a.g.o...{.0.}. .S.a.t. .a.g.o...{.0.}. .S.u.n. .a.g.o...{.0.}. .T.h.u. .a.g.o...{.0.}. .T.u.e. .a.g.o...{.0.}. .W.e.d. .a.g.o......h.B7w.3E.K....,...B.B..................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):960
                                                                                                Entropy (8bit):5.757935503161978
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:Ns6sVBu5RklU8DaUDkHcgkFGDjuMSGt9f:+RVBu5AU8eUQ8VGDifu9f
                                                                                                MD5:74DA98DDF2F132C0276E5E05A7EC5824
                                                                                                SHA1:1B8FFBC90C4E6ABCD36C222C9C4447EBF6BB3916
                                                                                                SHA-256:F380F07C082FB6D5CC4034BB096A6100B076BC7C6FBD809E44D55EEF4765DE25
                                                                                                SHA-512:E56B4E82D0B3BCA0770D47016710DCA56FD3A4B986696170657B4DFAB74FEE9D2C75D0A2073DFDBAF4D9192442E82E626BFAE9A6C496A417E6240E325A6BC535
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...................................h.B7w.3E.K....,...B.B......................!..... ...........!..V..?....C..4.4D....,.,.,.V...,....$.......$./.LO....$...v.....$.lNlN..............$...8.8.8.....$...?.........$....q.=.....$..........h.B7w.3.wEy.......B.B....................................!............&...DJ..4!....Cpi..?..N.C..4.4..{.pi........$.......$./.LO....$...v.....$.lNlN..............$...n.n.n.....$......a.....$.....zN.....$............h.B7w.3.wW*eh.....B.B........................W.!......... ....D!.pi.....C..4.4.4.)...eh......$.......$./.LO....$...v.....$.lNlN..............$...8.8.8.....$.............$.....N......$................!......... .2..P7..P<..PA..PF..PK..PR..PY..P`..P......5........P... ........!......... ....P...P...P...P...P...P...P...P...P......5.g...u..P... ........!......... ....P...P...P...P...P...P$..P+..P2..P......5........P... ......`.... ... ... ..o.w...f$.`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.147089260374425
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXElzxlf6tP9hn:SvKMH6tX
                                                                                                MD5:DBED6CBF5B4E215E7BC058594652C5C6
                                                                                                SHA1:14FF2242EB58DED4AE8DA0315F21AD1894CC848D
                                                                                                SHA-256:DF819C5400D36259BCA9E3F7FBDAFB6F2DA2FFA00C5CF03695D3A1A5A20E8592
                                                                                                SHA-512:0312DC0174E32ABA5FDC8EDC21D06DD613F0BC9BB24E1E502902379B997406D4B5E2A0C17E48BF582594C5D0988FA8DD3FD9A1CCC9FC386C4E453683196F2EC8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.....................................o.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
                                                                                                MD5:CF788FA9793FEA6104E904FBA48B9ADE
                                                                                                SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
                                                                                                SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
                                                                                                SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2468
                                                                                                Entropy (8bit):5.602184732072754
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:Y4cP2obFaRzrvhr5tcvpZ7Fzrbb+IWdoz6oSw+:Y9tU99yPbbiq+oI
                                                                                                MD5:6AFBCEAB26E9CDB7A0C3978067D715EA
                                                                                                SHA1:157A048D6EED10EC0B881D98025FFAE2A741D565
                                                                                                SHA-256:919F775692A2A75954C984F924CD13957534C8C3093B662641634D1A8B9B3556
                                                                                                SHA-512:17F287355174E167333397B21ED5894E8994333EA3CAE26689AF10F2C49351390AEC6387CF58ABD06314872946127B19A94176B2E63F3EF4C7E0BC8823C95E79
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................T.. ........a...a...........E........F.....T.h...T.u...W.....S.u.....T.h.....T.u.....M.o.1...M.o.2...M.o.3...M.o.4...M.o.5...M.o.6...M.o.7...M.o.8...M.o.9...[..!]...m.i.d.d.a.y...a.t. .n.i.g.h.t...w.k. .o.f. .m.o.....i.n. .{.0.}. .h.r.s...i.n. .{.0.}. .w.k.s...i.n. .{.0.}. .y.r.s...i.n. .{.0.}. .m.i.n.s...i.n. .{.0.}. .s.e.c.s...{.0.}. .h.r.s. .a.g.o...{.0.}. .w.k.s. .a.g.o...{.0.}. .y.r.s. .a.g.o...{.0.}. .m.i.n.s. .a.g.o...{.0.}. .s.e.c.s. .a.g.o...w.k.d.a.y. .o.f. .m.o.........3...........W.s...z.^.................!.%.).-.1.".'.,...P<>Id=.HD<L=.V.H.<X=2a.W.... ........$..h.h....$.......$............h.B7w.3.wW*ehc....B.B........!..N......:.........V....\........q.l,....:.........V....\........q.l,............/.T|.c^..ca.9............./.T|.c^..ca.9............./.M|.c^..c@.9.../.9.../.9.../.9...=.1.5.M.a.E.A...I...9.I..... ......1.B.|......."...L..b...c....>.?...Z....H...f...4...J..:....J..9.9....J.2F2F..J.S...J.....J.S...J.......J..7t.....J..F......
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.147089260374425
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXElzxlf6tP9hn:SvKMH6tX
                                                                                                MD5:DBED6CBF5B4E215E7BC058594652C5C6
                                                                                                SHA1:14FF2242EB58DED4AE8DA0315F21AD1894CC848D
                                                                                                SHA-256:DF819C5400D36259BCA9E3F7FBDAFB6F2DA2FFA00C5CF03695D3A1A5A20E8592
                                                                                                SHA-512:0312DC0174E32ABA5FDC8EDC21D06DD613F0BC9BB24E1E502902379B997406D4B5E2A0C17E48BF582594C5D0988FA8DD3FD9A1CCC9FC386C4E453683196F2EC8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.....................................o.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):136
                                                                                                Entropy (8bit):4.168303237889532
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlkAll/tXl7ggOZMCyP98Dn8n8UltslulflFWSkf:SvUA/bXOyxP98j8nxltVTFif
                                                                                                MD5:8E8F7836852A74DE789DD0F4C71797DB
                                                                                                SHA1:7509333C6D134B2BAD48486057F91336DC1AA009
                                                                                                SHA-256:D338E130FAFE30C63A1DDE8B6478A23DCE8D1A3716B776C44FBF9E132A392C32
                                                                                                SHA-512:4C39DD6462EA0F1F0D674BB06E8A5153A86903A91B0C04166A06C7DF3B511E6CE83CBFE19D7175C010867F97DCB80723C398B4985D68BA162C30DD15B52D1FD9
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...................................k..)...4.wW*eh.....B.B................`.... ....o.w....`...`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.147089260374425
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXElzxlf6tP9hn:SvKMH6tX
                                                                                                MD5:DBED6CBF5B4E215E7BC058594652C5C6
                                                                                                SHA1:14FF2242EB58DED4AE8DA0315F21AD1894CC848D
                                                                                                SHA-256:DF819C5400D36259BCA9E3F7FBDAFB6F2DA2FFA00C5CF03695D3A1A5A20E8592
                                                                                                SHA-512:0312DC0174E32ABA5FDC8EDC21D06DD613F0BC9BB24E1E502902379B997406D4B5E2A0C17E48BF582594C5D0988FA8DD3FD9A1CCC9FC386C4E453683196F2EC8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.....................................o.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):136
                                                                                                Entropy (8bit):4.168303237889532
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlkAll/tXl7ggOZMCyP98Dn8n8UltslulflFWSkf:SvUA/bXOyxP98j8nxltVTFif
                                                                                                MD5:8E8F7836852A74DE789DD0F4C71797DB
                                                                                                SHA1:7509333C6D134B2BAD48486057F91336DC1AA009
                                                                                                SHA-256:D338E130FAFE30C63A1DDE8B6478A23DCE8D1A3716B776C44FBF9E132A392C32
                                                                                                SHA-512:4C39DD6462EA0F1F0D674BB06E8A5153A86903A91B0C04166A06C7DF3B511E6CE83CBFE19D7175C010867F97DCB80723C398B4985D68BA162C30DD15B52D1FD9
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...................................k..)...4.wW*eh.....B.B................`.... ....o.w....`...`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):324
                                                                                                Entropy (8bit):5.179858701245657
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SvC/seapWsuikw/t1FbQ0dv3t4bwT8j8n7k0dv3t4PqhUG/AOKtklh/F:jcWPiVF1FM0dv9g2w0dv9CTGYOjlh/F
                                                                                                MD5:4ABA537E3FDD9E3F6905F9B5960B211A
                                                                                                SHA1:E376900C0F2416AF7F87387049E06494BD9B22DD
                                                                                                SHA-256:934557876DE04EFF7088A7176872A60AEDDDD4AA8623473BCE50F0E784E0BEE9
                                                                                                SHA-512:6F8A125D0827DFC2005C94663BED3C3DACF9498B76CF72208E85C8BC0FF4A6F63AC495388F6ED3B729CB27C4733446F5883B9FD0F8FBD1879F15B262A337FE12
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................B.. ........I...I...........2.............)......../.NN..'...................I.......Y.0.*..*X..5.7.*.*.P!7.5.5[PVB...OJ*.*.7.wW*eh.....B.B....................I.......Y.0.*..*X..5.7.*.*.P!7.5.5[PVB.............P...P....2.. .......P........(...6..P....`...8.. :.. ......o.w......`6.. ...`>..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.147089260374425
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXElzxlf6tP9hn:SvKMH6tX
                                                                                                MD5:DBED6CBF5B4E215E7BC058594652C5C6
                                                                                                SHA1:14FF2242EB58DED4AE8DA0315F21AD1894CC848D
                                                                                                SHA-256:DF819C5400D36259BCA9E3F7FBDAFB6F2DA2FFA00C5CF03695D3A1A5A20E8592
                                                                                                SHA-512:0312DC0174E32ABA5FDC8EDC21D06DD613F0BC9BB24E1E502902379B997406D4B5E2A0C17E48BF582594C5D0988FA8DD3FD9A1CCC9FC386C4E453683196F2EC8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.....................................o.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.147089260374425
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXElzxlf6tP9hn:SvKMH6tX
                                                                                                MD5:DBED6CBF5B4E215E7BC058594652C5C6
                                                                                                SHA1:14FF2242EB58DED4AE8DA0315F21AD1894CC848D
                                                                                                SHA-256:DF819C5400D36259BCA9E3F7FBDAFB6F2DA2FFA00C5CF03695D3A1A5A20E8592
                                                                                                SHA-512:0312DC0174E32ABA5FDC8EDC21D06DD613F0BC9BB24E1E502902379B997406D4B5E2A0C17E48BF582594C5D0988FA8DD3FD9A1CCC9FC386C4E453683196F2EC8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.....................................o.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):136
                                                                                                Entropy (8bit):4.168303237889532
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlkAll/tXl7ggOZMCyP98Dn8n8UltslulflFWSkf:SvUA/bXOyxP98j8nxltVTFif
                                                                                                MD5:8E8F7836852A74DE789DD0F4C71797DB
                                                                                                SHA1:7509333C6D134B2BAD48486057F91336DC1AA009
                                                                                                SHA-256:D338E130FAFE30C63A1DDE8B6478A23DCE8D1A3716B776C44FBF9E132A392C32
                                                                                                SHA-512:4C39DD6462EA0F1F0D674BB06E8A5153A86903A91B0C04166A06C7DF3B511E6CE83CBFE19D7175C010867F97DCB80723C398B4985D68BA162C30DD15B52D1FD9
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...................................k..)...4.wW*eh.....B.B................`.... ....o.w....`...`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):380
                                                                                                Entropy (8bit):5.237337917003197
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:Sv5A3R71Oy8Z8j8nR6Dhl8MWjdlQ/fQIyB9aaD1j8nj21/oaW2fnOWxY1Nl2Tuzq:uQ7Ey+8j20Dohlz71DR2q1/fOWxgNlY3
                                                                                                MD5:CC4B528BFCE9E4180F75444B2ABC9D14
                                                                                                SHA1:812E4AEC36C4F1FBF9E16679ECA725139D7C3BB2
                                                                                                SHA-256:C50BC11E7BDA0553223F4F956DC09173CA9503EEB94048F8721A6E034BC7D2BA
                                                                                                SHA-512:B794303A40FD964AFFF66FFC104BCC2E0E18ACC262F88E3393B20AACFF3A8B0297F4CF0C17162F11AE01598BDEFAE8EBD59F992386CCE9462E409AFA4D451417
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................R.. ........W...W...........7..........k..)...4mhEy.......B.B......!.........../.ZT.......O.O....$...K.K.K.....$...a..#.....$...I.I.I......*..k..)...4.MW*eh.....B.B........!..... ..N..h./..4....$.............$...i.}k.......... ......P...P$..P+..P......5........P7.. ........N..PU..P..j.....5...2...5...C..PC.. ....`...>.. G.. ....o.w....`...`N..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):136
                                                                                                Entropy (8bit):4.168303237889532
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlkAll/tXl7ggOZMCyP98Dn8n8UltslulflFWSkf:SvUA/bXOyxP98j8nxltVTFif
                                                                                                MD5:8E8F7836852A74DE789DD0F4C71797DB
                                                                                                SHA1:7509333C6D134B2BAD48486057F91336DC1AA009
                                                                                                SHA-256:D338E130FAFE30C63A1DDE8B6478A23DCE8D1A3716B776C44FBF9E132A392C32
                                                                                                SHA-512:4C39DD6462EA0F1F0D674BB06E8A5153A86903A91B0C04166A06C7DF3B511E6CE83CBFE19D7175C010867F97DCB80723C398B4985D68BA162C30DD15B52D1FD9
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...................................k..)...4.wW*eh.....B.B................`.... ....o.w....`...`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.147089260374425
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXElzxlf6tP9hn:SvKMH6tX
                                                                                                MD5:DBED6CBF5B4E215E7BC058594652C5C6
                                                                                                SHA1:14FF2242EB58DED4AE8DA0315F21AD1894CC848D
                                                                                                SHA-256:DF819C5400D36259BCA9E3F7FBDAFB6F2DA2FFA00C5CF03695D3A1A5A20E8592
                                                                                                SHA-512:0312DC0174E32ABA5FDC8EDC21D06DD613F0BC9BB24E1E502902379B997406D4B5E2A0C17E48BF582594C5D0988FA8DD3FD9A1CCC9FC386C4E453683196F2EC8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.....................................o.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXEl0t6E7lFEKe:SvKM0t6gCKe
                                                                                                MD5:CF788FA9793FEA6104E904FBA48B9ADE
                                                                                                SHA1:5105A53F269A6C445FE58F0AB7BB501BF5790960
                                                                                                SHA-256:D49D36962528CD70E638FE62C2A675838D5F6D13C229F6A107530D58C458D100
                                                                                                SHA-512:B07CED3B04E2CE33B0FA215AE03002E666D5408F31ADE8FE84F46E2A7474D277B40887F090D5DB6ABEA58B6A8DF385F952DD614979AD903AAF31B524A06AA93B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):224
                                                                                                Entropy (8bit):4.7322474492350795
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SvzJOy/Ca8nVNH4NCuj8nVb5Kt8Mqfg+p0Ffn:WAyaa2VUh2Vb0ttoght
                                                                                                MD5:5D7C90813EC91CAE25B29B5E02A72AF7
                                                                                                SHA1:8A20CF947002A414D246D0E1FC3716A88260E9F9
                                                                                                SHA-256:A14CD0E7BECE613DB790919136940C447991C40C1BF626DA792D360F12B30D5A
                                                                                                SHA-512:402B5E8C0161DC4D5DFAD4FA270F0CCBC190DB73B461633ED5D8FF36F672317D384D01E22898DD853086C590EEA31A48B93E0F8070792C9647207593A3702833
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................+.. ........0...0......................k..)...4.wDyuP.....B.B............E ..uP..k..)...4.w.y.5.....B.B............E ]..5.................P............$..P....`...... #.. ....o.w....`...`'..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.147089260374425
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMQpxlzJstP9hj:SvfJstz
                                                                                                MD5:84781FB37996AE5ED3C3E0E3BEB4455A
                                                                                                SHA1:ECD887370A4453E67A642A46BEF4BB4593C0CEDD
                                                                                                SHA-256:B94B6BAE10B1B207ADFB721F38C9BDABF1B3619C2C82AFE24C7A0F823F9CA38E
                                                                                                SHA-512:FFFC82BE344ACDAFA125A7A9BA3D79939F695B3C8A1AA66D8C0092847B7487385C979175F37D7DF39EB3334F56621DF78D3B2B087E7AE5D40972DD37ED42B109
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.....................................o.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.147089260374425
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMQpxlzJstP9hj:SvfJstz
                                                                                                MD5:84781FB37996AE5ED3C3E0E3BEB4455A
                                                                                                SHA1:ECD887370A4453E67A642A46BEF4BB4593C0CEDD
                                                                                                SHA-256:B94B6BAE10B1B207ADFB721F38C9BDABF1B3619C2C82AFE24C7A0F823F9CA38E
                                                                                                SHA-512:FFFC82BE344ACDAFA125A7A9BA3D79939F695B3C8A1AA66D8C0092847B7487385C979175F37D7DF39EB3334F56621DF78D3B2B087E7AE5D40972DD37ED42B109
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.....................................o.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):136
                                                                                                Entropy (8bit):4.168303237889532
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlkAll/tXl7ggOZMCyP98Dn8n8UltslulflFWf:SvUA/bXOyxP98j8nxltVTFu
                                                                                                MD5:9195559CD1C871889BAE26AD19CA0C24
                                                                                                SHA1:7106DB267CC6F7D978D00D4A9829010B1E653375
                                                                                                SHA-256:AB6683282CD7CD5A8A819796FF415A8C97933EB2A77E5F6B8B42048DD336EB70
                                                                                                SHA-512:231CFF0AE144AF4382B9F869807492ECE979A809F0F4A912B8B41E09EBF4CC6F173EC62A507AF72C28BF825A7F74624B1AB776F293D632038E7B3590C9B885C5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...................................k..)...4.wW*eh.....B.B................`.... ....o.w....`...`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.147089260374425
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMQpxlzJstP9hj:SvfJstz
                                                                                                MD5:84781FB37996AE5ED3C3E0E3BEB4455A
                                                                                                SHA1:ECD887370A4453E67A642A46BEF4BB4593C0CEDD
                                                                                                SHA-256:B94B6BAE10B1B207ADFB721F38C9BDABF1B3619C2C82AFE24C7A0F823F9CA38E
                                                                                                SHA-512:FFFC82BE344ACDAFA125A7A9BA3D79939F695B3C8A1AA66D8C0092847B7487385C979175F37D7DF39EB3334F56621DF78D3B2B087E7AE5D40972DD37ED42B109
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.....................................o.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):844
                                                                                                Entropy (8bit):4.992526813261028
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:F6/kXVvq3/CUwFN2hLneL9xkl0oJsQC1NIgjf:RVS3qUk2hW9U/yFf
                                                                                                MD5:148368AC58E622FF8C24F0A9F1E72712
                                                                                                SHA1:FF7ED58F8363C5852D661E5D4D78F0E876DD3BA0
                                                                                                SHA-256:5F4C811D317284CE9189258AC4FD0C7BBB810717BC8FEBC45F0D2E9322D9BF19
                                                                                                SHA-512:0300C955FF9452225D734EEA66E46E95CC10148301B889169ADA4BD2170940E8868B10992E8F3833426E8A8587B96EAE43FCEDCA92E3EC6E4E2A81D525C07A76
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................................l.a.s.t. .w.k...l.a.s.t. .y.r...n.e.x.t. .w.k...n.e.x.t. .y.r...t.h.i.s. .w.k...t.h.i.s. .y.r...l.a.s.t. .m.t.h...l.a.s.t. .q.t.r...n.e.x.t. .m.t.h...n.e.x.t. .q.t.r...t.h.i.s. .m.t.h...t.h.i.s. .q.t.r...i.n. .{.0.}. .m.t.h...{.0.}. .m.t.h. .a.g.o......h.B7w.3.wEy..3C...B.B........R.....$..h.h....$.........$........$.......$....h.h.h...h.B7w.3.wW*ehc....B.B........$..h.h....$.........$.........$.......$.............H.............J.........J.........H.............J....>....J.c`.K....H...........H.................. ....P...P...P...P...P......5.~......P... .......... ....P...P...P...P...P....5.......... ....`...... ... ...........P...P...........`...P... ...........P...P...........P... .......P.......P........r...... ... ... ... ....o.w........`...`... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):136
                                                                                                Entropy (8bit):4.168303237889532
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlkAll/tXl7ggOZMCyP98Dn8n8UltslulflFWf:SvUA/bXOyxP98j8nxltVTFu
                                                                                                MD5:9195559CD1C871889BAE26AD19CA0C24
                                                                                                SHA1:7106DB267CC6F7D978D00D4A9829010B1E653375
                                                                                                SHA-256:AB6683282CD7CD5A8A819796FF415A8C97933EB2A77E5F6B8B42048DD336EB70
                                                                                                SHA-512:231CFF0AE144AF4382B9F869807492ECE979A809F0F4A912B8B41E09EBF4CC6F173EC62A507AF72C28BF825A7F74624B1AB776F293D632038E7B3590C9B885C5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...................................k..)...4.wW*eh.....B.B................`.... ....o.w....`...`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.147089260374425
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMQpxlzJstP9hj:SvfJstz
                                                                                                MD5:84781FB37996AE5ED3C3E0E3BEB4455A
                                                                                                SHA1:ECD887370A4453E67A642A46BEF4BB4593C0CEDD
                                                                                                SHA-256:B94B6BAE10B1B207ADFB721F38C9BDABF1B3619C2C82AFE24C7A0F823F9CA38E
                                                                                                SHA-512:FFFC82BE344ACDAFA125A7A9BA3D79939F695B3C8A1AA66D8C0092847B7487385C979175F37D7DF39EB3334F56621DF78D3B2B087E7AE5D40972DD37ED42B109
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.....................................o.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
                                                                                                MD5:2E5503409EC26800FCF6A9B1D64DBE57
                                                                                                SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
                                                                                                SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
                                                                                                SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
                                                                                                MD5:2E5503409EC26800FCF6A9B1D64DBE57
                                                                                                SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
                                                                                                SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
                                                                                                SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.147089260374425
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMQpxlzJstP9hj:SvfJstz
                                                                                                MD5:84781FB37996AE5ED3C3E0E3BEB4455A
                                                                                                SHA1:ECD887370A4453E67A642A46BEF4BB4593C0CEDD
                                                                                                SHA-256:B94B6BAE10B1B207ADFB721F38C9BDABF1B3619C2C82AFE24C7A0F823F9CA38E
                                                                                                SHA-512:FFFC82BE344ACDAFA125A7A9BA3D79939F695B3C8A1AA66D8C0092847B7487385C979175F37D7DF39EB3334F56621DF78D3B2B087E7AE5D40972DD37ED42B109
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.....................................o.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):276
                                                                                                Entropy (8bit):4.716134931707854
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SvwSmfStaFlqE2WhkTFkTFk75IVYTeME/Bscf+q+N:nnmIVYYCcft+N
                                                                                                MD5:2A5A5D2CCC801C8DBE46AF8F04EA2D26
                                                                                                SHA1:EF6FC7AC4C1D37633FC55FA252B33B6902B2E4E9
                                                                                                SHA-256:DFAE3560E283006682100489719D46DA98D20D794B2DEDF947C709D051C85C2F
                                                                                                SHA-512:09BD05607F6456E445316A074ABE4BC30AF2A6522F6FF8D1CB05E70A75D998BFE34262CF45CDF6572E5354C864044BA241041220A6888D90A881F70046062586
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................5.. ........=...=..........................NN.......4.....4..k..)...4......c....................4.........4.........4.....4.......P....... ...........P...P$..P....#.. ..j.v...................(.. ..`.*.. ....)..P......o.w...(..`!.. ...`1.. 3..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.147089260374425
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMQpxlzJstP9h8:SvfJstM
                                                                                                MD5:8502B5B5CF8FF0AC0239AD4177A21BE1
                                                                                                SHA1:94D80D600D5E0E241979FF136C9369E6699A4E0A
                                                                                                SHA-256:29BD99C48E6B952990C208543342883CAB53EB68202F225EB293747A8451EEFF
                                                                                                SHA-512:99EE900C8FC4BE3C17772F11D2E537A046D60E730DFCD1E246C7540988691E08A6188C6759720F66AB71108577AE791B3590BB7C7EA55F64F9F8A47578528039
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.....................................o.(...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):256
                                                                                                Entropy (8bit):4.44420201856998
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SvSB+ZlIsgFldkTFkTFk0hUG/HAvxlk9jbCikap6oV:gOvMGfALGUap6oV
                                                                                                MD5:801F9E284F6D1E5FEB62097AE9B98E57
                                                                                                SHA1:AC8108D2DBD09245B770D51EAE0BCC4E22278662
                                                                                                SHA-256:C2697FA67D09E9A699DDB83063981A7C184384E56AC5046CFFB5B5855B9DC3F8
                                                                                                SHA-512:5F76375EB9FBEE0BF2E33C5BF600A624B86B236FCCBF8F7075CEA2F11AA480D948C816F6DAF2DAC63585E657A03E29D353080361245DBDA65DA7FDCA34CC7180
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................0.. ........8...8................................NN.......4.....4.........4.........4.........4.....4.............P...P....... ...........P...P...P.... .. ..j.v...........%.. ..`.'.. .......P......o.w...(..`... ...`,.. ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):236
                                                                                                Entropy (8bit):4.547719704207099
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlBFQlllWJlvtIP9SB+kTFkTFkyB84ePsZlxjmGkmvzGMmE/exz9sSN/5:Sv8l/WrOkB+kTFkTFkBixiCzGk+2+/SK
                                                                                                MD5:B79F5A39332B878BA4B05DEBD7B0F367
                                                                                                SHA1:8069441A0E3C184705054FD57B26DE0F1F59B0AA
                                                                                                SHA-256:6503CD2C7AAA9F95F33C378A2F0CD12AF4D5B5DA4EE5BBECD62789E9C5C4A42F
                                                                                                SHA-512:B56A2B9DC4D9D937A8EF67E9205E62FA51364AC04BA8A245D2DD8ED4F6E59DEC41520BE32E5DC6B61E0891E1D397C280142FD3B389538920AAC942B1423422E1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................,.. ..N.....3...3..........N..............4.....4.........4.........4.........4......H............N.N.............P...P...P....... ..j.v.............. ..`.!.. .......P....(.. ....o.w.....(..`...`&.. *..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):880
                                                                                                Entropy (8bit):5.200318139086651
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:c+dflKt57gHBiYIH5HEektCFxExtkKNovPfK6gQ0dAs:JAZgCH5kektkEI44Pf10d9
                                                                                                MD5:8A1F8F9C2B643A831246038949D38A86
                                                                                                SHA1:175C7AC6E783B3A58565B31EC3F65CB099DE1D09
                                                                                                SHA-256:9DA5B83F7DAA17CF642C7440F371BD2AB86170424125E991645F5DAD40C5AA9E
                                                                                                SHA-512:6641903C46A1FF3352F6C48783077DCD83D1FD1C56EAD865A58C3B1A8B0B36B3CB1E7820A06341BE3408C21DC21CDC016135D54AC409C6B35E35D789A8193CA0
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................................D.i.c.....E.n.e.....M.a.y.........0...B.......0...K.......0...M.......0.0...B.......0.0...K.......0.0...M.......0.0.0...B.......0.0.0...K.......0.0.0...M.......0.0.0.0...M.......0.0...M.R.D.......0.0.0...M.R.D.......Y4....J.........J.#.#.....J.9.9.....J.........J.*.*.....J.A.A.....J.I.I.....J.R.R.....J.[.[.....J.........J.........J.1.1...k..)...4....k..\...............4.....4..k..)...4....eh9....................4.........4.........4....z..O..3.........i...).....Z.K...|.?.9.j..G.!.#."......1G..........eG6.......!.....a...q.k...T"..@".!....E.P.V.].e.n.x.............n..Ps..Px..P}..P...P...P...P...P...P...P...P...P....... ........k..P... ....... ...................P...P...P....... ........................................... ... ..j.v.....H................ ... ....`...... ... ......o.w...(..`... ~ .`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):344
                                                                                                Entropy (8bit):5.134834454312531
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SvzxYe41GgLk28RWvkP2qRnslkzRgTFkTFkKklWF6/ZlMQOXhtVFn:Pe4Li0vkPf2CkIF6R+Zn
                                                                                                MD5:382D40B9353199767794FEF42ADE4B90
                                                                                                SHA1:FBB58513DE85802CD6AB6D673E66A69B9CC18E16
                                                                                                SHA-256:7A099DC250854B3559F585EEC33EF9AE3F7B535837E0306380E70A67932A2A9C
                                                                                                SHA-512:9CA9F327F9826C68D2FF708BC9B44781C236DBC0E25F020375132850BCCA28F44651DF0EC1C5464A4457299B7FF018F64BFB79E17B127214339BC673D109FD98
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................I.. ........N...N...........2........M.M./.d.d./.y.y......h.B7w.3....FB.b..............!.......8..8q;DBFB.....4.....4...h.B7w.3.....$................!..... .8..8.).$.$.........4.........4.........4.................P........B..PG..PL..P....6.. ..j.v.......#...&...)...7..P;.. ....`...2.. =.. ....o.w.(..`...`E..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):264
                                                                                                Entropy (8bit):4.6054641400735505
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:Svoql/Al/G/NgB+kTFkTFkQEMHCjswlym4GIVgGN:pqtBeBkEMijsQyOAlN
                                                                                                MD5:599E0BAE3F8E59F315CC28AC651D000F
                                                                                                SHA1:90B395C9F6B64CD5270EBA837BC0438FF152176F
                                                                                                SHA-256:6A5A231A16944B786BDA22C49A3B0DCC1F983C87F56EB0CCE11206CBE67AE36E
                                                                                                SHA-512:FAC93DBDAB0EF16C98977656B0126A4154A4181095BD935DAAE5DB6A18246D0AE182C38AE07C59629B784DC93D0F04A63AD07CA2E6522995539C5F299D6DDA2F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................3.. ..N.....:...:..........N.........a.n.t.i.e.r........4.....4.........4.........4.........4......H........N...N.N.....4.............P...P...P....... ..j.v...........$.. ..`.&.. .......P........-.. (..P....o.w.....(..`...`+.. /..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1252
                                                                                                Entropy (8bit):5.561173248216956
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:oXbwyqMsKJrL6OTqZNRoL/ufRpfDX6ULOsAtMqZQ:oXbwynqO+jobMRpfHOPt6
                                                                                                MD5:8C8D7A6AFED45C5BFECF17C268CED17C
                                                                                                SHA1:C8BAE7DE7F7866C3663B9C0CA5B5D8C3811E18EB
                                                                                                SHA-256:80F8D3D6C774C045A38056EC2C9323B8E69FA03DB6D720B16E02318C3B8F2D7C
                                                                                                SHA-512:724F6B78755E8064F6BB4F67C6A92932229B7DC0F7C1A366BF0EDB2F6374DA5BA7EC6A7C3D3241D4352F7EEB5DF643C94687423B016A4E56EEB9D79F54AFE8EF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................*.. ........1...1....................+...9...B...E.....1.....1.....1.....1.....5.(.-...B.H.3...'.3./...+.H.1...,./.....,.F.H...,.H.D...-.E.D...-.H.*.../.3.E.../.D.H...,.H.2.'...9.B.1.(...3.1.7.'.F...E...2.'.F...(.'.E./.'./...A.(.1.H.1.....3.F.(.D.G.T...F...E.G.. 4.(...1.(.9. .3.H.E...1.(.9. .'.H.D...1.(.9. ./.H.E...(.9./.'.2...'.4.*...1.(.9. ...G.'.1.E...(.9./. .'.2. ...'.4.*.....[.. . .N. .P. .O. .R. .V. .p. .. .. .%. .|. ... ... ... ... ... ... .C. ... ... .I. .J.].......Y4........Y4........................................ .'....)..G...j..4..eN....N..).M.i.O...............#2...................#2...................#2..........F..............#2..................%.......5........... ... ..........'...............%.s.....5.................%.s.....5........... ... ..........'...............%.s.....5..............".*...<..........".*...<...................................... ...............P.......P........... ... ...........P...P....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2024
                                                                                                Entropy (8bit):5.174909093296085
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:MU5RKptfOKtdSVtIlb8tyY4Acxfi6ZW/OmZQzVVp:7RKpdOKfSVOlb894Acs7mzPp
                                                                                                MD5:9BFD201E21A532D247D2DC903B956E0A
                                                                                                SHA1:8EAB8685683F9AA577A96D270B4B5173BBB372AC
                                                                                                SHA-256:46C81B7792A250AF3558E439E5DEDB8F5CFEF5B92E19FC28A671DE15B8411A9E
                                                                                                SHA-512:2939D5D19470347C21814E5E39F24A6594AF8C669D4B3EEE6CA927E8D7120A4154C75BA5B0AD2508912F8F5C03844465E2697DE9DDB49B901162309AAEA0A107
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................................C.-.I...H.-.I...a.a.S...b.o.w...c.o.l...d.u.u...h.b.i...j.o.l...j.u.k...k.o.r...m.a.w...m.b.o...m.o.r...m.w.d...n.a.a...s.e.e...s.i.i...s.l.t...d.e.w.o...j.u.k.o...H.a.K.k.i...H.o...o.m...L.e.w.r.u...W.a.k.t.u...b.o.w.t.e...c.o.l.t.e...j.o.l.a.l...k.o.r.s.e...m.b.o.o.y...m.o.r.s.o...s.i.i.l.o...s.u.b.a.k.a...H.a.n.n.d.e...J.a.K.n.g.o...S.a.h.n.g.a...a.a.S.n.d.e...d.u.u.j.a.l...m.a.w.n.d.e...s.e.e.W.t.o...s.i.i.l.t.o.....a.l.n.d.e...k.i.k.i.i.W.e...J.a.m.a.a.n.u...Y.o.n.t.e.r.e...H.i.t.a.a.n.d.e...M.a.j.a.a.n.g.o...T.e.r.m.e.s. .1...T.e.r.m.e.s. .2...T.e.r.m.e.s. .3...T.e.r.m.e.s. .4...m.a.w.b.a.a.r.e...y.a.r.k.o.m.a.a...H.a.d.e. .I.i.s.a...[.q. .v. .x. .z.]...n.a.a.s.a.a.n.d.e...n.j.e.s.l.a.a.r.e...h.o.o.r.e.-.b.i.i.r...C.a.g.g.a.l. .I.i.s.a...D.i.i.w.a.a.n. .w.a.k.t.u.....a.l.W.i. .y.o.n.t.e.r.e...7.[.A. .B. ... .C. .D. ... .E. .F. .G. .H. .I. .J. .K. .L. .M. .N. ... .J. .O. .P. .R. .S. .T. .U. .W. .Y. ...]...7.[.a.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.870450165586334
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/6RYMmlle3:SBtkJYlU8g8l/Pnlg
                                                                                                MD5:B0883BC684E2083DCFB7987BF29CB154
                                                                                                SHA1:93CA18C6EF789971AC3965F1B55FD4311A782661
                                                                                                SHA-256:E8FBBF9C040D66A6F79C5F2143599852A26E7F63E476F1D8AEB8AF38651017D1
                                                                                                SHA-512:6F36CC2841D7A7E75C27063806AC56E1CC0E38C1ED3862DDF0F243B4A19FDE47C53E371F80AE670DF5D2196DE96B3804FF478DD8551AC37639F29C77194EF679
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.................................f.f._.L.a.t.n._.C.M...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.870450165586334
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/6RYMpe3:SBtkJYlU8g8l/Pf
                                                                                                MD5:107782CB49500FC51B8E89C6BFE16DD1
                                                                                                SHA1:86062C938918B822D5FCCE2AF25914255ED05A03
                                                                                                SHA-256:C18C8F96F8A5A6109B9AB88A9FA1458ACB0DA75FA74ED4B5AE71C5D30F7E8C54
                                                                                                SHA-512:DE56C5EDC926BC62988B40D24F08516EADDE9301F28FE9F28645190C45892EDB54B4812241297E027706DE0DF0A6A551A65516C0A99AFE921230BE6E971D4374
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.................................f.f._.L.a.t.n._.G.N...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):132
                                                                                                Entropy (8bit):3.971696932789431
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlgSlE/cmlvlllQ9grNrceRn2T22Pc3nslulflFpDN/F:SvQSlcPZZrzn2T22Pc3nVTFjF
                                                                                                MD5:51874CD570FDE1EF76584D484F003123
                                                                                                SHA1:972492DE9F6DB03504D92666FAA793A12174356C
                                                                                                SHA-256:6712CA123B9C3B3C192B15BED74912047AA9F473113C7E79EADA47DB4F3DCE08
                                                                                                SHA-512:4257742E18BE5FB2B23D26BADB2B264ECA1752EADAB99CFFD2DE930697F797E010A6F3E935EB3C9F884CA710BAE5EEBC472A14EACCDCCF2AABD83263FA81F0A2
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .8w...................8w............h.B7w.3.MW*.).4......................`.... ..o.w......`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):132
                                                                                                Entropy (8bit):3.971696932789431
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlgSlE/cmlvlllQ9grNrceRn2T22Pc3nslulflFpDN/F:SvQSlcPZZrzn2T22Pc3nVTFjF
                                                                                                MD5:51874CD570FDE1EF76584D484F003123
                                                                                                SHA1:972492DE9F6DB03504D92666FAA793A12174356C
                                                                                                SHA-256:6712CA123B9C3B3C192B15BED74912047AA9F473113C7E79EADA47DB4F3DCE08
                                                                                                SHA-512:4257742E18BE5FB2B23D26BADB2B264ECA1752EADAB99CFFD2DE930697F797E010A6F3E935EB3C9F884CA710BAE5EEBC472A14EACCDCCF2AABD83263FA81F0A2
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .8w...................8w............h.B7w.3.MW*.).4......................`.... ..o.w......`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.870450165586334
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/6RYMde3:SBtkJYlU8g8l/PT
                                                                                                MD5:15812A52DB895052C6440FFEA69FC5DF
                                                                                                SHA1:F2D61E66073C49C7E0A3F6EB4D80DB341F0F6FCA
                                                                                                SHA-256:AE949179ED25170E4DF3C4E4A78793A7CC86C17672E76661A1DB710C164A05A6
                                                                                                SHA-512:904F6BB297412B6ADB01FA95A9A979F7108F88A76C08823F3AB988CDE2319ED525938693DE8F4EDA097EEAC81E5EB6AB9DD75C4321D28A7F1E231AEC78B405C1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.................................f.f._.L.a.t.n._.S.N...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):25004
                                                                                                Entropy (8bit):5.121435767724072
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:2L59kH58Vk/calos5zdDPupFHM2IinQRhjjsdRCxwn40:2XkH58Vk/canRDPupFHM2IinQR/xw40
                                                                                                MD5:7857B0B72BDAA17EA21B9A508F57FCE2
                                                                                                SHA1:64CD6E4E75976D4425566FB363BCCCA5E08F997A
                                                                                                SHA-256:6C46B9C5FD632F2E66C4C37C221F9B55D112205DB61E9AA9A1AF351E0D451E60
                                                                                                SHA-512:EB4169E9B144328F8B7637A4BB3AE14B938E742555E60CCD1CD65F2BFA812946AD852C0E3E47659DABEF893C7262DB31B25F7CFD1C87F18A601ECE9A54147F53
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................I.. ........c...c...V.......F........n.y.t...k.p.....k.y.....L...y...e.a.a...j.K.r...j.a.a...s.......a.a.m.u...i.l.t.a...a.d...r...e.l...l...s.y.y.s...e.K.r.....e.a.a.....e.p.i.p...j.K.r.....j.a.a.....k.e.h.o...k.e.s.....l.o.k.a...m.u.u.t...e.i.l.e.n...L...y. .G...i.j.j...r...n.i.s...n...s.i.v...n...t.e.v...t...t.i.a.r.....a.e.v...t...a.b.k.u.u...e.l.o.k.....e.l...i.n...h.e.i.n.....h.e.l.m.i...h.u.h.t.i...h.y.m.i.....j.o.u.l.u...k.a.s.v.i...k.o.i.a.k...l.i.p.p.u...l.i.p.u.t...p.a.o.n.i...p.a.o.p.i...s.y.d...n...t.a.m.m.i...t.h.o.u.t...t.o.u.k.o...t.u.n.t.i...i.l.t.a.p.....t...n.....n...r.a.d.~.a.b...k.i.s.l...v...a.a.m.u.p.....a.d...r. .I...e.n.s.i. .v...h.e.a.v...n...t.a.m.m...z...t...n... .v...a.a.w.w.a.l...a.a.. b.a.n...d.e.y.k.u.u...e.l.o.k.u.u...e.m.o.j.i.t...h.a.t.h.o.r...k.e.s...k.....l.o.k.a.k.....m.a.a.l.i.s...m.a.r.r.a.s...m.e.s.h.i.r...m.e.s.o.r.i...p.a.i.k.k.a...s.y.y.s.k.....t.i.r.k.u.u...k.e.s.k.i.p.....t...n... .s.u...k.e.s.k.i.y.....a.a.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
                                                                                                MD5:2E5503409EC26800FCF6A9B1D64DBE57
                                                                                                SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
                                                                                                SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
                                                                                                SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):18896
                                                                                                Entropy (8bit):5.60602512990592
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:K2U2ISJWd18WShrOeROng/IIx37+b3zYjiJCyvCZPb+YaoB:rE/8WSVOeROgocZPbP
                                                                                                MD5:08B81236FB9EBF09F08195055B8A99CD
                                                                                                SHA1:02E75AC8491DD7D328B69681B3D8A6A926A1E7E0
                                                                                                SHA-256:5FA099432E1C81E12AB5ABBB8012C0D1AA860DD361FF832F63EB5D4A3D3C0971
                                                                                                SHA-512:457AD442D5C65B1F513E4E0F4F6BBCA2D76A059FC3D3065F7BCCFFDA429066F9BF6588A5A9394D059793C980110B8EE292F41016384D091FC0E66FDAE4D1313F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................S.. ........l...l...V.......+........H.u...L.i...B.i.y...H.u.l...H.u.n...H.u.w...L.i.n...M.i.y...N.o.b...E.n.e...P.e.b...b.u.k.a.s...H.u.l.y.o...H.u.n.y.o...M.a.r.s.o...b.a.b.a.e...b.a.g.a.y...h.a.y.o.p...I.b.a. .p.a...b.a.n.t.a.s...g.u.s.a.l.i...l.a.l.a.k.i...n.g.a.y.o.n...p.a.n.a.h.o.n...O.k.t.u.b.r.e...P.e.b.r.e.r.o...M.e.t.r.i.k.o...h.a.l.a.m.a.n...n.g. .g.a.b.i...p.a.g.i.t.a.n...s.a. .g.a.b.i...t.a.n.g.h.a.l.i...0.0.0. .l.i.b.o...n.g. .h.a.p.o.n...s.a. .h.a.p.o.n...a.k.t.i.b.i.d.a.d...n.a.k.a.p.a.r.e.s...n.i.l.a.l.a.m.a.n...s.a. .L.i.n.g.g.o...s.a.r.i.-.s.a.r.i...h.a.t.i.n.g.g.a.b.i...n.a.n.g. .u.m.a.g.a...S.a.m.a.k.a.l.a.w.a...0.0.0. .b.i.l.y.o.n...M.M.M. .d.. d.,. .y...m.g.a. .n.u.m.e.r.o...{.0.}.,. .o. .{.1.}...s.a. .{.0.}. .t.a.o.n...s.a. .{.0.}. .o.r.a.s...0.0.0. .n.a. .l.i.b.o...s.a. .{.0.}. .a.r.a.w...s.a. .{.0.}. .m.i.n.....s.a. .{.0.}. .s.e.g.....m.g.a. .b.a.n.d.i.l.a...p.a.g.l.a.l.a.k.b.a.y...M.M.M. .d.. d.,. .y. .G...s.a. .{.0.}. .L.u.n.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
                                                                                                MD5:2E5503409EC26800FCF6A9B1D64DBE57
                                                                                                SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
                                                                                                SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
                                                                                                SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):216
                                                                                                Entropy (8bit):4.352892321557353
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SvEGml7omAYl0JP1cMwd0hllE2VnURolFn:3tAYAc5MpNUK
                                                                                                MD5:51F12B12A8057A392C771E30D946BD8D
                                                                                                SHA1:E433B892646A05AC206091AEEEACD5BD644CB497
                                                                                                SHA-256:5263F3B56D9BED1B9BF3DFFFA2DB75CFF405B11DDFC54F09903D92E0571FCA06
                                                                                                SHA-512:98DA3BE44D21FD4C413E3679107F32D4FCDCD478D58F3DBF7E9758F597F2A4C89FD47D0EDF9FC6A4AADF7A572D055C280CEEA299A7CF40799935F3470D4578E3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................).. ..l....................l..............D............/..*...^}....l.....^....|..........P....... .......P.......P........... ... .......P....5...... !.. ..`.#.. ....o.w.... ...`'..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
                                                                                                MD5:2E5503409EC26800FCF6A9B1D64DBE57
                                                                                                SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
                                                                                                SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
                                                                                                SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
                                                                                                MD5:2E5503409EC26800FCF6A9B1D64DBE57
                                                                                                SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
                                                                                                SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
                                                                                                SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
                                                                                                MD5:2E5503409EC26800FCF6A9B1D64DBE57
                                                                                                SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
                                                                                                SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
                                                                                                SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
                                                                                                MD5:2E5503409EC26800FCF6A9B1D64DBE57
                                                                                                SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
                                                                                                SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
                                                                                                SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
                                                                                                MD5:2E5503409EC26800FCF6A9B1D64DBE57
                                                                                                SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
                                                                                                SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
                                                                                                SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
                                                                                                MD5:2E5503409EC26800FCF6A9B1D64DBE57
                                                                                                SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
                                                                                                SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
                                                                                                SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):268
                                                                                                Entropy (8bit):4.613497542156425
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SvXtKHl7saMW2W0lOPwv+SlmtWCayl6QZSnBV:UKF7sOPXwbm2lz
                                                                                                MD5:6E51A3800939D2B92E283D5C0217F615
                                                                                                SHA1:CA1B60D5BE31ABAAC82AD0B22494160B7D0D3664
                                                                                                SHA-256:905B32B24BA15D2E443F112A683445E5A77227D5494DD342586A33FE6660DE44
                                                                                                SHA-512:382FB2573E834DBDE01DE8D4A59A0905EA3585C637BFA4DF067BA91C654E12F4EB4CC61C8C45C5CE47B2C088EE020DA01EB6A9030C73E2FFCA185C93603F1F3D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................4.. ........;...;..........."........f...v.....j.u.i.....j.u.i.l................*.......OB.u....T.{Ci...h........OB.u....T.{Ci...h..........P....".. ............$...........&.. (.. ..j.H.......*.. ..`.... ..[...o.w......`$.. ...`2..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
                                                                                                MD5:2E5503409EC26800FCF6A9B1D64DBE57
                                                                                                SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
                                                                                                SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
                                                                                                SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):324
                                                                                                Entropy (8bit):4.234801961619495
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:Svg/seUE82fsUUNzlsUUNRYsUbKl4wgHoGYMDyx1hT3QnUbUF:9+EaUUYUUzrUbegHWbTiUYF
                                                                                                MD5:550EE182EA9AE38CBC976C3B747CEC73
                                                                                                SHA1:A773A6CD2AB67DF7644632DBE0BAAF9A805E173E
                                                                                                SHA-256:69DBC1EAB9852FDE5FA6F3E0074FE2C053C6B372DFDA37F805EA47A276A680A1
                                                                                                SHA-512:6FBB8CE5B15522E3A132C54C924CEA53C08723B3046D61BFAB48C518179C784B3D59CE6FDB56D5C57E2498498CB8CFC5C4639698ACF98963FD9DEE9348B633D5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................D.. ........I...I...........2........l.e. .2...m.e. .t.r.i.m.e.s.t.r.e...l.e. .3...m.e. .t.r.i.m.e.s.t.r.e...l.e. .4...m.e. .t.r.i.m.e.s.t.r.e........D..k..)...4.MW*eh.....5.5......_{........b{..........7..P....2.. ....H.......M...........6.. 8.. ....S...:...:.. ..`.>.. ....o.w.4.. ...`B..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMQut6E7lIt6EKC:SvQt6gOKC
                                                                                                MD5:2E5503409EC26800FCF6A9B1D64DBE57
                                                                                                SHA1:5962F8204C362DFEF2B60CDA43363D4811D686C6
                                                                                                SHA-256:D5D3C00CA62F706F59183248BBE5FE5C6FB721E544D3A665A8BD03B4B5F73478
                                                                                                SHA-512:649675774963C12D5776F5D8D12580F79ACD476C21056662D5391AC262E82A56ADC751807EA94F8D59979733BBED2616A8BF1BCA16AF5D89350AA473E21108BE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):132
                                                                                                Entropy (8bit):3.9290313309779283
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlkAll8/mlvlllgggrNrxVvK28nslulflFp9ok:SvUA/8OP4XZrxVvK28nVTFck
                                                                                                MD5:4CF3AA31B641864AB60EF738B2B9903A
                                                                                                SHA1:92DB1CF0B23B8D187B404B1693C3841F16152BDA
                                                                                                SHA-256:4D2BBE1D4D9D0A4266448241596BCA9DA40A34D96E4FD309A205350156DE0134
                                                                                                SHA-512:E7E01AB79CE30F51B69B1C7094C325D55E08DA3703C05ED0741B05D30B2C4D662587338141AA5BF6EE9015CE1DFF2094982A40BA58F4ABCA7CF3E8C1A954E2EC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ....................................h.B7w.3.MW*eh...5.5.5.5..............`.... ..o.w......`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):9864
                                                                                                Entropy (8bit):6.028223099015054
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:W9hNlTjzDDD0DwxDWDHDpDVOEY8zUwHH2HdEhtFQDHkMEYP0w8lWsxVe:W9hjDDD0DmDWDHDpDEErLHH2Hd+Qbkqf
                                                                                                MD5:682FA0B11EFDB3D6B3109142943B5D0F
                                                                                                SHA1:E0E97C7BEC5FE6F7C5E373B0FB811E38BE8D0A94
                                                                                                SHA-256:AFE813885F2A9C431A276F976D9CFD979771345F28CE158EBFC29D3CCEAB56A6
                                                                                                SHA-512:4F429D583697E84B4745D4DB15DB684625E0894A641641E103F263416D6F8A23496E330A1473024EF799830109D23B7F86D55F22288378290B675D835D767A6D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................)................T.u.t...A.a.p...H...n...M.r.t...R...t...f.g.j...A.b.i.b...T.. e.r...G.e.i.t...J.u.l.y...J.u.n.y...K.n.y.n...O.k.s.e...S.j.a.....J.i.e.r...W.i.k.e...f...K.....n...K.....B.a.b.a.h...T.u.b.a.h...D.r.a.a.k...M.a.a.i.e...M.a.a.r.t...M.o.e.h.....S.j.a.w.....S.l.a.n.g...B.r.i.t.s...M.i.n...t...n...K.r.....A.d.a.r. .A...A.d.a.r. .B...E.l.l.o.e.l...K.i.y.a.h.k...M.a.a.g.h.a...S.j.e.v.a.t...B.a.a.r.c.h...H.o.a.n.n.e...H.y.n.d.e.r...S.j.a.w.a.l...f...g...j.....M.o.a.n.n.e...B.a.. u.n.a.h...P.a.g.u.m...n...T.a.m.m.o.e.z...T.i.s.j.r.i.e...J.o.e.m... .I...M.e.t.r.i.e.k...S.e.k.o.n.d.e...[... ... ...]...v.a.n.d.a.a.g...C.h.e.s.j.w.a.n...J.y.e.s.h.t.h.a...K.a.a.r.t.i.k.a...A.u.g.u.s.t.u.s...D.e.s.i.m.b.e.r...J.o.e.m... .I.I...N.o.v.i.m.b.e.r...T.i.i.d.s.r.i.n...d.i.t. .j.i.e.r...0.0.0. .t...z.e.n...S.e.p.t.i.m.b.e.r...O.e.r.m.o.r.g.e.n...F.e.b.r.e.w.a.r.i.s...J.a.n.n.e.w.a.r.i.s...d.i.z.z.e. .w.i.k.e...d.i.z.z.e. .f.r.e.e.d...d.i.z.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):536
                                                                                                Entropy (8bit):3.9455462591583674
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:WZtxKuBFaCXNbCv/SmtRguJR1nnX3Hv8UQnfRC83fEUM:WZbKOjpAXtRRRVX3v8UQnfw83fEUM
                                                                                                MD5:4909058929BDECA58C1E06AB23AFDCFD
                                                                                                SHA1:ACEEA31958CE39C3CDE0D03104B1E4524A1E4FBF
                                                                                                SHA-256:50BB23ABBE3B69E98B6949ED3DC57811832BC1D5BA15254414A97231BD788AF4
                                                                                                SHA-512:ABF3F12D893D30282B40100BE7C85003CEED2AF8F75BAD3CD123430EFF98E7ED467EF827945E3C3ACE28D39A9268F6922DF3CF9EF0EA36880CDFD6A1321F7649
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................|.. ....5...~...~...6.......|...genderList.af.ar.bg.bn.ca.cs.da.de.el.en.es.et.eu.fa.fi.fil.fr.gu.he.hi.hr.hu.id.is.it.ja.kn.ko.lt.lv.ml.mr.ms.nl.no.pl.pt.ro.ru.sk.sl.sr.sv.sw.ta.te.th.tr.uk.ur.vi.zh.zh_Hant.zu....n.e.u.t.r.a.l...m.a.l.e.T.a.i.n.t.s...m.i.x.e.d.N.e.u.t.r.a.l...6.+...1.4.7.:.=.@.C.F.I.L.O.R.U.X.\._.b.e.h.k.n.q.t.w.z.}................................................................................................................................................................... .!..P
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):3572
                                                                                                Entropy (8bit):5.800435594663508
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:eq3YGnCz1oLJ9iniJfziRUxwiH4Ge51dsn:uz1oLDinipiRMHOdsn
                                                                                                MD5:8038A8A283CF68FB9924ADCDBFD11331
                                                                                                SHA1:7E659DFE3E801BB7E99377494510F2CCD10921AF
                                                                                                SHA-256:D26995ABBE7F08FDF9333CBE86BF8025381A9D64DD7640E6CAEAFCCD429212CF
                                                                                                SHA-512:F7CD8724778A0EE69E144D6A0F73383CDBB72DFB86410F91AAF6BF9F8AE55823454B9025338B827263644A5A3DF9CCD8A612F5A41166F6A03C927139405C4A77
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................e.. ........u...u...........u........D.u.....F.r.....M.i.....M.......S.u.....Z.i.....h...t...J.a.a.r...n.a.m.....A.a.b.i.g...M.o.n.e.t...N.a.c.h.t...W.u.c.h.e...z.a.a.b.i.g...z.n.a.c.h.t...M.i.t.t.a.g...z.m.i.t.t.a.g...F.r.i.i.t.i.g...M.i.n.u.u.t.e...M.....n.t.i.g...S.u.n.n.t.i.g...a.m. .M.o.r.g.e...A.u.g.u.s.c.h.t...D.e.z...m.b.e.r...M.i.t.t.w.u.c.h...N.o.v...m.b.e.r...O.k.t.o.o.b.e.r...W.u.c.h.e.t.a.g...m.e.t.r.i.s.c.h.....b.e.r.m.o.o.r.n...D.u.n.s.c.h.t.i.g...S.a.m.s.c.h.t.i.g...Z.i.i.s.c.h.t.i.g...0.0.0. .T.u.u.s.i.g...0.0.0...T.s.g.'...'...a.m. .N.a.m.i.t.t.a.g...v.o.r.g.e.s.c.h.t.e.r...T.a.g.e.s.h...l.f.t.i...0.0.0...T.s.g.'...'.......0.0.0. .B.i.l.l.i.o.o.n...0.0.0. .M.i.l.l.i.o.o.n...0.0.0. .B.i.l.l.i.o.o.n.e...0.0.0. .M.i.l.l.i.o.o.n.e...a.n.g.l.o.a.m.e.r.i.k.a.a.n.i.s.c.h...E.[... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... .-. ... ... .+. ... ... ... .O. ... ... .M. .S. ... ... .m. ... .k. ...].......7.....y.B.)......J.......
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1344
                                                                                                Entropy (8bit):4.205968556156306
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:GksWkTiI1jIZl3+jyX/+hlVDQ+dss9NyDACuHuCuMSu0VS39irT4uBF77jd9H:PsWRI1jIZU7CU0aoPl
                                                                                                MD5:DC7D4EC2D1831B8A82F08869B380A8F9
                                                                                                SHA1:C4D4C2476657E5F079292D2D87CB43AF9F83D148
                                                                                                SHA-256:750FD42148E8990A976B2C9F62807835CA38D42A452E95333D334D79639C8514
                                                                                                SHA-512:480C3F5DCE7D35AF77DD0BD4040B06AA81EA901C0A58C7183B38BD13232B6A0560FC5D3CB5DCCB417118BB5F2CDBE3B6FD005B4003183882FAF3C9B1666C57CD
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................>.. ........H...H....................R.C...J.e.d...J.e.h...J.e.l...J.e.m...J.e.s...J.e.r.c...J.e.r.d...M.a.y.r.n.t...A.v.e.r.i.l...A.v.r.r.i.l...J.-.g.u.e.r...J.e.s.a.r.n...B.o.a.l.d.y.n...J.e.l.h.e.i.n...J.e.m.a.y.r.t...J.e.r.c.e.a.n...J.e.r.d.e.i.n...T.-.a.r.r.e.e...J.-.f.o.u.y.i.r...J.-.s.o.u.r.e.e...J.e.d.o.o.n.e.e...J.e.h.e.i.n.e.y...M.-.H.o.u.n.e.y...M.-.f.o.u.y.i.r...M.-.s.o.u.r.e.e...L.u.a.n.i.s.t.y.n...M.-.N.o.l.l.i.c.k...M.e.e. .H.o.u.n.e.y...M.e.a.n.-.f.o.u.y.i.r...M.e.a.n.-.s.o.u.r.e.e...J.e.r.r.e.y.-.f.o.u.y.i.r...J.e.r.r.e.y.-.g.e.u.r.e.e...J.e.r.r.e.y.-.s.o.u.r.e.e...M.e.e. .n.y. .N.o.l.l.i.c.k...T.o.s.h.i.a.g.h.t.-.a.r.r.e.e...{.0.}...h.u.n.n.a.g./.v.u.c./.o.o.y.l...{.0.}...t.h.u.n.n.a.g./.m.u.c./.o.o.y.l...{.0.}...t.h.u.n.n.a.g./.v.u.c./.o.o.y.l...{.0.}...t.h.u.n.n.a.g.y.n./.m.u.c.y.n./.o.o.y.l.y.n...{.0.}...d.y...h.u.n.n.a.g.y.n./.d.y...v.u.c.y.n./.d.y...o.o.y.l.y.n...7.[.a. .b. .c. ... .d. .e. .f. .g. .h. .i. .j. .k. .l. .m. .n. .o. .
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):4568
                                                                                                Entropy (8bit):5.913040697749047
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:nszCz9tVyDdvPu/eCMxQz4s0zHdQ9r03HdQ9rfGVRAkPjq8+7:n2CjV8dv2/yGuz999SGgku8+7
                                                                                                MD5:FE43EFA3B9B8927080FF1352FC3A02D4
                                                                                                SHA1:B376FC744C14D48BFEB6861DEC28FED967032693
                                                                                                SHA-256:D0281A21D01EF8CC421575F5402EAB5291D0B7EF7C664AD13FA173B40E6EB574
                                                                                                SHA-512:87AF3E22CC6A7F6AB65B8A4B9707A68C1B5BBF0F8E1685EEDC91FA3B1B34AC18675D8E4B104568D42D2F52BDCC9D9373B8B17F4930D831CCD8D0977314E300A0
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................[.. ........n...n...1................A.l...A.s...L.h...L.i...L.r...T.a...A.w.a...Y.a.u...A.f.i...A.s.a...F.a.b...L.a.h...L.a.r...L.i.t...N.u.w...K...H.......0.D...G.o.b.e...J.i.y.a...M.a.k.o...W.a.t.a...M.a.y.u...Y.u.l.i...Y.u.n.i...B.H.A.I.......0.0.D...K.w.a.n.a...K.w.a.t.a...M.i.n.t.i...K...H...Y...M.a.r.i.s...B...H...Y...Y.a.m.m.a...D.a...i...a.......0.0.0.D...A.g.u.s.t.a...A.s.a.b.a.r...D.u.b.u. .0...L.a.h.a.d.i...S.a.f.i.y.a...S.h.e.k.a.r.a...A.f.i.r.i.l.u...A.l.h.a.m.i.s...D.i.s.a.m.b.a...D.u.b.u. .0.0...J.a.n.a.i.r.u...J.u.m.m.a...a...L.i.t.i.n.i.n...N.u.w.a.m.b.a...S.a.t.u.m.b.a...D.u.b.u. .0.0.0...,.[... ... ... ... ... ... ... ... ... ... ... ... .p. .q. .{.r...}. ... ... ... .v. .x.]...5.[.A. .B. ... .C. .D. ... .E. .F. .G. .H. .I. .J. .K. ... .L. .M. .N. .O. .R. .S. .T. .U. .W. .Y. ... .Z.]...C.[.a. .b. .S. .c. .d. .W. .e. .f. .g. .h. .i. .j. .k. ... .l. .m. .n. .o. .r. .s. .{.s.h.}. .t. .{.t.s.}. .u. .w. .y. .{...}. .z. ...].......7.....Y4
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):20956
                                                                                                Entropy (8bit):5.910124146251425
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:oP3vdiXUxH+mTJcIWlj3qUl2nqg9WbknRyB2r/S/a0ZO47T79r0PobtFeyf5eitG:oPfdiXUxH+mTJcIWlj3qUl2nqg9WbknB
                                                                                                MD5:92DDB8204215C89C13881C157ACD72FB
                                                                                                SHA1:C7163CB1144428C4B8BC80E45214A585DB86759D
                                                                                                SHA-256:B999B383BBED45223E606D0EE1736BFA58CD4695744E1FECACB1B3722FC0746C
                                                                                                SHA-512:12CBCB64C32986DC0B190BC00C061DB76B2325F72A88204957E07533DFB83C8C9C78B48A9A8B48A153966EF5B511121D680FAE25938B6B98C344AB5F5D5F5CDF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................U.. .5......o...o...V.....5.S......................................................................................................................................................................................................................................................................................................h.e.b.r...................................................................................................................................................................................................................................................................................................................................................................................... h. .a.................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):18092
                                                                                                Entropy (8bit):5.595054760307402
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:GD/kAwlk0XuWv6Sa+RsvpCjpMPIPXcppIAt8mqxltFLJJ89WDanJJv:GwAwlk0XuWv6cRsvpDPP/tLCC9CanJt
                                                                                                MD5:37A0FC03E5453CF3D0E76ED34587A4C9
                                                                                                SHA1:E921B5FCCA20B4DCA4CC9EE87F67B89763807384
                                                                                                SHA-256:E3C03307CBD94E484BF970BB41F98B10EFB1E5F39E369EA0B9287E440CB5AC8C
                                                                                                SHA-512:3D555398275861B8D29880AF3BA7B1AC5D0D1BE2F039DC8CF45DC4B9992F7728C56DCD001922306ECDA4EFFA1CB6604849DCBF33088D66AB28F37E20CE93EF53
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................V...................C.s...S.z.....v...M.F...T.....n.Q...d.e.....d.u.....d...l...S.z.e...S.z.o.....r.a.....r.a...I.V.....e.s.t.e...G. .y.....I.j...r...S.v...t...T.h.o.t...T...b.i.....d...r...I.I.I.....M.. M.....j...l.....j...n.....m...j.......p.r.....M.o.h.....R.e.d.....S.a.b.....S.e.v.....h.e.l.y...i...e.....i.s.z.....m.o.s.t...s.z...v...t.e.s.t.....j.f...l.....j.j.e.l...0.0.0...E...A.t.h...r...M.e.h.i.r...P.a.u.n.i...T.i.s.r.i...S.a.b...n...e.g.y...b...m...j.u.s...m...r.c.....a.n.g.o.l...f...r.f.i...i... .e.....i...s.z.....y... .M.......l.l.a.t...h.a.j.n.a.l...r.e.g.g.e.l...H.e.s.v...n...N.i.s.z...n...P.a.o.p.h.i...S.z.i.v...n...T...v...s.z.....d...r. .I...h.o.l.n.a.p...t.e.g.n.a.p...R.e.d.s.e.b...S.e.v.v...l...i... .s.z.....j.a.n.u...r...j...l.i.u.s...j...n.i.u.s...s.z.e.p.t.....G. .y.. y.....R...b... .1...R...b... .2...R...b.i. .I...n...v...n.y...s.z...m.o.k...u.t.a.z...s...z...s.z.l.......p...l.e.t...0.0.0...E.......K.i.s.z.l...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):13244
                                                                                                Entropy (8bit):5.346525451471591
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:Buc+QEbNN5Yc+gTsS7zEldvw4mQfIA554:Buc+QEJbBzQfy
                                                                                                MD5:BA067583F68568C52B1C2CEA578BA60F
                                                                                                SHA1:781D0CDA74B59F2D2F3BD4C44CA8577979829521
                                                                                                SHA-256:A15E19FCF00BE14BD2BEEABC2C36B69E3F1EA36FB33E92D303D1B5B772660612
                                                                                                SHA-512:0C8D22DF97F3486B542EE408F6D98F5EC219F1A385FECF1C074578AA3F9910CF03312689E406C50E5D160BE8A13549314F4F56A83805F065E0985A556906432A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .z..............V.....z..........j.o...j.o.v...o.c.t...v.e.n...a.E.C...h.e.r.i...l.o.c.o...h.o.d.i.e...c.l.a.v.e...c.i.f.r.a...c.o.r.d.e...d.e.m.a.n...m.e.t.e.o...v.i.a.g.e...m.a.r.t.i.o...p...C.h.r.....a...C.h.r.....a.l.t.e.r.e...d...d...a.....d...d...s.........0...b.l.n.......0...m.i.l.......0...m.l.d.......0...m.l.n...0.0.0. .b.l.n...0.0.0. .m.l.d...0.0.0. .m.l.n...a.u.g.u.s.t.o...o.c.t.o.b.r.e...c.o.r.p.o.r.e...f.e.m.i.n.i.n...n.u.m.e.r.o.s...o.b.j.e.c.t.o...s.a.g.i.t.t.a...s.e.c.u.n.d.a.......0.0...b.l.n.......0.0...m.i.l.......0.0...m.l.d.......0.0...m.l.n...d.e.c.e.m.b.r.e...j.a.n.u.a.r.i.o...b.a.n.d.i.e.r.a...f.e.b.r.u.a.r.i.o...i.s.t.e. .d.o.m.....i.s.t.e. .j.o.v.....i.s.t.e. .l.u.n.....i.s.t.e. .m.a.r.....i.s.t.e. .m.e.r.....i.s.t.e. .s.a.b.....i.s.t.e. .v.e.n.....b.a.n.d.i.e.r.a.s...b.r.i.t.a.n.n.i.c...e.m.o.t.i.c.o.n.e...i.s.t.e. .a.n.n.o...i.s.t.e. .h.o.r.a...o.r.n.a.m.e.n.t.o...0.0.0. .m.i.l.l.e.s...i.n. .{.0.}. .a.n.....d...d...s...d.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):88
                                                                                                Entropy (8bit):2.8906977556519604
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlq/6ZjlllhlL4CllVcNX:SBtkJa/6lBL4C/VcNX
                                                                                                MD5:BA9809A2B8AEDE0B6F1E31DDE40EDF94
                                                                                                SHA1:0F936501FBC01CF480104043F59F5629C3B226A0
                                                                                                SHA-256:B60D3260DD3F92A574E49A1CFFD7812B4FE358AB74E79841D0C1CCCE872A45B8
                                                                                                SHA-512:F791169D12B86BDE1065C43AFB17A28F6D96E57D471BF37CE89869D256DCC74D7DCEB25E8141A4E29E705ABFDBA1B855586224435B6F15BE99CD81607275E8C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................StandardICU....... .....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):15272
                                                                                                Entropy (8bit):5.81385632933126
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:mXvRKgZj3sPludNBdyW2d8IvbCIUHRBOIA:05rdjdL2yhIUHTzA
                                                                                                MD5:DD1DB37C045650FCE3615342D31FC0BB
                                                                                                SHA1:13444EA55FDCCD22BCCCF56180317FEB34E1C9C6
                                                                                                SHA-256:049BC6785252417645AF0D6795607FD03F26A98A83EDDEC316D67DE6F1F5CF5E
                                                                                                SHA-512:BCC23B26714CFD7CC2EE5614E237DD0CE58704888C1A49EBD613A3334FE9130396FD3723A3F720D466A181C3D25D01905F502326FB4B831AE4389D86328925BF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .m..............V.....m..........S.M...A.S...K.a.m...M.i.n...R.a.b...S.e.l...S.E.U...J.a.m...[...]...p.a.g.i...s.o.r.e...m.g.g.....l.u.s.a...b.l.n.....t.h.n.......0...M...d.t.k.....m.n.t.....p.r.i.a...s.i.a.n.g...M.a.r.e.t...S.y.a.w.......0.0...M.....0.0...T.....0...j.t.....0...r.b...a.n.g.k.a...b.a.d.a.n...b.e.s.o.k...h.e.w.a.n...o.b.j.e.k...p.a.n.a.h...S.y.a.w.a.l.....0.0...j.t.....0.0...r.b...t.e.m.p.a.t...v.a.r.i.a.n...w.i.s.a.t.a...A.g.u.s.t.u.s...S.y.a.. b.a.n.....0.0.0...j.t.....0.0.0...r.b...j.a.m. .i.n.i...k.e.m.a.r.i.n...l.a.i.n.n.y.a...0.0.0. .j.u.t.a...0.0.0. .r.i.b.u...J.u.m... .i.n.i...K.a.m... .i.n.i...M.i.n... .i.n.i...R.a.b... .i.n.i...R.a.m.a.d.h.a.n...S.a.b... .i.n.i...S.e.l... .i.n.i...S.e.n... .i.n.i...h.r. .k.e.r.j.a...z.o.n.a. .w.k.t...{.0.}...h.a.r.i...R.a.b.u. .i.n.i...b.a.n.g.u.n.a.n...h.a.r.i. .i.n.i...o.l.a.h.r.a.g.a...p.e.n.g.u.b.a.h...s.e.k.a.r.a.n.g...t.u.m.b.u.h.a.n...a.i.r. .h.u.j.a.n...A.k.t.i.v.i.t.a.s...J.u.m.a.t.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):3712
                                                                                                Entropy (8bit):5.835884773736162
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:2/Tb4xPO2EGQZequxts3HcMjCFIGHRQq1:2bMxPOxtZruxtNMj8BQq1
                                                                                                MD5:6337A543901F7AA90833070F4DF3C92A
                                                                                                SHA1:8F71D0817885F729C58B2E442979535410055C33
                                                                                                SHA-256:EAF485FF424499951272C8FA2289B23C251D11B51A11C77AE2869FFCE8AA7EBE
                                                                                                SHA-512:1BB561E6B268351DEDE091B65A594FB09DDDA90449776143E7F2D9500588598B623175EFAA20FB20D7C8C2CCF03B412CFA26E37F2D055D5236A476A8FBA0509D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .6..............-.....6...............1.....2.....3.....4...j.. ..M...n...T.i.u...T.......W.e.n...I.z.u...E.p.r...J.e.n...J.u.u.....g.......k.t...T.O.A...T.a.a...P...M.....F.r.a.....E.c.h.i.....n.w.a...A...K.....J.u.u.n...T...K.....A.g.b.a...N.k.e.j.i...J.u.l.a.....M...n.d.e...T.a.a.t.a...S.e.k...n.d.....b...c.h.....E.p.r.e.e.l...M.a.a.c.h.......g.....s.t...S.a.t...d.e.e...E.l.e.k.e.r.e...F.r.a...d.e.e...N.n.y.a.a.f.....T.i.u.z.d.e.e...T.....z.d.e.e.....k.a.r.a. .1.....k.a.r.a. .2.....k.a.r.a. .3.....k.a.r.a. .4...M.e.t.r.i.i.k...N.. a.b.a.l.i...N.. ..t...t.......n.y.a.a.h.....J.e.n...w.a.r.....W.e.n.e.z.d.e.e...N.k.e.j.i. .A.f.....F.e.b.r...w.a.r.......b...c.h... ...k.a...A.f... .K.r.i.s.t.i.....b...c.h... .i.z.u...T.u.p.u. .K.r.i.s.t.i...{.0.}.,. .n.a. .{.1.}...{.1.}. .'.n.a.'. .{.0.}...M.p.a.g.h.a.r.a. .o.g.e...N.. ..t...t.../.N.. a.b.a.l.....).[.\.-. .,. .;. .\.:. .!. .?. ... .. .. .. .. .(. .). .\.[. .\.]. .\.{. .\.}.]...<.[....... .c. ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):228
                                                                                                Entropy (8bit):4.580372362566896
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:Svuldmpqr4Kl+5+/gcCqD27OyxPY8ACPqhUG/oX0F1ZSnm4l/8N:Ddmo0mkkkPTG6pmo/8N
                                                                                                MD5:E6407BFCE874AFF5110FFC45C2DF32CB
                                                                                                SHA1:C4A0CFC1F717E65A24CC7AFB13AED52EB5B95510
                                                                                                SHA-256:98C0037AC005C0ED74A66F5FF193AF36CCBA581EA9BB25BAE46AC6007A0FF7A6
                                                                                                SHA-512:D6E5D16FD4F685CFCE854E79F7D30A1EE8B99F5067EDFFB64141D90AAB40211EBB3C255261B769E0C26D02C8DF56078FCD2BDB8DFA84A1E7D55E69BF93EAE780
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................*.. ........1...1........................y.............k..)...4.wEy...]..jeje......k..)...4.wW*ehe........................P...P....... ....................`...".. $.. ..[...o.w......` .. ...`&..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):15696
                                                                                                Entropy (8bit):5.6376706549133
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:v/i67HTEJAyjDfQ+cRKTUaWI0KIS9eUs+AbvG6+OSkau6FQ2f:HiqgQ+2OUTDZS9eUSbnXu
                                                                                                MD5:193942E35467A793AB28C29056B83A25
                                                                                                SHA1:8761870C6AD65117470ED40B2886BABF89772FC8
                                                                                                SHA-256:4EE76B3E650BEA3169EF3E5DDC5923720D337331D581CA27BF405BA43B4533F8
                                                                                                SHA-512:39EE362F37253EA4602E8A7F63B39EB21CDFAD94A16BF8ECC30B14517576E2A707CE36824396D9B25D19D9250256E5FBEC60F1CEC3A0952B10D00D6188B4DFF6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................5.. ........L...L...V..............................................................................................................................................................................................................................................................................................................g.e.o.r...........................................................................................................................................................{.0.}.-...................................................................I.V. ..................................................................................... .......{.0.}.-......................... ............. ............. ............. ............. ............. .......................................................-.{.0.}................................................... .......I.I.I. ............................................. .................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2220
                                                                                                Entropy (8bit):5.133887433059866
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:lWYogzBV1v8su8uhIy8LKDTV4vLIb4i6vTfcFwVra:lT5zf1v8j8uhIy8LKH2zIbYvjcOY
                                                                                                MD5:9F1DFB3396A040402379FD6F7FD26D89
                                                                                                SHA1:D3BB893D512B63E1F9B2A0A810A367934B4C1644
                                                                                                SHA-256:B43471A74A5F43B49E1E18808648A972E6C8D1CC780ED60E7174BB92FF648715
                                                                                                SHA-512:6958E03C4D58C6D7B580B3CB04E91CFA305CE1DD53034AB8E7DA8818856AA6BAFA616E948AD1C4E0E5EB5CC7EBA5AEF5124F9757E5F3AF10BA14167A77D85919
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........#...#........................A.s.s...C.t.e...D.u.....F.u.r...K.u.....M.e.c...N.u.n...S.a.n...S.a.y...T.u.b...Y.a.n...Y.e.b...Y.e.n.....u.c...K.r.a.....K...g.1...K...g.2...K...g.3...K...g.4...S...i.s.....u.c.t...A.g.g.u.r...A.s.s.-.a...D.d.u.r.t...F.u.[.a.r...M.a.y.y.u...T.u.b.e.[...Y.u.l.y.u...Y.u.n.y.u...[.o. .v.]...A.z.e.k.k.a...I...e.l.l.i...K.u...a.s.s...M.e.c.r.e.s...S.a.m.a.s.s...S.a.n.a.s.s...S.a.y.a.s.s...T.a.l.l.i.t...T.a.m.e.r.t...T.a.s.i.n.t...Y.a.n.a.s.s...Y.e.b.r.i.r...n. .t.u.f.a.t...A.s.e.g.g.a.s...C.t.e.m.b.e.[...K.r.a...a.s.s...S...i.s.a.s.s...T.a.m.r.e.c.t...D.u...e.m.b.e.[...N.u.n.e.m.b.e.[...Y.e.n.n.a.y.e.r...s.l.d... .T.......s.n.d... .T.......U.s.s.a.n. .n. .d.d.u.r.t...a.k.r.a...a.g.g.u.r. .a.m.e.n.z.u...a.k.r.a...a.g.g.u.r. .w.i.s.-.k.u.....a.k.r.a...a.g.g.u.r. .w.i.s.-.s.i.n...n. .t.u.f.a.t. ./. .n. .t.m.e.d.d.i.t...a.k.r.a...a.g.g.u.r. .w.i.s.-.k.r.a.....s.e.l.d. .t.a.l.a.l.i.t. .n. ...i.s.a...s.e.n.d. .t.a.l.a.l.i.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2064
                                                                                                Entropy (8bit):4.948433584060709
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:gQ4G3fYb9JqyAbjEuuhfyAuGs9aRNuynom0hjM93rjM1n5gWVuzQVnA:60YbHjxBJNcm0BEvqn5/1A
                                                                                                MD5:38B85F189DFA6F6AF02FF64792ED29CD
                                                                                                SHA1:BD7F5D6E3EA0C0774724C7C60CB2F34DEA05A980
                                                                                                SHA-256:88F0AFF524D91359E2D6D5518487FBB24F098756425B96E6FD63097C788D63A7
                                                                                                SHA-512:BD852CEADFC6A00419FD97C9D1FE597E17CB7BBEDAFB64957B574154DFE532D3EA4F66316A14D54B3C2BC633D7A76DE71751E87000690814E147A7AD34D45C06
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .6....................6.........(...I.Y...M.Y...K.e.l...K.n.d...K.t.n...K.t.i...M.b.e...M.o.o...N.y.a...W.k.l...W.k.n...W.k.w...W.k.y...W.t.h...W.t.n...W.t.i...(.k.l...(.k.m...(.k.u...h.n.)...M.w.a.i...(.y.o.o...K.y.u.m.w.a...(.v.i.n.d.a...N.d.a.t.).k.a...W.a. .k.a.n.a...W.a. .k.e.l.)...h.m.i.n.t.h.)...K.y.u.m.w.a.n.)...(.y.a.k.w.a.k.y.a...W.a. .k.a.t.a.n.o...W.a. .k.a.t.a.t.i...W.a. .k.y.u.m.w.a...L.o.v.o. .y.a. .k.a.n.a...L.o.v.o. .y.a. .k.e.l.)...L.o.v.o. .y.a. .m.b.e.e...M.b.e.e. .w.a. .Y.e.s.i...M.w.a.i. .w.a. .k.a.n.a...M.w.a.i. .w.a. .k.e.l.)...M.w.a.i. .w.a. .m.b.e.e...W.a. .t.h.a.n.t.h.a.t.i...M.w.a.i. .w.a. .k.e.n.d.a...M.w.a.i. .w.a. .).k.u.m.i...(.t.i.n.a. .w.a. .Y.e.s.i...K.).s.i.o. .k.y.a. .).s.a.a...L.o.v.o. .y.a. .k.a.t.a.t.i...M.w.a.i. .w.a. .k.a.t.a.n.o...M.w.a.i. .w.a. .k.a.t.a.t.i...M.w.a.i. .w.a. .m.u.o.n.z.a...W.a. .k.w.a.m.b.).l.).l.y.a...M.w.a.i. .w.a. .n.y.a.a.n.y.a...(.y.a.k.w.a.k.y.a./.(.y.a.w.).o.o...M.w.a.i. .w.a. .t.h.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2024
                                                                                                Entropy (8bit):4.901964455259392
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:GCiDWP474e4l4PjP4YRMo4oMwRMQRMKRMEl4oMCRMWRMERMfRMERMMjMFrjMpIgy:3Mt42tjVrRVHRuRbMGIgmBTmM9f
                                                                                                MD5:C4A9A42D870D122DB294424CDC0A8A3D
                                                                                                SHA1:F1CEB777A63F2301C1EAB9BA223A2DD2308017D2
                                                                                                SHA-256:A74EFB4AE75E0D79A479B4853DAB200CAFA59101344BC77801F0395F4080F9D1
                                                                                                SHA-512:0BF5982577288FE10DF77DA1CB3A54E49AB5D545B444C33A977FFCFD7F431364E0F3D773C072FD5B51C9049796527CB1D29D7802754C6E6DD23AF761EA11F481
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .m....................m.........A.Y...N.Y...L.l.1...L.l.2...L.l.3...L.l.4...L.l.5...L.l.6...L.l.7...M.u.h.i...L.i.d.o...N.e.l.o...M.w.e.d.i...N.u.n.d.u...L.i.h.i.k.u...L.i.j.u.m.a...M.a.h.i.k.u...M.u.h.i./.C.h.i.l.o...M.w.e.d.i. .N.t.a.n.d.i...M.w.e.d.i. .w.a. .P.i.l.i...M.w.e.d.i. .w.a. .T.a.t.u...N.a.n.k.u.i.d.a. .Y.e.s.u...A.k.a.n.a.p.a.w.a. .Y.e.s.u...L.i.d.u.v.a. .l.i.t.a.n.d.i...L.i.d.u.v.a. .l.y.a.p.i.l.i...L.i.d.u.v.a. .l.y.a.t.a.t.u...N.p.a.n.d.a. .w.a. .m.u.d.a...M.w.e.d.i. .w.a. .N.n.y.a.n.o...L.i.d.u.v.a. .l.y.a.n.n.y.a.n.o...M.w.e.d.i. .w.a. .N.c.h.e.c.h.i...D.i.s.i.k.u. .d.y.a. .l.i.j.u.m.a...L.i.d.u.v.a. .l.y.a.n.c.h.e.c.h.i...M.w.e.d.i. .w.a. .N.n.y.a.n.o. .n.a. .U.m.o...L.i.d.u.v.a. .l.y.a.n.n.y.a.n.o. .n.a. .l.i.n.j.i...M.w.e.d.i. .w.a. .N.n.y.a.n.o. .n.a. .M.i.t.a.t.u...M.w.e.d.i. .w.a. .N.n.y.a.n.o. .n.a. .M.i.v.i.l.i...M.w.e.d.i. .w.a. .N.n.y.a.n.o. .n.a. .N.n.y.a.n.o...L.i.d.u.v.a. .l.y.a.n.n.y.a.n.o. .n.a. .m.a.v.i.l.i...M.w.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):6876
                                                                                                Entropy (8bit):4.946324598732954
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:WDsNYz5J6B76OA/Ok9yNKTFEdsimwEtLVOIFyU7W/fCGrlw7vHHFoGjjeHgA2:WD1zCR88KTIm1U8y7SGkvnFo+jsy
                                                                                                MD5:0043D5000800EAA0476252B372BBA4D1
                                                                                                SHA1:C64CD761CDBBCD2925C3B128E795BF76A3DCFB59
                                                                                                SHA-256:9FF8B84024791426589B9454E301E7AAA5734A9471B492DB01EF2A8BBE50FDC4
                                                                                                SHA-512:A6EB41A175A9574D2834946B42699C36370379AC10923F8158F3C4743EAA97F4A3DB4FE2D23EE2CCED0E8E8732C2CF622016FAC6F085085A37CD104241B9BC58
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................/...........bcpTypeAlias.ca.islamicc.keyInfo.deprecated.kh.vt.valueType.h0.x0.keyMap.calendar.colalternate.colbackwards.colcasefirst.colcaselevel.colhiraganaquaternary.collation.colnormalization.colnumeric.colreorder.colstrength.currency.d0.fw.hours.i0.k0.kv.lb.lw.m0.measure.numbers.s0.t0.timezone.variabletop.typeAlias.quarternary.typeInfo.co.direct.camtr.typeMap.buddhist.chinese.coptic.dangi.ethiopic.ethiopic-amete-alem.gregorian.hebrew.indian.islamic.islamic-civil.islamic-rgsa.islamic-tbla.islamic-umalqura.iso8601.japanese.persian.roc.account.standard.non-ignorable.shifted.yes.lower.upper.big5han.compat.dictionary.ducet.emoji.gb2312han.phonebook.phonetic.pinyin.reformed.search.searchjl.stroke.traditional.unihan.zhuyin.REORDER_CODE.digit.punct.space.symbol.identical.primary.secondary.tertiary.adp.aed.afa.afn.alk.amd.ang.aoa.aok.aon.aor.arl.arm.arp.ars.ats.aud.awg.azm.azn.bad.bam.ban.bbd.bdt.bec.bef.bel.bgl.bgm.bgn.bgo.bhd.bif.bmd.bnd
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1892
                                                                                                Entropy (8bit):5.089152503137751
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:58MtyDcuzJJsSxcE7OI+HCVhlms+jWoUQdijq6LrLrLzj4bo7r85FXKar:ptyDcmMSiE7haQlms+y9Qdi5LrLrLn49
                                                                                                MD5:68749307A2C6C01AE6022CC216368F81
                                                                                                SHA1:BA9781D455A957A6EFFFB3F674ACB57BB3616395
                                                                                                SHA-256:44AC6E5FEF29C38664BFC4468DF48895004EFC598086D024D3CF0B9C70DDABC3
                                                                                                SHA-512:8F2B7D8DF88AFB4E0CA634A321D5C43C0526F1FE561B1F7728E9DE5C4E2350547A0A5B01185249E9E3043827F523C29E8036F33A4B3FB7866AE3C52350C59318
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................................m.s...m.[...f.[...y.e.d.i...k.w.e.y...m.u.k.a...l.u.n.d.i...n.j.a.p.i...p.a.m.b.a...w.a.n.j.a...k.u.K.g.w.[...n.y.u.k.u.l...n.[.m.[.n.T...S.u.l.S.u.s.[...m.[.r.k.[.r.[.d.i...v.a.K.d.[.r.[.d.i...E. .d.d./.M.M. .y...m.T.n.T. .s.T.n.d.i...N.y.T.l.T.m.b.T.K.g.T...M.T.n.T. .K.g.b.a.n.j.a...m.b.i.y.T. .m.[.n.d.o.K.g.T...E. .d.d./.M.M. .y. .G.G.G.G.G...N.y.a.K.g.w.[. .K.g.b.a.n.j.a...[.,. .\.:. .!. .?. ... .& .. .9 .: .. .. ... ... .(. .). .*.].....[.A. .B. ... .C. .D. ... .{...y.}. .E. ... .F. .G. .{.G.b.}. .{.G.w.}. .H. .I. .{.I.'.}. .J. .K. .{.K.p.}. .{.K.w.}. .L. .M. .{.M.b.}. .N. .{.N.d.}. ... .{.N.y.}. .J. .{.J.g.}. .{.J.g.b.}. .{.J.g.w.}. .O. ... .{...'.}. .P. .R. .S. .T. .U. .{.U.'.}. .V. .W. .Y.].....[.a. ... ... ... .{.a.'.}. .b. .S. .c. .d. .W. .{.W.y.}. .e. ... ... ... .[. .{.[...}. .{.[...}. .{.[...}. .{.[.'.}. .f. .g. .{.g.b.}. .{.g.w.}. .h. .i. ... ... ... .{.i.'.}. .j. .k. .{.k.p.}. .{.k.w.}. .l. .m. .
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):28556
                                                                                                Entropy (8bit):5.803587066284139
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:Q6qtmsWbuGaJC6NcUi0ZI/Rkimpc+IO/15E3C3VSyZ7/cdkfxN7jHXgiiAX:Q6Dscx6N/Ikiecb217nbHj
                                                                                                MD5:4BE347054E963AB2D432D2C2CECDF9F9
                                                                                                SHA1:5015B7090F8D7ED7E89BF322241C5A4C153E11FB
                                                                                                SHA-256:1190F172A81569AF1BDB953836E40B5A2C92071803D9626B20A467CC4F4D398E
                                                                                                SHA-512:5FB4E40B578526A16D407B11BAD800C03E8F18E9185A121226E8EAA0F17A5170E3C786EE647A8E5110E4C6887D69741A9248CCA21A800120D8F846DC3237C0A6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................V...................$.......T...U...3.....4.....5.....6.....7.....8.....9.......$...$.........................A........... ...........x............................ ..........t..........t.....$........L.t...,......t...h.......8.....D..... ...........$.....x................. ...........$.....x.................i................... .........t.......0.....0.....0.....0. ...0.....0.....0.t...C..................$.....\...p..........|..........4. ...4.....4.$...4.x...4.....4.....1.\.... .........$....x...............0......................$.....\...+....P.H.....'.....D...................... ..........t...D....U..........D.....D.....D....D. ...D....D.t.....$.........................X...................X.....\.\...\......................t.<.....(.....1.....D.....|....<...).............<.....0.....@.....<................1........$....,.t...x.<..............X....\....1.1.....1.2.....1.0.......D.....P.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2984
                                                                                                Entropy (8bit):5.341880406270565
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:7X6nloFtS2bOkPfCA2em0NVrChaLQyoJBGyvWClpb3P4Nv2R:7sloFUUOIfRm0NYhPyoZvWClVe2R
                                                                                                MD5:4DD3D8949DB8BA7C26990D277F7E44BF
                                                                                                SHA1:36FA32A8F7E779E42EFFE92BB6EBAA93EDD853D2
                                                                                                SHA-256:7D6B05124CD5B9A492EF5436B4945BF978CD44BEA2D20D334FC84A57E4E68976
                                                                                                SHA-512:7F9A59D8DB949C4AF24DA92588C7F9843B414D0B14B19D33982E7FE2D1E0F7ECE3D1A5AEC6184F1145C4C495242DF2F3AD33767C74B2DD0761F6A39004D6078E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................0................^.....n...d._...p._...s._...y._....._.....1.....2.....3.....4...B.Z...P.Z...s.l...p..._...a.v.r...g.e.l...g.u.l...h.f.....k.e.w...r.e.z...r.e._...r...b...s.e.r...s.t.....t...r...d.u.h.....r.o.....s.a.l.....r.k.....s.a.e.t...s.i.b.e...d.u._.e.m...s..._.e.m...a.d.a.r.....a.v.r...l...g.u.l.a.n...h.e.f.t.e...r.o.j.e.k.....a.r...k...r.e._.e.m.....y.e.k._.e.m.....a.r._.e.m...t...r.m.e.h...%.#.,.#.#.0...a.v.r...l.....d.e.q...q.e...g.u.l.a.n.....h.e.y.w.a.n...k.e.w.....r...p..._.p.e.r...r.e.z.b.e.r...s.a.n.i.y.e...s.e.r.d.e.m...p...n.c._.e.m...{.0.}. .r.o.j...g.e.l.a.w...j...k.e.w.....r.....p..._.p.e.r.....r.e.z.b.e.r.....t...r.m.e.h.....g.e.l.a.w...j.....r.e._.e.m.i.y.....r...b.e.n.d.a.n...s.e.r.m.a.w.e.z...{.0.}. ... .{.1.}...b.e.r.f.a.n.b.a.r...r...b.e.n.d.a.n.....s.e.r.m.a.w.e.z.....{.0.}. .a.n. .{.1.}...b.e.r.f.a.n.b.a.r.....s.a.l.a. .p.i._.t.....b.e.r... .z.a.y...n.....p.i._.t... .z.a.y...n.....h.e.y.w.a.n. .a.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):932
                                                                                                Entropy (8bit):4.55715791046585
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:JQEuuRPl1wFTDWny0cx4sOItXInEl+90l+3y7ElUBRXnssUNPJN/Vxnjv8JJw3UH:QuNlq0c+Atr+9c+CAUBFvaPnjvaKU5N
                                                                                                MD5:9BCD9030FFDB12BAAB504DDC853C35FB
                                                                                                SHA1:BD63B57FA203696840F4AC81D3E35CBD1C3EE816
                                                                                                SHA-256:96608B69E51D4C3D0EB4DA7364845064574E7EE994B78F904CBE53E52C354429
                                                                                                SHA-512:53299EEEFBC5DB380FCA8ED82486D4A4DCBA648A254CCF283558AE8CE8AA4F348D4355110A8E9C89CAA5FBE03FF20AF78DD7FD8BF10754511E93FA15506D9F22
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................-...........R..s..T...e...C.h.[.....D.T...s...E.g.b.....E.n.d.....T.a.m.....Z.u.l.....K.h.m.[.....M...l.a.e...U.u.d...w.....l.a.b.......m.a.l.....C.h...e.n.....D.z.a.m.[.....G.h...l.......K.p.T.l...s...L.u.s.h...a...S.u.e.d...s...S...m.a.l.....T.....k...s...Y.u.l...b.a...k...u.l...a.....t.a.l...a...K.h.K.g.e.l.e...L...w.a.n.d.....B...u.g.h.l...a...B...u.m.[.s.[.....B.h...K.g.a.l.....D.z...b.v...n.....D.z...k.p...n.....H.T.K.g.a.l...a...K.p.[.[.s.h...a...L...m.a.n.y...a...N.[...k.p.a.l.......k.[.l.[.n...a...K.p.o.t...w.g...i...K.h.t.s.T.K.k.a.K...S.h...k.p.a.n...s...V...y.[.t.n...m.....B.[...l...l.u.s...n...K.p.u.w.n.d.z.a.b.....K.h...f...l...K.s.i.....n.d...n.[.s.h...a...-...@...[.......*.7.B.X.o.....@.....'.........D.Y.......0.[.........A.M.............H.F......0......Z.l.......J............C.~.u..<..c.............R.'. ..........5..........V...L..P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1140
                                                                                                Entropy (8bit):4.1083465013521225
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:8XTclGV3TInR6wXBJ0lXKxMNuwPwTSGUxzrkVnfM8+kS0YUlrKAH8YZl0ui8aAAL:8TFMfy94lK0frvJ2xzqxbxzRMmwVpb
                                                                                                MD5:531F5712ACD4D1725A78494EA29B1B87
                                                                                                SHA1:A7B23C03B40C0A7FEE8FA8E34300983AACB0A16E
                                                                                                SHA-256:2B9981A539D7380CEF83307E1A772A982416A4BE0972873BAAD05512ECA08814
                                                                                                SHA-512:109DDEA80DA78C7B057CAFBC6D0CCEF971ACB8B352DAED64896124CE961C1D916A59712BD9C59EA5A1AF7B5F72FD59CB715DD0852986785A20FCB825C9D2AE8A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................,...........R..s..A.m.a.r.i.k...A.r.a.b.i.k...B.o.r.T.f.o...D.[.[.k.y.e...F.r.[.n.k.y.e...G.y.a.a.m.a.n...K.y.[.k. .k.a.s.a...U.r.d.u. .k.a.s.a...G.r.e.e.k. .k.a.s.a...I.t.a.l.y. .k.a.s.a...K.o.r.e.a. .k.a.s.a...M.a.l.a.y. .k.a.s.a...N.[.p.a.l. .k.a.s.a...S.p.a.i.n. .k.a.s.a...T.a.m.i.l. .k.a.s.a...T.[.[.k.i. .k.a.s.a...U.k.r.e.n. .k.a.s.a...B.[.[.m.i.s. .k.a.s.a...G.y.a.p.a.n. .k.a.s.a...H.a.n.g.r.i. .k.a.s.a...K.y.a.e.n.a. .k.a.s.a...P.T.l.a.n.d. .k.a.s.a...R.a.h.y.i.a. .k.a.s.a...S.w.e.d.e.n. .k.a.s.a...B.e.l.a.r.u.s. .k.a.s.a...B.e.n.g.a.l.i. .k.a.s.a...P.[.[.h.y.i.a. .k.a.s.a...R.e.w.a.n.d.a. .k.a.s.a...R.o.m.e.n.i.a. .k.a.s.a...S.o.m.a.l.i.a. .k.a.s.a...T.a.e.l.a.n.d. .k.a.s.a...V.i.[.t.n.a.m. .k.a.s.a...B.T.l.g.e.r.i.a. .k.a.s.a...G.y.a.b.a.n.i.s. .k.a.s.a...K.a.m.b.o.d.i.a. .k.a.s.a...P.u.n.g.y.a.b.i. .k.a.s.a...P.T.T.t.u.g.a.l. .k.a.s.a...I.n.d.o.n.i.h.y.i.a. .k.a.s.a...,.@...[.......*.7.B.X.o.....@.....'.........D.Y.......0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):22592
                                                                                                Entropy (8bit):4.468208862094397
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:DrCcNmVdrwfVwrKSU5+rWV4WsfKvMh2itQhXSn4SUBBWrP:PvmVdmJ+rWORQMh2itQhMUBBYP
                                                                                                MD5:F1DD8B42923E9D487C11078E72AC3331
                                                                                                SHA1:2F57235B972662F6B2BE974EBD4D0514BCB1F650
                                                                                                SHA-256:079B6E33C3B23BB804B08BDB7D1608B24E622AB4F580D609B4B76619D986F4AA
                                                                                                SHA-512:D41490E53BFD944C03C910090EC2FC045A41E520DA02A2997E54C83278F2E2B518446D72D5AFE86B5DA89D9E092245E1C97BF8D6BC628ACAA05EC3FA862AB7C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .n....................n.....R..s..E.H.F...#.F.C.H...#.C.H.3...%.E.(.H...'.D.,.'...'.D.,.H...'.D.D.H...'.D.J.J...(.'.E.F...*.J.*.'...*.J.3.H...3.J.F.'...E.'.(.'...E.J.*.'...G.'.F.(...'.D.A.'.J...'.D.#.:.E...'.D.'.F.'...'.D.*.H.J...'.D.*.J.A...'.D.,.0.1...'.D.1.H.'...'.D.3.1.1...'.D.C.1.I...'.D.C.H.J...'.D.D.'.H...'.D.G.'.F...'.D.G.(.'...'.D.J.'.H...*.4.J.:.'...-.'.3.H.(...3.'.F.:.H...:.H.*.4.F...D.'.F.,.J...E.F./.F.,...F.'.E.(.J...'.D.(.4.*.H...%.J.E.H.,.J...'.D.%.A.J.C...'.D.%.J./.H...'.D.%.J.H.J...'.D.(.J.,.'...'.D.*.J.*.E...'.D.*.J.E.F...'.D.+.9.F.)...'.D.,.'.J.H...'.D.,.(.J.'...'.D.,.F./.J...'.D.-.+.J.)...'.D./.F.C.'...'.D.1.F./.J...'.D.1.H.F.J...'.D.3.H.3.H...'.D.3.H.:.'...'.D.3.J.1.+...'.D.A.'.F.,...'.D.C.'./.H...'.D.C.(.J.D...'.D.C.1.J.C...'.D.C.H.1.H...'.D.C.H.E.J...'.D.D.H.2.J...'.D.E.'.,.'...'.D.E.'.1.J...'.D.E.H.3.J...'.D.E.J.F./...'.D.F.H.1.H...'.D.F.H.J.1...'.D.F.J.H.J...'.D.G.J./.'...'.D.H.'.4.H...(.D.F.3.J.)...*.4.D.-.J.*...C.'.F.E.(.H.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):116
                                                                                                Entropy (8bit):3.8247927337926964
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlEF3stdo/Q5zcjCjUovDopt3Ten:Sv8ctu/D+oo7oD3an
                                                                                                MD5:F56605EFF043B38B0EBF7D3428ECBFF9
                                                                                                SHA1:6699F16768C8F9EF7BC15CCA0BFA1349F25DE493
                                                                                                SHA-256:F7A5378171BA8BD4578D4CC3B9F40DA87195C46B159CDA4BB898D5C12183A987
                                                                                                SHA-512:A90DF0317B867AA5410056D0C40B64716D692544C9F5CA8C0638AD47DBDA938E7CAF2C77EC336784C955427F466BA912D65375F9AE52280AFF2AF4FE84F2EA41
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..:....................:....R..s..'.D./.F.E.'.1.C.J.)........:......V......P.:.`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1348
                                                                                                Entropy (8bit):3.932761590706259
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:bgDMp0Z9MC3d0r1JmMqiq1SGZHAaS0lZj7WXKWygltvM3PDDZsM0LrzVNkPAMJyH:bgIp0zMC3d4YMqiq1SGZHS0Dj7+KWyaZ
                                                                                                MD5:4901BA6F40C5267C8D1C17D35DA758AE
                                                                                                SHA1:811215B524A36A322EB895106F0A761E5F39DEE8
                                                                                                SHA-256:F399D429791494C5A498961FAA17E902ED51BC49BBD8E793744F6FC7F690B403
                                                                                                SHA-512:754AA89E244FE9F68315FBE6203D42701B519553D3BAE169117A6214068C3320ACDC6B5509D6846DEBBB663B3D154A0D0066C6A8640BCB5D4C7F764D0CC8A701
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................E.. ..x.....I...I...-......xE...R..s..I.c.h.i. .I.b.o...I.c.h.i. .A.k.a.n...I.c.h.i. .A.r.a.b...I.c.h.i. .T.h.a.i...I.c.h.i. .Z.u.l.u...I.c.h.i. .B.u.r.m.a...I.c.h.i. .C.h.e.k.i...I.c.h.i. .D.a.c.h.i...I.c.h.i. .G.r.i.k.i...I.c.h.i. .H.a.u.s.a...I.c.h.i. .H.i.n.d.u...I.c.h.i. .K.h.m.e.r...I.c.h.i. .P.e.s.i.a...I.c.h.i. .S.u.n.g.u...I.c.h.i. .T.a.m.i.l...I.c.h.i. .U.r.u.d.u...I.c.h.i. .A.m.h.a.r.i...I.c.h.i. .J.e.m.a.n.i...I.c.h.i. .N.e.p.a.l.i...I.c.h.i. .R.w.a.n.d.a...I.c.h.i. .Y.o.r.u.b.a...I.c.h.i. .B.e.l.a.r.u.s...I.c.h.i. .B.e.n.g.a.l.i...I.c.h.i. .F.r.e.n.c.h.i...I.c.h.i. .K.o.r.i.a.n.i...I.c.h.i. .P.o.l.i.s.h.i...I.c.h.i. .P.u.n.j.a.b.i...I.c.h.i. .R.u.s.i.a.n.i...I.c.h.i. .S.w.i.d.e.n.i...I.c.h.i. .T.a.k.i.s.h.i...I.c.h.i. .C.h.a.i.n.i.s.i...I.c.h.i. .I.t.a.l.i.a.n.i...I.c.h.i. .J.a.p.a.n.i.s.i...I.c.h.i. .J.a.v.a.n.i.s.i...I.c.h.i. .P.o.t.o.g.i.s.i...I.c.h.i. .S.p.a.n.i.s.h.i...I.c.h.i. .H.a.n.g.a.r.i.a.n...I.c.h.i. .M.a.l.e.s.h.a.n.i...I.c.h.i.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):668
                                                                                                Entropy (8bit):4.304507620837286
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:Fw8NzAD2aGtNFqahEbeYdQfeCdQdMMdqP12peKnzC5RmK4:F9zACaG7FqqlYdPCdQdMMdQ2MKuU
                                                                                                MD5:A992876928751A88F99FFC0E184E2F27
                                                                                                SHA1:CC1E231E926B787144ADDD06FD6C304ACF275110
                                                                                                SHA-256:2B23657F3FC73581052B7C120A42107F1EBA1090011F71A5924901EEC51DF4C4
                                                                                                SHA-512:E8FBBA388059A1418D015894E9DF31C4388EC9BD9CA49C446DE4C3890BBBB631DD440D329F2D62CC406F6A4A8154111B7B5CD1CE143B7BA4669DB00C3DE93DB8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................R..s..b...|.D...A...g.r.S...Q.r...S.z...T...c.r...V.|.Q...a.r.B.....V.|.Q...f...Q.....b.......f...Q....._..._.`...f...Q.....I.r...g.|.D...f...Q.....h.t...b.t...f.t...f...Q.....b.......a.r.B...B.f.b...T.....Q.V...r.S...G.r.`.r...f...Q.....b.......a.r.B...b...r.D...T.....Q.V...r.S...G.r.`.r...f...Q... .(.h...b.r...)...Q.V...r.S...G.r.`.r...f...Q... .(.A.z...S...L...)...Q.V...r.S...G.r.`.r...f...Q... .(.Q.V...r.S...c.S...)...*.f...S...V.b.....t.Q... .a.r.B...b.r.B.f...f.t...X...V.@.|.Q...T.`.r..._.r.S...P.|.........X.X...o.u................../E/_/-/..................t....../..{/........V....P...P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9059918981668114
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMvs06E7lso5vn:Svv06gsG
                                                                                                MD5:D98FB5F9E283865FC645EFD43062C7A5
                                                                                                SHA1:BE52530BF72C9E226A6F9B01F4617DF3BAEC2CC3
                                                                                                SHA-256:09B1AD733085B1DF053F02EF0B65551CCEC422B344735D30ADFD2CF9941A600A
                                                                                                SHA-512:E1070F6CBB347011EFF23EA379583CA63742EAE2D7FAE92E4A76AB5EC77CB0133505FEA0E6C288C08D80ACB3FC2FCA916D5590728AD49C8BD2BD33321EF0B6F4
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....V...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):14636
                                                                                                Entropy (8bit):4.986354804883475
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:eDI3+dBp/najsM3SVrn9sp3iZ5H+fEAwI:eDI3+dBxnaj9Ir9shiZ5efEBI
                                                                                                MD5:CB82F2014998434D15EA82893A9CC67C
                                                                                                SHA1:F15783784912E7E184933A07DD83CCA472201A73
                                                                                                SHA-256:E65A3814B79141B6D109485A499661D244EB02D1BFEBD89D4B56C5D8A85622DC
                                                                                                SHA-512:C3D9D4AFC240E4D65302978EA0F6730BB315BA3D58115AC61CDC6BC038282FF4AA3557D2FEC5BD4AF86B1710889E57DC50A74D68FF2E00C4585BB657FC3527D8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................/.. .N......C...C.........N.....R..s..r.o.d...R.e.s.i...k.t.h.i...m.r.o.o...n.-.k.o...p.h.l.i...p.h.l.p...S.O.L.B.A...a.r.v.e.t...k.y.m.y.k...y.a.k.u.t...f...l.l.e.s...f...r...s.k...k.i.e.m.b.u...l.u.y.a.n.a...p.o.n.a.p.e...V.a.i.-.t.a.l...b.r.a.m.i.s.k...c.o.r.n.i.s.k...k.a.y.a. .l.i...l.e.t.t.i.s.k...l.i.p.o.v.a.z...o.l.d.i.r.s.k...s.u.r.s.i.l.v...s.u.t.s.i.l.v...v.a.i.d.i.k.a...w.a.l.b.i.r.i...o.l.d.g.r...s.k...a.r.u.m...n.s.k...r.o.m.e.r.t.a.l...C.h.a.m.-.t.a.l...N.. K.o.-.t.a.l...T.i.d.s.z.o.n.e...c.a.r.i.b.i.s.k...f.o.n.x.s.a.m.p...f.r.i.u.l.i.a.n...g.a.l.i.c.i.s.k...j.i.d.d.i.s.c.h...k.a.b.y.l.i.s.k...k.a.r.i.a.n.s.k...m.a.l.a.j.i.s.k...m.a.z.e.n.i.s.k...n.i.u.e.a.n.s.k...n.o.r.d.l.u.r.i...s.a.r.d.i.n.s.k...s.h.i.m.a.o.r.e...s.y.d.s.o.t.h.o...t.j.e.k.k.i.s.k...u.y.g.u.r.i.s.k...v.a.l.l.a.d.e.r...L.i.m.b.u.-.t.a.l...T.a.k.r.i.-.t.a.l...a.r.a.b.e.r.t.a.l...a.v.e.s.t.a.n.s.k...b.i.s.c.a.y.i.s.k...b.u.r.i.a.t.i.s.k...c.a.t.a.l.a.n.s.k...e.l.a.m.i.t.i.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):268
                                                                                                Entropy (8bit):5.857292864123356
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SvXKlaDxNxROdZxCt83Dk3cTZN6l46izrxZvhtl03zj:mKlatNkJZNFJzrHvhtef
                                                                                                MD5:42541BF668D34C4055687EC04AC04A1C
                                                                                                SHA1:2796A316344F66BB7B20FCC303E40C938D1B0840
                                                                                                SHA-256:7BAC89A0D392FE8ED84D1C0946E69C449DFAD6FF4FEF5CED8B81DCD623613AE4
                                                                                                SHA-512:BA15E6273EC9A97F6F5A1ACAFACC8C596E108618CEFDEC865CCCE0FEEB8B88BC3B5E6A9460E233BA2B194733E1B45283729CE1FA2D2DAA0A1BC0B3342724C645
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................7.. ........;...;...-.......7...R..s..-.@...[.......*.7.7.B.X.o.....@.....'.........D.Y.......0.[.........A.M.............H.F........#..G.G.#.#E..H..2.G.......0.\...G....|G..s0..]#i0K0A0..}0R....#...G.#.0...\.#........V......P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1040
                                                                                                Entropy (8bit):3.968991321443151
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:Wh82Phx1IPlbRRCb6D9qFeEzARyL89t9yL89Nt4Elit4r5JnhoOn:uqjD9GzARyL89t9yL89Nt4Elit4rXPn
                                                                                                MD5:AE5239642F81C44DB129566D0DBCDB1E
                                                                                                SHA1:4B37D749E49A72170F1CB3F3275C9D06DD05BC10
                                                                                                SHA-256:2B0B4846F0BC15F980C4BBE47346A422F0432E3CEAB12A7D064A91A1B61A16E6
                                                                                                SHA-512:876B3F5AEDCC7F63279E54E472B8E1D8127304CB7FF1940A963284889D9259BB86716C0CC88780FC3FA9CB2034FB6909F691BAC5F03E95E5095D0691D762E3DA
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..........................R..s..A.c.e.h.-.S.p.r.a.c.h.e...B.i.n.i.-.S.p.r.a.c.h.e...A.l.t.p.r.e.u.s.s.i.s.c.h...B.a.s.a.a.-.S.p.r.a.c.h.e...B.i.k.o.l.-.S.p.r.a.c.h.e...D.i.n.k.a.-.S.p.r.a.c.h.e...G.b.a.y.a.-.S.p.r.a.c.h.e...W.e.i.s.s.r.u.s.s.i.s.c.h...A.c.h.o.l.i.-.S.p.r.a.c.h.e...P.a.n.g.w.e.-.S.p.r.a.c.h.e...U.S. .M.a.s.s.-.S.y.s.t.e.m...K.i.m.b.u.n.d.u.-.S.p.r.a.c.h.e...N.a.d.s.c.h.d.-.A.r.a.b.i.s.c.h...b.r.i.t.i.s.c.h.e.s. .M.a.s.s.-.S.y.s.t.e.m...G.r.o.s.s.b.u.c.h.s.t.a.b.e.n. .z.u.e.r.s.t. .a.u.f.f...h.r.e.n...N.a.c.h. .G.r.o.s.s.-./.K.l.e.i.n.s.c.h.r.e.i.b.u.n.g. .s.o.r.t.i.e.r.e.n...O.h.n.e. .G.r.o.s.s.-./.K.l.e.i.n.s.c.h.r.e.i.b.u.n.g. .s.o.r.t.i.e.r.e.n...+.S.o.r.t.i.e.r.u.n.g. .n.a.c.h. .G.r.o.s.s.-. .b.z.w... .K.l.e.i.n.b.u.c.h.s.t.a.b.e.n...+.S.o.r.t.i.e.r.u.n.g. .n.a.c.h. .G.r.o.s.s.-. .o.d.e.r. .K.l.e.i.n.s.c.h.r.e.i.b.u.n.g.....+.8...$.Q.........;.....h......._.{.R...v..Q.....C......'.`.5.~......x.....5.n......[.d...o.....+.8...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):5776
                                                                                                Entropy (8bit):5.016333921215043
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:76VmdMnKrYWXKF5sVDYyq2rhSOVKfK3cZMA8IYN6TBQHz/OY5zjBBeYAi97h+Hcf:7GJaY90VD9q2rhDV41PZYN6MC+zlBVKW
                                                                                                MD5:EDBC2B2E97F3F8F678D8048E4739462C
                                                                                                SHA1:C8F5202885946E2422F02A477B737D705CD7B040
                                                                                                SHA-256:D23BB1500C3530C4836EFEFA07D92890B7474DAF81995C6F3DDC85D5EA696DEC
                                                                                                SHA-512:A126BB9B1960853923F19B7B9DD782F044872C4B2DC72858FA2A019A943C012EF1AB9DF4A53A03B062A54CD91179820023C158A94B86432E6CDE2D7BF4A0C88C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...........................R..s..a.r.a.b.s.k.i...t.h.a.i.s.k.i.....e.a...i.n.a...R...c.:. .{.0.}...a.r.m.e.D.s.k.i...b.u.r.m.a.s.k.i...f.i.n.a...i.n.a...j.a.p.a.D.s.k.i...l.a.o.a...i.n.a...l.a.p.a...i.n.a...m.a.n.a...i.n.a...p.j.e.n.j.e.z.e...p.o.w.a.y.k.n.e...p.r.u.s...i.n.a...p...l.a...i.n.a...t.i.b.e.t.s.k.i...B.a.t.y.D.s.k.i...a.o.n.a...i.n.a...b.u.g.i.a...i.n.a...e.t.i.o.p.i.s.k.i...g.e.o.r.g.i.s.k.i...g.o.t.i.a...i.n.a...g.r.i.c.h.i.s.k.i...k.y.r.i.l.i.s.k.i...s.a.m.o.a...i.n.a...s.i.n.d.a...i.n.a...a.o.t.i.a...i.n.a...a.r.m.e.D.a...i.n.a...b.z.e.z. .p.i.s.m.a...f.e.r.e.j.a...i.n.a...f.i.d.~.i.a...i.n.a...j.a.p.a.D.a...i.n.a...j.o.r.u.b.a...i.n.a...l.a.k.o.t.a...i.n.a...m.a.l.g.a.a...i.n.a...m.a.o.r.i.a...i.n.a...o.r.o.j.i.a...i.n.a...t.e.l.u.g.a...i.n.a...u.s.b.e.k.a...i.n.a...B.a.t.y.D.a...i.n.a...s.u.n.d.a.n.a...i.n.a...a.b.c.h.a.z.a...i.n.a...a.r.a.w.k.a.a...i.n.a...b.u.l.g.a.r.a...i.n.a...g.a.g.a.u.z.a...i.n.a...g.r.i.c.h.i.a...i.n.a...h.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):656
                                                                                                Entropy (8bit):4.721322213254431
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:dAp2uowhcPSHW4lzdN2uOc2yoEJvKxKGYJyome:dAYbw6PezdNd23FK5YK
                                                                                                MD5:CF81F872603C70192464E0687D3B6428
                                                                                                SHA1:E57A62000883E7A9A623522CD7F5095260B22EB9
                                                                                                SHA-256:187B09E4A332C22D26CD1677ACEFE79700E1442B5B419B87D47CAFDFA3F19361
                                                                                                SHA-512:2AAE3E71F785B6F0BE8CFAC0D1BCEA23675F114A26FE504B139A6CF52D81EE694D741D25DE6F707AC913C2AD666C366C239E0BBDC8E01C0B4E94428C36961E99
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .,h.............-.....,h....R..s..K.).e.m.b.u...K.).r.e.n.o...K.).r.u.s.i...K.).c.h.e.k.i...K.).c.h.i.n.a...K.).h.i.n.d.)...K.).s.w.i.d.i...K.).a.m.h.a.r.i...K.).a.n.j.e.m.i...K.).n.g.r.i.k.i...K.).t.h.u.n.g.u...K.).t.u.r.u.k.i...K.).f.a.r.a.n.s.a...K.).h.o.l.a.n.z.i...K.).h.u.n.g.a.r.i...K.).n.j.a.p.a.n.i...K.).u.k.r.a.n.i.a...K.).h.i.s.p.a.n.i.a...K.).t.a.i.l.a.n.d.i...K.).m.b.e.l.a.r.u.s.i...K.).n.y.a.r.w.a.n.d.a...-.@...[.......*.7._.B.X.o.....@.....'.........D.Y.......0.[.........A.M.............H.F.......bhM..h.Q.%Bh.h-hth}h.hkh.h..Rh.h.e...J.h...R..Y;. 6&.h.1e94hc;;h.h.#Zh...h.h.h..+h."Jh%.....V......P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1220892603744246
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMvs9lN/FiipU:SvvXpU
                                                                                                MD5:68AE567D0C236DA786E332A837C30299
                                                                                                SHA1:DFEDA196EF4CD20BBF63CC94D213AD031BAB3DCB
                                                                                                SHA-256:B008DDD5D12FB7008AC7F0C345E57100EF0A0B69F6F92CB34496C34386F71B7F
                                                                                                SHA-512:60E949B0AB3E6AC8209473F4C19BF87EBA3216F1DE345F93E88CBAEAF68BF6FE7CE4F2DDE4EAB9966E1DA237F644E116AB5F5DC107D846D3FC7D3971FE380734
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):344
                                                                                                Entropy (8bit):4.191938007824991
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:Sv2Rj0AKlS8Qlrul1qalpKlFsKUZcAN5UidrKSMFtPqhUAftafyn:HR1KlTQpuJlKs0ADCFtPqhV0fyn
                                                                                                MD5:712C8C9FFF630E4093112B40EBFBFA92
                                                                                                SHA1:2A060C611710276A50EC408CE805D4E12C0354DB
                                                                                                SHA-256:125D5D68E49CB23C5850941D47FEEAF6474F5422F1C07DBA9CDA16DD77CCD4B9
                                                                                                SHA-512:9DAA215309924F0E987E04E7DDCE842BCBBB54D633C6CC4D697A6A2E59FA1E2BF9E44ACC300BB44A6266D1BA19D080367B6FFD62474A64CE9166790DE512806D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................G.. ........N...N...........C...R..s..T.u.v.a.l.u.a.n...M.a.u.r.i.t.i.a.n...T.o. .F.u.l.l. .W.i.d.t.h...T.o. .H.a.l.f. .W.i.d.t.h...T.o. .L.o.w.e.r. .C.a.s.e...T.o. .T.i.t.l.e. .C.a.s.e...T.o. .U.p.p.e.r. .C.a.s.e......... .)....*)..........b.......r...x...................c..Ph..P..j.....V......`Z..PC.. #0.`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1220892603744246
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMvs9lN/FiipU:SvvXpU
                                                                                                MD5:68AE567D0C236DA786E332A837C30299
                                                                                                SHA1:DFEDA196EF4CD20BBF63CC94D213AD031BAB3DCB
                                                                                                SHA-256:B008DDD5D12FB7008AC7F0C345E57100EF0A0B69F6F92CB34496C34386F71B7F
                                                                                                SHA-512:60E949B0AB3E6AC8209473F4C19BF87EBA3216F1DE345F93E88CBAEAF68BF6FE7CE4F2DDE4EAB9966E1DA237F644E116AB5F5DC107D846D3FC7D3971FE380734
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1626531665973814
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMvs9lN/FiHreL:SvvTL
                                                                                                MD5:A64132E6E36D6935BF54BFB465CF7638
                                                                                                SHA1:53D1256A4DF87E42B8F2936D87EA3834F59ECB08
                                                                                                SHA-256:00B9E8C95990EAB1D1DB82341778FD29E54063F122CA20E892F4BF7316C26FB3
                                                                                                SHA-512:B623663283954C71B5638B30194DA393E9F1DFF0CF9D14E53F456BB7EF954BE2FC8DD5BEC33B7C67AA013DCF1FD176C66B3EB2A2A759359C3FC3EE714DC6EE06
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.|...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1220892603744246
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMvs9lN/FiipU:SvvXpU
                                                                                                MD5:68AE567D0C236DA786E332A837C30299
                                                                                                SHA1:DFEDA196EF4CD20BBF63CC94D213AD031BAB3DCB
                                                                                                SHA-256:B008DDD5D12FB7008AC7F0C345E57100EF0A0B69F6F92CB34496C34386F71B7F
                                                                                                SHA-512:60E949B0AB3E6AC8209473F4C19BF87EBA3216F1DE345F93E88CBAEAF68BF6FE7CE4F2DDE4EAB9966E1DA237F644E116AB5F5DC107D846D3FC7D3971FE380734
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1220892603744246
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMvs9lN/FiipU:SvvXpU
                                                                                                MD5:68AE567D0C236DA786E332A837C30299
                                                                                                SHA1:DFEDA196EF4CD20BBF63CC94D213AD031BAB3DCB
                                                                                                SHA-256:B008DDD5D12FB7008AC7F0C345E57100EF0A0B69F6F92CB34496C34386F71B7F
                                                                                                SHA-512:60E949B0AB3E6AC8209473F4C19BF87EBA3216F1DE345F93E88CBAEAF68BF6FE7CE4F2DDE4EAB9966E1DA237F644E116AB5F5DC107D846D3FC7D3971FE380734
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1220892603744246
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMvs9lN/FiipU:SvvXpU
                                                                                                MD5:68AE567D0C236DA786E332A837C30299
                                                                                                SHA1:DFEDA196EF4CD20BBF63CC94D213AD031BAB3DCB
                                                                                                SHA-256:B008DDD5D12FB7008AC7F0C345E57100EF0A0B69F6F92CB34496C34386F71B7F
                                                                                                SHA-512:60E949B0AB3E6AC8209473F4C19BF87EBA3216F1DE345F93E88CBAEAF68BF6FE7CE4F2DDE4EAB9966E1DA237F644E116AB5F5DC107D846D3FC7D3971FE380734
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.122089260374425
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMSlnlplljiipGVn:SvJlzpGV
                                                                                                MD5:C62D4F1855B9133E54519F7322687081
                                                                                                SHA1:E7C422A92CAEA78634BC95E88ABB76FDE5EF14C7
                                                                                                SHA-256:E777249A4B349B6BFB99E51CBD9A17EF3B904DA98B289A1148083827D1AD3D5A
                                                                                                SHA-512:6D08FE1B695CD1336DD18B270B67B2A18C50FC777DA89AA72C4E02976FF716CFAC7A2C854354A9576568367E57B132BCA7DAE1CD067E85A57434C5FFA701FA8B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.$0...................$0....R..s....j.V...#0
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1220892603744246
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMvs9lN/FiipU:SvvXpU
                                                                                                MD5:68AE567D0C236DA786E332A837C30299
                                                                                                SHA1:DFEDA196EF4CD20BBF63CC94D213AD031BAB3DCB
                                                                                                SHA-256:B008DDD5D12FB7008AC7F0C345E57100EF0A0B69F6F92CB34496C34386F71B7F
                                                                                                SHA-512:60E949B0AB3E6AC8209473F4C19BF87EBA3216F1DE345F93E88CBAEAF68BF6FE7CE4F2DDE4EAB9966E1DA237F644E116AB5F5DC107D846D3FC7D3971FE380734
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1220892603744246
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMvs9lN/FiipU:SvvXpU
                                                                                                MD5:68AE567D0C236DA786E332A837C30299
                                                                                                SHA1:DFEDA196EF4CD20BBF63CC94D213AD031BAB3DCB
                                                                                                SHA-256:B008DDD5D12FB7008AC7F0C345E57100EF0A0B69F6F92CB34496C34386F71B7F
                                                                                                SHA-512:60E949B0AB3E6AC8209473F4C19BF87EBA3216F1DE345F93E88CBAEAF68BF6FE7CE4F2DDE4EAB9966E1DA237F644E116AB5F5DC107D846D3FC7D3971FE380734
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1220892603744246
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMvs9lN/FiipU:SvvXpU
                                                                                                MD5:68AE567D0C236DA786E332A837C30299
                                                                                                SHA1:DFEDA196EF4CD20BBF63CC94D213AD031BAB3DCB
                                                                                                SHA-256:B008DDD5D12FB7008AC7F0C345E57100EF0A0B69F6F92CB34496C34386F71B7F
                                                                                                SHA-512:60E949B0AB3E6AC8209473F4C19BF87EBA3216F1DE345F93E88CBAEAF68BF6FE7CE4F2DDE4EAB9966E1DA237F644E116AB5F5DC107D846D3FC7D3971FE380734
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1220892603744246
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMvs9lN/FiipU:SvvXpU
                                                                                                MD5:68AE567D0C236DA786E332A837C30299
                                                                                                SHA1:DFEDA196EF4CD20BBF63CC94D213AD031BAB3DCB
                                                                                                SHA-256:B008DDD5D12FB7008AC7F0C345E57100EF0A0B69F6F92CB34496C34386F71B7F
                                                                                                SHA-512:60E949B0AB3E6AC8209473F4C19BF87EBA3216F1DE345F93E88CBAEAF68BF6FE7CE4F2DDE4EAB9966E1DA237F644E116AB5F5DC107D846D3FC7D3971FE380734
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1220892603744246
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMunl5jiipS:Svv7pS
                                                                                                MD5:8CCD09FD382B155E658CB8E38A69D50D
                                                                                                SHA1:BEB2F210E55B9B72116CB9CA3B5A654E7BBF3066
                                                                                                SHA-256:673B9967E9BAB1BAB7BD65E184EEB02EB5E8DC38F33F0970E683B9445C967CC7
                                                                                                SHA-512:26D1444AC0D0DC7BD1A5E5081BDCE4831FB7768D6C93747E6BAE049D88136A95D13644763AAA86E4DEA7CFC40A6D2EF80506A984E650DEBC3C036822D881282A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):96
                                                                                                Entropy (8bit):3.4276942711037677
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tluF52lFvlullUl/Ea2KLFEMPFn:Sv6olulGl/dx39n
                                                                                                MD5:29DA2B969A3B0DAAE6D2A48DAC054B11
                                                                                                SHA1:53678CE43622FF0127B74A4ECE3A3A2AA55D1FAE
                                                                                                SHA-256:391E2AE69142FC9833DD66DCE35878EDB160A599ABAB90AF3B44AE4F76103831
                                                                                                SHA-512:C9DAFE0F301433C1DC03C063606A2F7787CCEC61DD42423630FC4EB54C3E5D5A24F5C007DB70C6AE33E9A824AA0DBD5C78C5CC39715FA075695168C43D9939E3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .$0...................$0....R..s......g...j...V....`...P#0.`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1220892603744246
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMunl5jiipS:Svv7pS
                                                                                                MD5:8CCD09FD382B155E658CB8E38A69D50D
                                                                                                SHA1:BEB2F210E55B9B72116CB9CA3B5A654E7BBF3066
                                                                                                SHA-256:673B9967E9BAB1BAB7BD65E184EEB02EB5E8DC38F33F0970E683B9445C967CC7
                                                                                                SHA-512:26D1444AC0D0DC7BD1A5E5081BDCE4831FB7768D6C93747E6BAE049D88136A95D13644763AAA86E4DEA7CFC40A6D2EF80506A984E650DEBC3C036822D881282A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1220892603744246
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMunl5jiipS:Svv7pS
                                                                                                MD5:8CCD09FD382B155E658CB8E38A69D50D
                                                                                                SHA1:BEB2F210E55B9B72116CB9CA3B5A654E7BBF3066
                                                                                                SHA-256:673B9967E9BAB1BAB7BD65E184EEB02EB5E8DC38F33F0970E683B9445C967CC7
                                                                                                SHA-512:26D1444AC0D0DC7BD1A5E5081BDCE4831FB7768D6C93747E6BAE049D88136A95D13644763AAA86E4DEA7CFC40A6D2EF80506A984E650DEBC3C036822D881282A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):88
                                                                                                Entropy (8bit):2.669445111603312
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlKelBjlgljl/Fipp/n:SBtkJTl4q/
                                                                                                MD5:4EB66956A148CB004F63FA8031FFE6EE
                                                                                                SHA1:2D9A7D385489C3479F04F43313E56873218AA174
                                                                                                SHA-256:F79055B8606BC0A3CE2F413EA242849AABDB1EE2B7232C37C61F9EE2EFBF2D1F
                                                                                                SHA-512:18AD6A6B83DD9F507BA3981E4C74C15F964B1CB10869BB51AFD89321C818CC2AB6352B61A767C83CB2D23AB276E3A8637E6F9A430255B67BD9B83D7CD2F6505F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s..e.n._.Z.W.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1220892603744246
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMunl5jiipS:Svv7pS
                                                                                                MD5:8CCD09FD382B155E658CB8E38A69D50D
                                                                                                SHA1:BEB2F210E55B9B72116CB9CA3B5A654E7BBF3066
                                                                                                SHA-256:673B9967E9BAB1BAB7BD65E184EEB02EB5E8DC38F33F0970E683B9445C967CC7
                                                                                                SHA-512:26D1444AC0D0DC7BD1A5E5081BDCE4831FB7768D6C93747E6BAE049D88136A95D13644763AAA86E4DEA7CFC40A6D2EF80506A984E650DEBC3C036822D881282A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1220892603744246
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMunl5jiipS:Svv7pS
                                                                                                MD5:8CCD09FD382B155E658CB8E38A69D50D
                                                                                                SHA1:BEB2F210E55B9B72116CB9CA3B5A654E7BBF3066
                                                                                                SHA-256:673B9967E9BAB1BAB7BD65E184EEB02EB5E8DC38F33F0970E683B9445C967CC7
                                                                                                SHA-512:26D1444AC0D0DC7BD1A5E5081BDCE4831FB7768D6C93747E6BAE049D88136A95D13644763AAA86E4DEA7CFC40A6D2EF80506A984E650DEBC3C036822D881282A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1626531665973814
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMunl5jiHrUL:SvvtL
                                                                                                MD5:5FAB5876AF089CE3960AC8BF4CB51AAE
                                                                                                SHA1:56C1B74B88F869696057C30CB38F2BB0B6A963FB
                                                                                                SHA-256:968FDFFF72C8DD5A2C26F14DC6287839DCC1AA401AA16205ACC50C4A0B2F4AEA
                                                                                                SHA-512:35287FCB5DD420CFE9F520AF55C36C00AB20B0FD4AD48BB50CAC19917F9E87ED77AF4585BDB2105495F06147DBBFB85BF5C5FB44326488130B13C936D9B822FC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.|...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1220892603744246
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMunl5jiipS:Svv7pS
                                                                                                MD5:8CCD09FD382B155E658CB8E38A69D50D
                                                                                                SHA1:BEB2F210E55B9B72116CB9CA3B5A654E7BBF3066
                                                                                                SHA-256:673B9967E9BAB1BAB7BD65E184EEB02EB5E8DC38F33F0970E683B9445C967CC7
                                                                                                SHA-512:26D1444AC0D0DC7BD1A5E5081BDCE4831FB7768D6C93747E6BAE049D88136A95D13644763AAA86E4DEA7CFC40A6D2EF80506A984E650DEBC3C036822D881282A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1220892603744246
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMunl5jiipS:Svv7pS
                                                                                                MD5:8CCD09FD382B155E658CB8E38A69D50D
                                                                                                SHA1:BEB2F210E55B9B72116CB9CA3B5A654E7BBF3066
                                                                                                SHA-256:673B9967E9BAB1BAB7BD65E184EEB02EB5E8DC38F33F0970E683B9445C967CC7
                                                                                                SHA-512:26D1444AC0D0DC7BD1A5E5081BDCE4831FB7768D6C93747E6BAE049D88136A95D13644763AAA86E4DEA7CFC40A6D2EF80506A984E650DEBC3C036822D881282A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1220892603744246
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMunl5jiipS:Svv7pS
                                                                                                MD5:8CCD09FD382B155E658CB8E38A69D50D
                                                                                                SHA1:BEB2F210E55B9B72116CB9CA3B5A654E7BBF3066
                                                                                                SHA-256:673B9967E9BAB1BAB7BD65E184EEB02EB5E8DC38F33F0970E683B9445C967CC7
                                                                                                SHA-512:26D1444AC0D0DC7BD1A5E5081BDCE4831FB7768D6C93747E6BAE049D88136A95D13644763AAA86E4DEA7CFC40A6D2EF80506A984E650DEBC3C036822D881282A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):12784
                                                                                                Entropy (8bit):4.96045176959317
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:fTMM72/mH35LgEa+RnlzW38om5XUStWVrTTz9OzhA:fTMw2/mH350Ea+BlzW38p5kV/TxO1A
                                                                                                MD5:8EEC3EF01342E4CD74486C78BE02FCB4
                                                                                                SHA1:C15BCD17EDD1FC382B47F22D87CDD1240F2D12C0
                                                                                                SHA-256:5F608694E055285782BB6A0DCEF6658C3C6986848B7736D377ED5E16A37EE8BE
                                                                                                SHA-512:BED460BB30C594A24E3AC0C98C26481B4656CCE978DCF2051E3EB6FBE079C80E0FE9944C532FF8225A3468D0BA221C01A2C457B54470B141FBCD8DFD005DE8DA
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................`.. ........t...t...........7...R..s..e.w.....m.a.r.....r.a...z...z.u...i...c.o.p.t.o...b.a.m...n...c.a.r.i.o...f.i.n...s...l.i.c.i.o...l.i.d.i.o...m.a.s...i...p.a.s.t.....u.y.g.u.r...w...l.o.f...y.a.p...s...y.i.d.i.s...g...t.i.c.o...a.d.i.g.u.....a.r.a.m.e.o...a.s.a.m...s...b.a.s.k.i.r...b.o.s.n.i.o...c.a.b.i.l.a...e.m.o.j.i.s...k.a.z.a.j.o...m.a.l.a.y.o...m.a.n.c.h.....m.a.n.d.e.o...m.a.r.a.t.....p.a.s.t...n...r...n.i.c.o...s.e.r.b.i.o...t.a.y.i.k.o...t.r.u.k...s...u.z.b.e.k.o...v...t.i.c.o...f.e.n.i.c.i.o...j.a.v.a.n...s...a.b.j.a.s.i.o...b.u.r.i.a.t.o...c.a.r.e.l.i.o...c.a.s.u.b.i.o...c.h.e.y.e.n.e...e.s.t.o.n.i.o...f.i.y.i.a.n.o...g.a.g.a.u.z.o...g.a.l.l.e.g.o...k.i.r.g.u...s...k.o.n.k.a.n.....k.o.t.a.n...s...k.u.t.c.h.i.n...m.a.c.a.s.a.r...n.o.r.u.e.g.o...n...m.e.r.o.s...o.l. .c.i.k.i...o.s...t.i.c.o...p.a.n.y.a.b.....s.o.n.i.n.k.....s.u.m.e.r.i.o...t.i.g.r.i...a...w.o.l.a.y.t.a...s.u.n.d.a.n...s...a.v...s.t.i.c.o...a.r.r.u.m.a.n.o...a.r.a.h.u.a.c.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):148
                                                                                                Entropy (8bit):4.703899311765253
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlzcoZWtFiAkVAobkP1LbzMzHeonwyWn8V2ZGlej:Sv4oUpOw9LbIbnwzn87Mj
                                                                                                MD5:7694951EF25993C308C192CB7F702A4D
                                                                                                SHA1:65C2B02876FB4C07EF7639D251C32E3752CFE22A
                                                                                                SHA-256:ABBDCFF69A749E45C85EB908F6228F7A2AA7626CA79A8BB34193C6C56099A41D
                                                                                                SHA-512:7DE1EEDC81EA2FBD7609014F999BE352059DCCEBC7F14637D84F7B3E51CACD7CD17F2BB9D43D074078951C69911BC7EC8591D2330C02C73922A695763D356FD1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................R..s..........{...z.L.[.....*.....}......F....X..........""......j...V....`...P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1220892603744246
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMunl5jixpUL:SvvtL
                                                                                                MD5:D1ED7E86954B36EC7A46716615E51424
                                                                                                SHA1:C24BB9669785D7CEC7C6957AE7701AF0171AE313
                                                                                                SHA-256:A45E28E4DB331EE08EB719CDEE2870608B96B0DF6E7B650E71AC6ACB24C18624
                                                                                                SHA-512:E341F2A7B63D4D031D6E2172653D1E36183EFE71D07EBFCC7124C82358ED3EB93EC46ED926E9FDC0B4F30EAE2027D46B614717CB5FB2F9C596D801C74267F9F0
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1220892603744246
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMunl5jixpUL:SvvtL
                                                                                                MD5:D1ED7E86954B36EC7A46716615E51424
                                                                                                SHA1:C24BB9669785D7CEC7C6957AE7701AF0171AE313
                                                                                                SHA-256:A45E28E4DB331EE08EB719CDEE2870608B96B0DF6E7B650E71AC6ACB24C18624
                                                                                                SHA-512:E341F2A7B63D4D031D6E2172653D1E36183EFE71D07EBFCC7124C82358ED3EB93EC46ED926E9FDC0B4F30EAE2027D46B614717CB5FB2F9C596D801C74267F9F0
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....j.V.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):148
                                                                                                Entropy (8bit):4.703899311765253
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlzcoZWtFiAkVAobkP1LbzMzHeonwyWn8V2ZGlej:Sv4oUpOw9LbIbnwzn87Mj
                                                                                                MD5:7694951EF25993C308C192CB7F702A4D
                                                                                                SHA1:65C2B02876FB4C07EF7639D251C32E3752CFE22A
                                                                                                SHA-256:ABBDCFF69A749E45C85EB908F6228F7A2AA7626CA79A8BB34193C6C56099A41D
                                                                                                SHA-512:7DE1EEDC81EA2FBD7609014F999BE352059DCCEBC7F14637D84F7B3E51CACD7CD17F2BB9D43D074078951C69911BC7EC8591D2330C02C73922A695763D356FD1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................R..s..........{...z.L.[.....*.....}......F....X..........""......j...V....`...P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):148
                                                                                                Entropy (8bit):4.703899311765253
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlzcoZWtFiAkVAobkP1LbzMzHeonwyWn8V2ZGlej:Sv4oUpOw9LbIbnwzn87Mj
                                                                                                MD5:7694951EF25993C308C192CB7F702A4D
                                                                                                SHA1:65C2B02876FB4C07EF7639D251C32E3752CFE22A
                                                                                                SHA-256:ABBDCFF69A749E45C85EB908F6228F7A2AA7626CA79A8BB34193C6C56099A41D
                                                                                                SHA-512:7DE1EEDC81EA2FBD7609014F999BE352059DCCEBC7F14637D84F7B3E51CACD7CD17F2BB9D43D074078951C69911BC7EC8591D2330C02C73922A695763D356FD1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................R..s..........{...z.L.[.....*.....}......F....X..........""......j...V....`...P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):120
                                                                                                Entropy (8bit):4.1134542664636
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlEFQClp/pll4ll7l/F0cCkcLr41mlP3yzGlej:Sv8QxlL9NC5f4slPRMj
                                                                                                MD5:333196AABE6F149A5546009212E23480
                                                                                                SHA1:36D233968097B9679813AFA6029362BED4AE5232
                                                                                                SHA-256:53DF05E03D09494FEE29761CE28447301C3B4E4CE6F28984C18597701B0AFE52
                                                                                                SHA-512:EF4B0CA74B266AA1E46F12512C541992E4BC81AAA88668D64CD920476B32F09698528124CC5542108D850192F215A755B7F67106AF56D7498DCC25316CA95CDF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................R..s............L..........F..........j...V....`...P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1060
                                                                                                Entropy (8bit):4.061663404947274
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:qc5mwfDosY/GLtisrVoHDGYNeaD4nTYt+BRMDRe/oJ/uYfeauSM/au3OWtx/F:qcIwfDosfLtisrVojGYXD4nst+BRMDR6
                                                                                                MD5:9443566DF6F069DFF49C8E9BE7BFE4DE
                                                                                                SHA1:BADCD62B68F586E80E34BBA12A6C83FBF7ACC041
                                                                                                SHA-256:F90667CCFEC1F72AD6DC4EADF2F30D9B4E96DDAA452FEA8F1B1C4CDB24B86505
                                                                                                SHA-512:8CC49E25129FDFD14E2223A395406692F97389A8DC304968A24C2A521253BCE7BF06F65D811BD6D51F0B1D0FC9266563837331572F99A864065FCE8081B60464
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................-...........R..s..R.i.i.s...T.a.a.y...A.k.a.a.n...G.e.r.k.e...A.m.a.r.i.k...H.i.n.n.d.i...P.u.l.a.a.r...C.e.k.k.e.r.e...E.s.p.a...o.l...K.e.m.e.e.r.e...K.o.r.e.e.r.e...S.o.m.a.l.i.i...B.u.r.m.e.e.s.e...D.a.c.c.e.e.r.e...D.o.c.c.e.e.r.e...I.g.i.b.o.o.r.e...P.e.r.s.e.e.r.e...T.u.r.k.e.e.r.e...Y.o.r.r.u.b.a.a...A.a.r.a.b.e.e.r.e...B.e.l.a.r.u.u.s.e...E.n.g.e.l.e.e.r.e...M.a.l.a.y.e.e.r.e...P.o.l.o.n.e.e.r.e...R.o.m.a.n.e.e.r.e...S.a.p.o.n.e.e.r.e...S.a.w.a.n.e.e.r.e...S.i.n.u.w.a.a.r.e...S.w.e.e.d.e.e.r.e...B.u.l.g.a.r.i.i.r.e...F.a.r.a.y.s.e.e.r.e...H.o.n.g.a.r.i.i.r.e...I.t.a.l.i.y.e.e.r.e...N.e.p.a.a.l.e.e.r.e...P.u.n.j.a.b.e.e.r.e...P.u.r.t.u.g.e.e.r.e...S.u.l.u.K.k.o.o.r.e...U.k.e.r.e.n.e.e.r.e...E.n.d.o.n.e.s.i.i.r.e...H.a.w.s.a.K.k.o.o.r.e...R.u.w.a.a.n.n.d.e.e.r.e...W.i.y.e.t.n.a.m.e.e.r.e...-.@...[.......*.7.B.X.o.......@.....'.........D.Y.......0.[.........A.M.............H.F........&.0.......:................b.l.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.905547915629603
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/EnlyMmllY3:SBtkJYlU8g8l/0Enl2
                                                                                                MD5:14836CAA5D41214A638652DF6DECC415
                                                                                                SHA1:E67611755B621579CE52F7AE85B3B24F7FF9E345
                                                                                                SHA-256:32E71BDB4306BFDC5A464475A9B7AD9E6371B6E97B6AEB4E68957277356B6EE2
                                                                                                SHA-512:E14264E16FB6DEAE22ADB09A4E9B1542B8355EABD4AF4181348B7BC3DF343F342E74D0AF7D8685866CFC568F45D9D91FBEEBE683FB7B8B3C3C7616749FF1AE42
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s..f.f._.L.a.t.n._.C.M...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.411243631352237
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/E9:SBtkJ1li6gml/o
                                                                                                MD5:A0E7F0023EFE9D9DA802A0C5A941F8CE
                                                                                                SHA1:E4522C97B99704605469449C21AEEF8E03A0AD3E
                                                                                                SHA-256:756032017E2D9DEB9EC1508DAFB605009EADF6D859FF309BBCD6E49BB2D8D9F2
                                                                                                SHA-512:2B06564FB675F51D96E9945A303D9AADAEABB8173222AC644AC3415D5AC1AEC958D70F651A5C85561CDD79E0F4B713D43117332A8536A251F4FB48800076AB01
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....s...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.411243631352237
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/E9:SBtkJ1li6gml/o
                                                                                                MD5:A0E7F0023EFE9D9DA802A0C5A941F8CE
                                                                                                SHA1:E4522C97B99704605469449C21AEEF8E03A0AD3E
                                                                                                SHA-256:756032017E2D9DEB9EC1508DAFB605009EADF6D859FF309BBCD6E49BB2D8D9F2
                                                                                                SHA-512:2B06564FB675F51D96E9945A303D9AADAEABB8173222AC644AC3415D5AC1AEC958D70F651A5C85561CDD79E0F4B713D43117332A8536A251F4FB48800076AB01
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....s...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):14776
                                                                                                Entropy (8bit):4.840756604653443
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:hJNBzw2ACimx6yZC+K+9giVGNXNIlHR4y0Md:hpw2Axc8+D9giVGlqlxr0Md
                                                                                                MD5:F5F4D042FDC414E3183D7399D30DCC21
                                                                                                SHA1:6F76082CB6843BB118F6156D4BA36520FBAB740E
                                                                                                SHA-256:3D03654780FA44F252203D81F6408453ECF5878B8BF9DDEC3FD55E1F12F7180C
                                                                                                SHA-512:5421635DAA2AD03336B2FACEF1AC8D0BBD635B6B21C6A2A2E97E66139F496BF3895E4749493A666EB7FC67A44CBCDD9F4788A9A4947B9EA127C837D164D6CABA
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................S.. ........f...f...........@...R..s..T.h.a.i.s...E.r.z.j.a...F.i.n.s.k...G.r.y.k.s...I.e.r.s.k...K.a.d.d.o...M.a.n.k.s...W.a.a.l.s...W.e.l.s.k...B.a.m.o.u.n...J.a.p.a.n.s...D.e.e.n.s.k...D.e.f.a.k.a...F.i.j.y.s.k...K.a.r.y.s.k...L.y.c.y.s.k...L.y.d.y.s.k...M.e.i.t.e.i...N.d.y.u.k.a...N.g.u.m.b.a...P.o.a.l.s.k...S.c.h.o.t.s...S.i.f.e.r.s...S.o.e.s.o.e...S.o.r.a.n.....V.o.t.y.s.k...Y.a.p.e.e.s...Y.s.l...n.s...Z.w.e.e.d.s...G.o.t.h.y.s.k...K.o.p.t.y.s.k...A.l.d.y.r.s.k...A.t.j.e.e.s.k...A.v.a.r.y.s.k...B.a.s.k.y.s.k...B.i.r.m.e.e.s...B.o.s.n.y.s.k...I.n.g.o.e.s.j...J.a.k.o.e.t.s...J.i.d.d.y.s.k...K.a.z.a.c.h.s...K.o.e.m.u.k.s...L.e.t.l...n.s...L.e.z.g.y.s.k...L.i.t.o.u.w.s...P.a.s.j.t.o.e...S.e.r.v.y.s.k...S.o.g.d.y.s.k...S.y.p.r.y.s.k...G.e.o.r.g.y.s.k...J.a.v.a.a.n.s.k...A.k.k.a.d.y.s.k...A.l.d.g.r.y.k.s...A.l.g.e.m.e.e.n...A.m.h.a.a.r.s.k...A.s.t.u.r.y.s.k...A.v.e.s.t.y.s.k...B.r.e.t.o.n.s.k...E.s.t.l...n.s.k...F.o.n.x.s.a.m.p...F.r.i.u.l.y.s.k...G.a.l.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.3516541400530713
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlzFCl9fp/SQiklJZl/olztyIj:SvE+ql3k1j
                                                                                                MD5:68124374E27B7809D664A5B4562CBA66
                                                                                                SHA1:1311DF721CD70595FDAD6EDF2A226AF8C14FBB95
                                                                                                SHA-256:F5FB695CBB748F1DF0543F4D43C2E11FEEFE2F5D33937E3A0FE18AE04A9B8897
                                                                                                SHA-512:CC21813B79F39F146B9884526674D46BA4397637772C27506FCD5E61E6A5A65D1DFD1332D892F7ACAFDDCC21EE6C8D854E24E9372DA61E92D1598C6C7FEF16FE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................R..s..G.a.e.l.g.............V......P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):996
                                                                                                Entropy (8bit):4.157413336009666
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:CdIOe7CUb4RYTdelO1PKAIU8MFLnvRJSPS6Nc5/AFO5cTKO:CO7C6jdfPC3ULZMS6NYcTKO
                                                                                                MD5:53FD129A992BD3F16612790C1D0DA1BC
                                                                                                SHA1:AD5FB46561E82B58384C939A443869E471AF3476
                                                                                                SHA-256:97B1AF616923A81BC5DA04B4F6D8EE4963D245001D9EFDDD2D5AACF4D5AD1C1F
                                                                                                SHA-512:ED8BED7846D5CF756FC283EEB4F74D2BA3F4ACD0828FB37FB5270320582DF13204AF33C4B2CBDC41898EA37A4070FEECD808862E754329CBCB838ED51A71BFF6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .1..............%.....1.....R..s..P...k.....P.+.k.+...W.a.l.e...K...m.o.a...K.M.l.e.a...L.k.k.i.a...H.e.b.e.r.a...H.e.l.e.n.e...K.e.p.a.n.+...L...k.i.n.a...P.a.l.a.n.i...P.u.k.i.k.+...K.u.e.k.e.n.e...P.a.n.i.o.l.o.....A.i.l.i.k.i.....A.l.a.p.i.a.....*.k...l.i.a...K.e.n.e.m.a.k.a...P.o.l.a.p.o.l.a...K.u.i.k.i.l.a.n.i...P.e.l.e.k...n.i.a...W.i.e.k.a.n.a.m.a...P...k... .K.u...u.n.a...P.a.l.a.n.i. .K.a.n.a.k.......L.l.e.l.o. .H.a.w.a.i...i...P.e.l.e.k...n.e. .K.a.n.a.k.....P.u.k.i.k.+. .P.a.l.a.k.i.l.a...P.e.l.e.k...n.e. .N.k. .H.M.l.a.n.i...P.e.l.e.k...n.i.a. .P.e.k.e.k...n.e...P.e.l.e.k...n.i.a. ...A.m.e.l.i.k.a...K.u.i.k.i.l.a.n.i. .K.e.l.e.m...n.i.a...P...k... .H.o...o.m.a...a.l.a.h.i. ...i.a...*..I.k.e. ...o.l.e. .. i.a. .a. .k.k.p.o.n.o. ...o.l.e. .p.a.h.a. .k.a. ...M.l.e.l.o...%.[.....7.B.X.....o.u.o.........@...o.......Y.....0.............(...H.........<...a.Z.......1.D...7.o.....W..S...a.G.h.g.*.v...M.A.}.0......2.k........V...|..Pg%.`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.411243631352237
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/E9:SBtkJ1li6gml/o
                                                                                                MD5:A0E7F0023EFE9D9DA802A0C5A941F8CE
                                                                                                SHA1:E4522C97B99704605469449C21AEEF8E03A0AD3E
                                                                                                SHA-256:756032017E2D9DEB9EC1508DAFB605009EADF6D859FF309BBCD6E49BB2D8D9F2
                                                                                                SHA-512:2B06564FB675F51D96E9945A303D9AADAEABB8173222AC644AC3415D5AC1AEC958D70F651A5C85561CDD79E0F4B713D43117332A8536A251F4FB48800076AB01
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....s...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):16268
                                                                                                Entropy (8bit):4.755787811668944
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:ck8QVzI/zb0V2l4KIZuDT85XYvuyLUIiiJrLX:ck8QVzI/30o4KIZP5QuwviiJrLX
                                                                                                MD5:8F650AD8EAB2EACCA9B1F63DB48CADB4
                                                                                                SHA1:DA29CDC66F54A53654C9775A72308E1F417DB129
                                                                                                SHA-256:28FF9143E71F9199738A95DA1BDBE9ECD6481FEEE13E80BA6CFA5E78F27B3FEF
                                                                                                SHA-512:FE4CCAE23A658E1D2630A3F430524FCC76E5446127BA71F44D6A9D120780820670E8253CE84333EA79F3F5AED4FA3864ABD4E70CCF57BC460128B3AB4F8BF2C2
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...........................R..s..U.s.k.i...k.a.j.e...a...o.l.i...h.a.i.d.i...r.e.s.i.a.n...s.r.p.s.k.i...v.o.t.s.k.i...`.i.r.o.k.i...o.r.o.m.s.k.i...a.i.n.u.s.k.i...a.k.a.d.s.k.i...a.k.a.n.s.k.i...b.r.a.j.i.c.a...f.e.n.i...k.i...h.i.n.d.s.k.i...k.o.r.n.s.k.i...k.u.r.u.a.k.i...n.a.u.r.s.k.i...n.i.u.j.s.k.i...n.u.e.r.s.k.i...o.s.e.t.s.k.i...s.a.r.d.s.k.i...s.i.n.d.s.k.i...t.e.l.u.a.k.i...t.i.f.i.n.a.r...R.a...u.n.a.l.o...Y.i. .p.i.s.m.o...a.j.m.a.r.s.k.i...a.r.a.v.a...k.i...b.a.m.u.n.s.k.i...b.i.k.o.l.s.k.i...b.u.g.i.n.s.k.i...f.e.r.o.j.s.k.i...g.a.g.a.u.s.k.i...h.e.t.i.t.s.k.i...j.a.k.u.t.s.k.i...j.o.r.u.p.s.k.i...k.a.b.i.l.s.k.i...k.a.a.u.p.s.k.i...k.o.r.z.i...k.i...l.e.z.g.i.a.k.i...l.i.t.a.v.s.k.i...m.a.r.i.j.s.k.i...m.o.n.o.t.o.n.o...p.o.l.i.t.o.n.o...r.a.p.a. .n.u.i...s.e.s.o.t.s.k.i...t.i.b.e.t.s.k.i...t.i.g.r.i.a.k.i...t.u.v.i.n.s.k.i...v.a.l.o.n.s.k.i...N.u.m.e.r.i...k.i...a.k.a.d.e.m.s.k.i...a.r.o.m.u.n.s.k.i...a.v.e.s.t.i...k.i...e.m.o.t.i.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):15064
                                                                                                Entropy (8bit):4.939742695791492
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:xOTzT0uwmfbiJccuneogXhHOvVRLuBHVWFj9mju7q9RtyJ7zcWdd:x0wmziJccunLgXhHOWIj9mjum9zyXcW7
                                                                                                MD5:26190B9EED710094BBBC1092E660A258
                                                                                                SHA1:947AFD31057104A7B345F97F7B75B248D82F1A8F
                                                                                                SHA-256:2F152BAF2D1D1FE0E2400A39DF9E62501EA89F8686428B7E6481E93D843E92BB
                                                                                                SHA-512:FA1EF8360C77E869B626D10BBF1D1B7FE3565CA37E3CF5E3A8D545195DEC3D208DAB601F84FDD0BB0A30323E8301FAB249EF84E8DFA4DCC750BEC8F16C585D98
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................#.......r...R..s..L.a.z...A.r.a.m...A.v.a.r...E.l.a.m...E.s.t.i...F.u.l.a...K.a.d.o...K.r.e.e...A.n.g.k.a...D.a.n.s.k...E.r.y.z.a...G.o.t.i.k...H.i.t.i.t...K.a.r.i.a...K.a.r.i.b...K.o.s.r.e...K.u.r.d.i...K.u.r.u.k...L.y.c.i.a...L.y.d.i.a...N.i.u.e.a...N.u.s.h.u...R.u.n.i.k...S.k.a.u.s...S.u.o.m.i...V.o.t.i.a...W.a.r.a.i...A.v.e.s.t.a...S.u.r.i.a.h...A.b.k.h.a.z...A.d.y.g.e.i...B.I.S.K.A.Y...C.h.e.s.k.a...C.h.u.u.k.e...F.r.i.u.l.i...G.o.t.h.i.c...I.t.a.l.i.a...J.e.r.m.a.n...K.a.l.m.u.k...K.a.n.t.o.n...K.h.o.t.a.n...K.i.r.g.i.z...K.o.k.t.a.w...M.a.n.d.a.e...M.i.k.m.a.k...P.o.l.s.k.i...R.o.t.u.m.a...S.h.a.v.i.a...S.i.p.r.u.s...S.l.o.v.e.n...U.g.a.r.i.t...Y.a.p.o.i.s...B.a.v.a.r.i.a...B.e.l.a.n.d.a...F.u.n.i.s.i.a...G.a.l.i.s.i.a...G.i.l.b.e.r.t...I.n.g.g.r.i.s...K.a.b.a.r.d.i...K.a.r.e.l.i.a...K.o.m.o.r.i.a...K.o.r.n.i.s.h...K.o.r.s.i.k.a...L.e.z.g.h.i.a...L.i.g.u.r.i.a...L.i.t.u.a.v.i...M.i.r.a.n.d.a...M.o.n.o.t.o.n...N.g.a.m.b.a.i...O.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2308
                                                                                                Entropy (8bit):4.540655170423697
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:K2coGYZDwtcHbjgIRzolvUDAVrRZZegsadIvY3thJJ:yeDwtcoIR0l2AVr/hsayvY3b
                                                                                                MD5:1DF44368DAF33829E4D77A7575EF4C44
                                                                                                SHA1:13D5F88B90ACEB21C86426D260D8546E5A0B9A9E
                                                                                                SHA-256:7E419E443A89C425435414A79A0C935E46A1EBC3A919F6CA7E4783ED4952CA65
                                                                                                SHA-512:6002430A6165099A6193061B39D03D074122869261151E7FF7CC67B0D1886069EA7843BD5BC081823FED6819C7C60C4D47774F29616E8F9555639E1FA129F529
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................,.. ........9...9...<.......'...R..s..T.a.....A.w...s.a...D.....c.h...C.h.e.e.k.....M.a.g...y.a...M.a.l.e.y.i...M...a.n.m.a...P.e.s.h.a.n...T.a.m...l.....G.i.r.i.i.k.....R.u.m.e.n.i.a...R...w.a.n.d.a...A.m.a.r.i.i.k.....A.r.a.b.i.i.k.....P.o.l.i.i.s.h.i...T...k.i.i.s.h.i...U.k.u.r.e.e.n.....B.e.l.a.r.u.u.s.u...B...l...g.a.r...a...I.n.d.o.n.i.s.i.a...H.a.n. .I.z.u.g.b.e...A.s...s... .I.g.b.o...A.s...s...:. .{.0.}...E.d.e.g.h... .e.d.e...H.a.n. .d.i. .m.f.e...M.a.n.d.a.r.....n.....N.k.e. .d... .m.f.e...S...w.i.d.i.i.s.h.i...A.s...s... .B.e.k.e.e...A.s...s... .J.a.m.a.n...K.e.m.e.,. .E.t.i.t.i...U.s.o.r.o. .N.h.a.z.i...V.i.y.e.t...n.a.a.m.....A.s...s... .a.m.a.g.h.....B.e.k.e.e. .n.d... .U.K...B.e.k.e.e. .n.d... .U.S...A.s...s... .F...r.e.n.c.h...A.s...s... .I.t.a.l.i.a.n...A.s...s... .R.u.s.s.i.a.n...A.s...s... .S.p.a.n.i.s.h...M.p.a.g.h.a.r.a.:. .{.0.}...A.s...s... .J.a.p.a.n.e.s.e...K.a.l.e.n.d.a. .G.r.e.g.o.r.y...A.s...s... .P.o.r.t.u.g.u.e.s.e...B.e.k.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):516
                                                                                                Entropy (8bit):5.328377616567796
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:Svcmlbgsls1BvQGipUFdTEsPnF4H6cRbMH+ZeUFliuRnYfjnuMeTIkiS2YmAuskB:szsLFHwsdcpM+FCfdkB/WgwEm2TT04s
                                                                                                MD5:EAA431A649076E666AAFE58DD444BA70
                                                                                                SHA1:357FEA0085F36BBAED83487A2B1C15F62FD9E4B4
                                                                                                SHA-256:E85CFA46931912CD60AFEC25CA10631F2522F86BCC7970304B3A1C72AA7D160F
                                                                                                SHA-512:56982644B9AD874B613612D2DDDF9CC592CBDA75C26F3C1CA6DD6B50FDE0EB8BCF675A65BE7F6976D91044C3F887C52316D88F543D55F2D4613FE69EE3311305
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................q.. ........y...y...........o...R..s....Y......Y..... .Y......Y....*.Y...q..Y...q...F. .....{..M..... .q.........q.....m. .x.Y...t.....Y...../.O..Y.......(.q........O..Y...I... .G.....s.&..M.V... ._.M.(.x.Y......L.2.q.....I..... .q......./.L.2.q.........&....q......7.:. .{.0.}...G.Y.:. .{.0.}....q.:. .{.0.}.....7.X.o.....................................................e.......B........../././......./..................)/1/!/.........P........V......P...Po.. ...`...P
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):5192
                                                                                                Entropy (8bit):5.071203043587727
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:brZQAv2QboMPRPInxmWip65+Evj31f4j0hblubmWG4yW46g9cwe0XGVCz68I4FGH:brZQAFJPoxZyzEL1t4bZfb0XGVCOSsKs
                                                                                                MD5:21972FF0C8DB621CDBEEA4D01034D910
                                                                                                SHA1:451F76FC86B9B5C94A7D0E2314076F7766EE6CFD
                                                                                                SHA-256:FE87D00FF0B9326542C0ED7B58F5B76E16CB09B0CDBC1E0D934DC4CD1E007B21
                                                                                                SHA-512:AA1DE7C960F75B448BED68736554F8DBF00C2F4816A1D04F31694768FF13F9AA764886CEAFC844FF1FE93A50106EACA13DD62667DCFFFE3A378301FD956D5674
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .j....................j.....R..s..a.f...b.s...I.q.b.o...J.a.w.a...A.n.g.k.a...C.e.s.k.a...D.a.n.s.k...I.n.d.i.a...R.o.m.a.n...S.u.o.m.i...F.l.e.m.i.s...G.a.u.l.i.a...I.t.a.l.i.a...J...r.m.a.n...K.a.n.t.o.n...K.a.t.a.l.a...K.i.r.g.i.s...K.u.r.d.i.s...P.u.n.j.a.b...S.i.m.b.o.l...C.o.l.o.n.i.a...G.a.l.i.s.i.a...I.n.g.g.r.i.s...K.o.r.s.i.k.a...K.r.o.a.s.i.a...O.s.s.e.t.i.a...P.r.a.n.c.i.s...R.u.m.a.n.i.a...S.p.a.n.y.o.l...U.k.r.a.i.n.a...W.a.l.a.n.d.a...M.o.n.g.o.l.i.a...E.t.h.i.o.p.i.k...I.r.l.a.n.d.i.a...I.s.l.a.n.d.i.a...K.e.r.n.o.w.e.k...P.o.l.a.n.d.i.a...S.l.o.w.a.k.i.a...T.y.o.n.g.h.w.a...B.a.s.a.:. .{.0.}...T.a.n.g.g.a.l.a.n...D.i.g.i.t. .O.d.i.a...{.0.}. .t.u.n.y.u.k...D.a.e.r.a.h.:. .{.0.}...D.i.g.i.t. .L.a.t.i.n...H.a.n. .P.r.a.s.a.j.a...N.d.e.b.e.l.e. .L.o.r...O.r.a. .K.e.t.u.l.i.s...{.0.}. .. .k.a.b.e.h...I.n.g.g.r.i.s. .(.A.S.)...J.e.r.m.a.n. .S.w.i.s.s...K.u.r.d.i. .T.e.n.g.a.h...{.0.}. .. .l.i.y.a.n.e...D.i.g.i.t. .B.e.n.g.a.l.i...D.i.g.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):11996
                                                                                                Entropy (8bit):4.971862421082815
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:XayP0n6ghoVG8jcydLy8crskltPI7As63MBRIbMSGC5vdaX54RI+t6LXI8Pfhjh:Kyq6hR7SIMssMOGwaSy+t6LXJP9h
                                                                                                MD5:EA8690FD132C4B09D1CC060E326D34EC
                                                                                                SHA1:1305877BA04C2D96887F8D912853E0BE160428CF
                                                                                                SHA-256:797505C29E28D17795EFA66472B90382AE264D208279384FD0DCECAF1E324ED0
                                                                                                SHA-512:3062593518B6DEEE7B4C88A5E1DBEC28C5DEBC514974A62779CAA2FFE3A3C20DBFE8B28A25FE08C77571EA1B9DA1DE9965D92013C3D1FE508401D9D3B1540695
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................R..s....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):12964
                                                                                                Entropy (8bit):4.66170967139447
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:kDb5cs8FxvLu/XLX/veKquxPG/DoYrgG4L65l1AD+Dyprret:kDb5clLTu/XLX/veKq2PG/MY8fYVDyF4
                                                                                                MD5:C4F1AB6E41958B795BA30EF55700B597
                                                                                                SHA1:10EC8126AC5C667BDE13E24653AA48CE810161C5
                                                                                                SHA-256:4E44267DE9D168463850C2C76631AAD56DDE3091A1A71952D05BAE71B2C03182
                                                                                                SHA-512:63F5A0F563C3C139274EE63BA3651B925C591A6BBB80D42137AD9DFA1B5242FD53D74E61E07031C87E1D069D8430C887F85E8D6C6A6E3642544B90E006B4CBB6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................v...R..s....0.>...".0.9.....@.0.1.....@.5.:.....<.5.@...".5.;.C...%.0.=.1.....@.<.O.=.....@.5.9.;.....6.0.<.>.....0.;.?.K.....0.?.0.=.....2.@.8.B.....>.@.5.9.....0.B.K.=.....@.8.9.0...".0.0.=.0...".0.<.8.;...".8.1.5.B...-.D.8.>.?...0.A.C.G.0...4.0.B.G.0...4.6.C.G.0...8.4.>.G.>...;.0.>.G.>...;.C.>.G.>...=.:.>.G.>...@.C.0.G.0...B.O.?.G.0...B...?.:.....D.8.=.G.5...D.>.=.G.>...H.0.=.G.0...M.1.5.G.5...0.G.5.E.G.5...A.>.3.0.G.0.....5.=.3.0.;.....@.C.7.8.=.....8.@.8.;.;.....>.=.3.>.;...!.0.=.4.0.@...%.0.=.3.C.;...0.3.5.<.G.5...0.7.5.@.G.5...0.9.=.C.G.0...0.:.0.=.G.0...0.@.0.1.G.0...0.D.0.@.G.0...1.0.;.8.G.5...1.0.A.:.G.0...1.5.=.0.G.0...1.8.=.8.G.5...1.;.8.=.G.5...1.>.4.>.G.>...2.0.9.8.G.5...3.8.8.7.G.5...3.@.5.:.G.5...3.C.A.8.G.5...7.0.7.0.G.0...7.C.;.C.G.0...7.C.=.8.G.5...8.1.0.=.G.0...8.3.1.>.G.>...8.4.8.H.G.5...:.0.:.>.G.>...:.8.G.5.G.5...:.<.5.@.G.5...:.>.<.8.G.5...:.>.@.>.G.>...:.>.A.0.G.0...:.@.8.:.G.5...;.>.7.8.G.5...<.0.@.8.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):980
                                                                                                Entropy (8bit):4.143220693741953
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:WWkTI9m+Kt3Dh5/9x0dL+M1/G0JvRLu0F:72DP/9iRrBhF
                                                                                                MD5:819C9824663BDEE2475C0F42BBE6B3BB
                                                                                                SHA1:A6EDE12F3D8DF668C397F1FB03A13CD212B7D73E
                                                                                                SHA-256:CA33D0088BFC2ED68EA0751E9B0DA486B3FCB6509C65B4011E037074A3421AB8
                                                                                                SHA-512:32ACD8164EE3519D92769730417C926D60898E25F4857DF12007F72A2EDF7E1FAEE150225B3A62EA5F77D2F886711D20C478E2CACEF2390D8A3593B460565CFF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..p.............-......p....R..s..l.i.r.i.s.....l.i.t.a.y.e...l.i.u.r.d.u...l.i.z.a.p.T...l.i.z.a.v.a...l.i.a.l.a.b.o...l.i.a.l.e.m.....l.i.h.i.n.d.i...l.i.k.r.[.n.i...l.i.n.g...l.a...l.i.s.i.n.w.a...l.i.b.i.l.i.m.....l.i.f.a.l.a.m.....l.i.g.e.l.e.k.i...l.i.k.o.r.e.y.a...l.i.m.a.l.e.z.i...l.i.n.e.p.a.l.[...l.i.o.n.g.i.l.i...l.i.p.o.l.o.n.[...l.i.s.o.m.a.l.i...l.i.s.u.w.e.d.[...l.i.t.a.m.u.l.i...l.i.t.i.l.i.k.i...l.i.t.s.h.e.k.[...l.i.a.m.a.r.i.k.i...l.i.b.e.n.g.a.l.i...l.i.n.d.o.n.e.z.i...l.i.s.i.p.a.n.y.e...l.i.t.a.l.i.a.n.o...l.i.b.i.l.i.g.a.l.i...l.i.f.a.l.a.n.s.[.....l.i.k.a.m.b.o.d.z.a...l.i.n.g.[.l.[...s.a...l.i.p.e.l...s.a.n.[...l.i.p.e.n.d.z.a.b.i...l.i.b.y.e.l.o.r.i.s.....l.i.v.i.y.e.t.i.n...m.i...l.i.p.u.l.u.t.u.g.[...s.i...-.@...[.......*.7.B.X.o.....@.....'.........D.Y.O.......0.[.........A.M.............H.F........q.q(r.q.q.q.qQq.r.q.r.q...quq.q...q.q.q.qZq/qcq?qlqHq.r~qAr.$.p.p.q.q.q.p.q'q.p4r."7q'.......V...d..P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):5552
                                                                                                Entropy (8bit):4.785841425159864
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:/z2dO96bXC7RiGI1LC7kk8/746Rvw5FmXRxGEPjHwoWqA:/q49ceiBDrRmmiWHxPA
                                                                                                MD5:3E47E97864163178104D23AB384B391B
                                                                                                SHA1:CF2F6BD65DAAF9CB748654C2A690DE87A8D2E77F
                                                                                                SHA-256:C60675581D75AF114E0D504D492E3A6DBBDC653B7102DC65B65A889259DE16B3
                                                                                                SHA-512:FFE91DF77878764C0AE4DE44AF2A7DD808732AA16B1A52EC5C4DC5AE49AB95A337CB20237D069F6B7206FA014E428E12DC59B2177D1EA62BBA618099CA091A92
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................W.. ........d...d...........R...R..s..&...&...D.'.H...D.H.Y.....'.....".3.H.Y...".B.&.E...&.E.(.H...(.&.F.'...(...E.'...*.&.3.H...*.'.F.'...1.&...'...3.&.F.'...A...,.....D.'.&.H...E.&.1.H...............&.F.......'.F.....&.H.1...'...*.'.E...D.....&.E.&.1...9.&.(.1.......H.1.,.....".0.#.1.....&.....(.H...(.'.A...'...*.H.1.........H.Y.3.'...3.&.1.(.....3.&.F./.....3.H.Y...'...B.#.2.'.B...E.&.*.'.[...E.'.F...3...F.&...H.Y.....H.'.4.......&.D.2.......H.D.H.A.....'.F.'./.....H.Y.3.....#.1.E.#.F.....*.#.(.#.*.....*.&.D.&...H...E.H.:.H.D.....".D.(.'.F.....".D.E.'.F.....#.E...#.1.....&.H.1./.H.Y...(.&.1.&...D...(.H.Y.~.H.Y.../.H.Y.'.D.'...3.'.F...H.Y...3.H.Y.&./.....D.H.Y.&...'...E.#.,.'.1.....E.#.1.'.*.....E.'.&.H.1.....E.'...'.E.&...F.&.~.'.D.....F...H.Y.&.1...~.#.4.*.H.Y.....&...&.F.......'.(...D.&.....H.1.F...4.....H...H.Y.'...........H.Y.....'.D...3.......'.&.H.3.'.....'...'.........'.....*.....(.#.F...'.D.....,.'.~.H.Y.F.....E.'.D.'...'.E.....H.1.&. .......
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):19264
                                                                                                Entropy (8bit):4.522583117528537
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:Ai61FYdfSu9cuXd3uh+m/ESiS6SKS8SPlS8SKSKqS6SRSS1SsSoAVYSbaSdvSXNb:AiwWd3e+oE1N1S8uDl1qp0SqLSY9+6/z
                                                                                                MD5:0EE42B9144D454937CAED63DB74270E8
                                                                                                SHA1:2B5F4DA980B4CCF5F6189AF6DD3CD0BD2B0E2D98
                                                                                                SHA-256:B92E14DF347A636B81350A7D2E3EA99D7F4CD15F6BD6D87E57CFF15F21149946
                                                                                                SHA-512:DEFDA5831550A8F3E26449100AD3DBCC9E4F212407E39747FF2ED1C9CE396CC702C2733BB8361F470FE89B73C9540CE10C63DB550D320B448F2CC4EC773712C9
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................R..s..j.g.o...k.r.+...m.g.o...t.v.+...g.o.t.u...t.a.j.u...b.a.s.u...b.i.n.u...b.u.g.u...d.a.z.u...d...F.u...f.o.n.u...f.u.l.u...f...r.u...g...z.u...h.a.F.u...h.e.t.u...h.u.p.u...k.a.d.u...k.o.m.u...k.o.r.u...k...v.i...l.o.z.u...m.a.b.u...m.a.f.u...m.o.s.u...p.o.<.u...p...l.i...s.o.g.u...s.o.m.u...t.i.v.u...t...n.a...v.a.j.u...v.o.t.u.....e.h.u.....k.k.u...F.o.r.u...a.a.n.u...a.o.n.u...k.o.p.t.u...o.r.i.j.u...z.u.n.d.u...a.d.i.g.u...a.f...r.u...a.k.a.n.u...a.v...r.u...a...o.l.u...b.a.s.k.u...b.e.d.~.u...b.e.m.b.u...c.o.n.g.u...c.v.a.n.u...d.a.r.g.u...d.i.n.k.u...d.i.k.l.u...d.o.g.r.u...d.u.a.l.u...e.f.i.k.u...e.r.z.j.u...f.a.n.g.u...f.a.n.t.u...f.l...m.u...g.a.n.d.u...g.b.a.j.u...h.a.i.d.u...h.a.u.s.u...i.b.a.n.u...i.l.o.k.u...k.a.d.~.i...k.a.m.b.u...k.e...v.u...k.h.a.s.u...k.h.o.s.u...k.o.n.g.u...k.r.+.k.u...l.a.m.b.u...l.a.n.d.u...l.u.h.j.u...l.u.n.d.u...m.a.i.j.u...m.a.o.r.u...m.e.n.d.u...m.j.e.n.u...m.o.k.a.u...n.j.a.s.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):940
                                                                                                Entropy (8bit):4.091999815966314
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:VCG6EWhRnGI2lT+c/rVHhbIyMW8HHdMinWNDEsfRPJ14iJlF40cFK3UAF:VCQogI2P9hj8J0bRX4CcFKEg
                                                                                                MD5:4E444E5FCECE69C68BEEF9278DB25D7B
                                                                                                SHA1:C26890CF41272501B2E4EB2E5F30746176DFB797
                                                                                                SHA-256:1ED5E93183C4E5EEEEA19A2A29D9260C4B39AE21D8F01D9A486DEF21BF2C450F
                                                                                                SHA-512:D6E78F9163D5BEF68054F4AFC7E3DDA87E4ACA4B902D74103CBC1CB82E676F46C6C821EEE85242A165FF24DF3FC23745607F4C5A75BE6138D4853B50CA54E843
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .Xx.............,.....Xx....R..s..I.k.a.n...I.j.a.v.a...I.r.i.s.i...I.z.u.l.u...M.a.k.u.a...N.r.e.n.o...I.a.j.e.m.i...I.a.r.a.b.u...I.b.u.r.m.a...I.c.h.e.k.i...I.c.h.i.n.a...I.h.a.u.s.a...I.h.i.n.d.i...I.h.u.r.d.u...I.k.o.r.e.a...I.m.h.a.r.i...I.s.w.i.d.i...I.t.a.m.i.l...I.u.k.r.a.n...I.b.a.n.g.l.a...I.g.i.r.i.k.i...I.j.a.p.a.n.i...I.n.e.p.a.l.i...I.s.o.m.a.l.i...I.t.u.r.u.k.i...I.y.o.r.u.b.a...I.b.e.l.a.u.s.i...I.f.a.r.a.n.s.a...I.h.o.l.a.n.z.i...I.h.u.n.g.a.r.i...I.m.a.l.e.s.i.a...I.p.o.l.a.n.d.i...I.p.u.n.j.a.b.i...I.r.o.m.a.n.i.a...I.b.u.l.g.a.r.i.a...I.j.e.r.i.m.a.n.i...I.k.a.m.b.o.d.i.a...I.n.g.i.l.i.s.h.i...I.n.y.a.r.a.n.d.a...I.t.a.i.l.a.n.d.i...I.v.y.e.t.i.n.a.m.u...I.h.i.s.p.a.n.i.o.l.a...,.@...[.......*.7.B.X.o.....@.............D.Y.........0.[.........A.M.............H.F.....Yx.x.x.yWy.x.xay.xuy.y|x.y.x.x*y..Wx.x^xky.xpx3y.x.x!yEy<yvxNydx.y.x.x.x.y.x.x.x.y.y.xjx......V...R..P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):10988
                                                                                                Entropy (8bit):4.974565944055817
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:dsJanyEyEVTbHFPStZVWhnApH5Q4rBstRBXLeV/djM7ICFn9vKPdes08/Q07m6dD:6JaTdHFPStZV2nSH5QAstnqVadKVPHfz
                                                                                                MD5:1319DCF9C1470CF1CA20E35BBBB3445F
                                                                                                SHA1:6715D87BE00F6C06C137C951DDA333078AFBFFD4
                                                                                                SHA-256:3949D91AAEE83B53522EC9B914B35C4ACCB1AB7598206F69EE2D4C3248E35A63
                                                                                                SHA-512:3EFD4CA2584AD6C0516F5B00D823BADBE7824F4C79A33E9C0E57217704422C3C90D0F05A5EE904EAAB6D8721F39B542DF391FDD8094DFC991A5840986E487F47
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................v...R..s..N.i.u...I.t.a.l.i...L.a.z.i.m...W.a.l.e.s...J.e.r.m.a.n...K.i.k.u.y.a...O.s.s.e.t.e...P.o.l.a.n.d...S.i.c.i.l.i...S.w.e.d.e.n...B.e.l.a.n.d.a...B.e.l.a.r.u.s...C.h.u.k.e.s.e...C.i.n.a. .W.u...C.o.m.o.r.i.a...C.o.r.s.i.c.a...D.e.n.m.a.r.k...F.i.n.l.a.n.d...G.u.j.e.r.a.t...H.u.n.g.a.r.y...I.c.e.l.a.n.d...U.k.r.a.i.n.e...B.e.n.g.g.a.l.a...2...1...4.9...2...A.b.k.h.a.z.i.a...C.i.n.a. .G.a.n...F.i.l.i.p.i.n.a...I.n.g.g.e.r.i.s...K.a.b.a.r.d.i.a...K.a.l.e.n.d.a.r...K.a.n.t.o.n.i.s...K.i.r.i.b.a.t.i...K.o.m.p.u.t.e.r...M.o.l.d.a.v.i.a...P.e.r.a.n.c.i.s...S.e.p.a.n.y.o.l...B.e.r.n.o.m.b.o.r...C.a.t.a.l.o.n.i.a...D.i.g.i.t. .M.r.o...D.i.g.i.t. .V.a.i...O.c.c.i.t.a.n.i.a...Z.o.n. .W.a.k.t.u...P.e.r.s.o.-.A.r.a.b...D.i.g.i.t. .B.a.l.i...D.i.g.i.t. .J.a.w.a...C.i.n.a. .H.a.k.k.a...C.i.n.a. .X.i.a.n.g...D.i.g.i.t. .A.h.o.m...D.i.g.i.t. .A.s.a.l...D.i.g.i.t. .M.o.d.i...D.i.g.i.t. .N.. K.o...D.i.g.i.t. .T.h.a.i...I.s.i.h. .A.k.s.e.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):15012
                                                                                                Entropy (8bit):5.042198577749172
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:jq5oytq/nYt1aaAiUIXkN6EW6jDqT8RC78xrz6Itu1pvNrl+TYlTos/HseUmUsVI:m5ompt1aaACJlARzwI+Xp/MeUV0Qx
                                                                                                MD5:53FC80551FB174F8E1E25B69EE7A5F8A
                                                                                                SHA1:FCB0CCBBC9DDF0AC374673102AB353D88C909BF4
                                                                                                SHA-256:800DFDB2D2ABC9FC131D74C30AC9A5536D86F8656536A1D7A9308EA87484E36A
                                                                                                SHA-512:01E6DB1D21A925A24B860F5705BB47D98E13B21C2FFC8134BCD0A6F051B213CAB02531A88FEE136B010D6659A50354193AEFD7F0C9E27567A46F46E64FB6C803
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .N..............[.....N.d...R..s..j.y.s.k...r.i.f.f...a.k.o.s.e...e.r.z.i.a...k.a.p.i.z...f.e.l.l.e.s...f.r.a.s.e.r...g.i.l.e.k.i...k.a.r.i.s.k...k.i.e.m.b.u...k...l.n.s.k...l.a.z.i.s.k...l.i.v.i.s.k...m.i.n.n.a.n...m.o.k.s.j.a...t.a.l.y.s.j...z.e.e.u.w.s...l.a.o.t.i.s.k...b.a.i.r.i.s.k...f...r...y.s.k...g.a.s.s.i.s.k...i.n.g.r.i.s.k...j.i.d.d.i.s.k...k.a.b.y.l.s.k...k.o.r.n.i.s.k...l.a.d.i.n.s.k...l.a.t.v.i.s.k...l.e.s.g.i.s.k...m.a.n.d.s.j.u...n.o.g.a.i.s.k...p.o.n.t.i.s.k...r.u.m.e.n.s.k...r.u.s.i.n.s.k...s.e.s.e.l.w.a...s.o.g.d.i.s.k...t.u.v.a.l.s.k...t.u.v.i.n.s.k...v.a.i.d.i.k.a...v.e.p.s.i.s.k...z.a.z.a.i.s.k...a.d.y.g.e.i.s.k...a.r.a.g.o.n.s.k...a.r.o.m.a.n.s.k...b.e.n.g.a.l.s.k...b.i.s.c.a.y.a.n...c.e.b.u.a.n.s.k...e.l.b.a.s.i.s.k...f.o.n.x.s.a.m.p...f.u.l.f.u.l.d.e...g.a.l.i.s.i.s.k...h.a.w.a.i.i.s.k...k.a.i.t.h.i.s.k...k.a.r.i.b.i.s.k...k.a.s.j.m.i.r.i...k.o.c.i.e.w.i.e...k.o.m.o.r.i.s.k...k.u.m.y.k.i.s.k...l.i.g.u.r.i.s.k...m.a.l.a.y.i.s.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):16224
                                                                                                Entropy (8bit):4.9075050171898065
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:GCv30PmdRF4X1BY+x3NaAqAg/+pTCzlSwl:GCv38mt4rtx3NngWg9
                                                                                                MD5:F8A5393FB73004A0125270C2B8699EDA
                                                                                                SHA1:665FE34ED3B425A409BF9F5955F36CA4D1A2A371
                                                                                                SHA-256:956F1F13BFECE3A4B6AC8D17536618733F3BB887808E431201C472BE36F04111
                                                                                                SHA-512:9DA3A86812F2137028FCEBB74B99CA9795749647A1F516F143B1F6A07D04CA6E87927310216B20760723BBD9B420BCA01EE899F1BFD5DE309A2CA25466637EC6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...........................R..s..c.f...h.c...l.b...-.>.......8.A.....!.K.....5.@.....K.......>.......G.......B.(...(...K...+.>.....+.K.(...0.A.....2.>.....2.A.....6.>.(...Z.m.t.h...Z.s.y.e.......(.A.......A.........>.(.......G.........>.......?...G.....M.%.@.....K.8.>.....?...>.....>...>.....A.(.@.....A.2.A.....A...*.....G.8.K...+.M.2.?...,.>.......,.>.8.>...,.A.2.A.......'.@.....2.>./.....>.+.>.....>.,.>.....?...K.....K.9.....2.K...@...5.>.0.G...8.>...>...8.>...>...8.A.8.B...9...K.....9.A.*.>...$.>...?.2...l.o.o.s.e.......G.0.@.....&.?...G.....2.G...........0.?.8.....0.M...@.......M.,.K.....(.M...8...../.K...K.........A.0.....!.?./.>.....0.M.&.A.......>.0.>.....!.?./.>.....8.>...G.....>...>.......>.,.?.2.....A...?.......A.0.A.......M.0.?.......M.0.?.......K.5.>.0.......>.........A.-.>.8.....G...G.(.....0.M...>.....A...?.8.....>...2.G.....>.-.M.......G...A.....!.G.(.?.8...$.>...$.>...$.>.$.>.0...(...?...>...(.>...0.B...(.?.....(...(.K...>.....*.K.2.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1304
                                                                                                Entropy (8bit):4.25693545904243
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:jDfYElrecyT0x1m9qMVqnVWdo8ChtHhnzROEp0D19SiBQ1m8Jt4aE3u:jXCcyASkMVcVceh9xlOP9BR3e
                                                                                                MD5:D29DE5920AE0135DB10D4FFDA770711E
                                                                                                SHA1:01673E54DA28C57B05FAF767030022B841B86F9D
                                                                                                SHA-256:5BC5DC42CE6FDA2F6DC808E24F15B2F87021ED5FBD226CA9C346A3B6EC787EC8
                                                                                                SHA-512:68DEC56D7D5A6EFCC60EB45C172B0255BA53767831EA409D02A9162D655A027C0246F78A5B4C0B9211E8C1032707F12017F440BC248A3B7DA984227A3AF2E79E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................:.. ..Q.....>...>...,......Q:...R..s..F.a.l.a...P.a.K.....J...m.a.n...Y.o.r...b.....N.g.[...l.[...n...K.i.[.l. .a.k.a.n...K.i.[.l. .i.k.b.o...K.i.[.l. .k.o.r.....K.i.[.l. ...r.d.u...K.i.[.l. .t.a.m.u.l...K.i.[.l. .a.m.a.r.i.a...K.i.[.l. .b... .m.[.r...K.i.[.l. .i.t.a.l.i.a...K.i.[.l. .m...w...s.....K.i.[.l. .p.T.l.T.K.e...K.i.[.l. .p.[.r.s.i.a...K.i.[.l. .r.u.s.s.i.a...K.i.[.l. .r.w.a.n.d.....K.i.[.l. .b... .g.r.[.k...K.i.[.l. .b... .t.u.r.k...K.i.[.l. .b.. ..r.a.b.e...K.i.[.l. .s.o.m.a.l.i.....K.i.[.l. .v.i.[.t.n.a.m...K.i.[.l. .M.a.l.[...s.i.....K.i.[.l. .b.e.n.g.a.l.i.a...K.i.[.l. .b.i.r.m.a.n.i.a...K.i.[.l. .b.u.l.g.a.r.i.a...K.i.[.l. .b... .t.c.h.[.k...K.i.[.l. .b.. i.n.d.i.e.n...K.i.[.l. .p.[.n.d.j.a.b.i...K.i.[.l. .b... .r.u.m.[...n...K.i.[.l. .i.n.d.o.n.e.s.i.e...K.i.[.l. .b.e.l.a.r.u.s.s.i.e...K.i.[.l. .b... .c.h.i.n.o.i.s...K.i.[.l. .b... .j.a.p.o.n.[.....K.i.[.l. .b... .j.a.v.a.n.[.....K.i.[.l. .b... .s.u.e.d.o.i.s...K.i.[.l. .b...l.l.a.n.d.a.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):88
                                                                                                Entropy (8bit):2.6921723843305845
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlKelBjlgljl/FiFahn:SBtkJTl4t
                                                                                                MD5:2025BF7EE3171A6EE32EE4BAB511826A
                                                                                                SHA1:1D2CE8C50DAC406DA46723D496F7178E71E96EF9
                                                                                                SHA-256:41BD6D9FA31CF3D56880C336617B9B5CFDD72762803B2355470DEE494B8CF210
                                                                                                SHA-512:A981654800DF71FCFC479CE3166546ACE474D25827ECCE05B0A530C1D6EC95ED9628758F23E318DC342ED40B4E5014FFAF89C3A5A953AA051C4B62E62B2105C4
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s..n.b._.N.O.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):17836
                                                                                                Entropy (8bit):4.707405624637349
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:e8RqNVELt0jQ08TFSajm2Hiziw15Mkjv/HFXaD:5Rq3ELtYQzTwax7Kv/lXaD
                                                                                                MD5:59D301FCFD92CA17172D10CFF13C19D3
                                                                                                SHA1:95457A6A76C8B596A25D8CEC4D6D24DA6F488089
                                                                                                SHA-256:6139FBAABB48B72D0EF0F2E78C962BB7BFAF630BB0EF76D67A6286D171020473
                                                                                                SHA-512:477EF4739C36A8A2E65CDC89791B273139C61C466DF581B05DAE5BFF792845B05E3F2919553F570C43B7880E2EC08723EDC79F868DF87CCA2757DBA90B8606B6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................S.. ........c...c...........8...R..s..%.>.....2.>.......8.A.....!.K.....q.G.......M.......A...!...M...+.(.M...-.>.....2.A.....8.9.K..._.>.....q.>...........>.......(.M.......(.A.......G.......0.q.........,.K.....(...K.....>...K.....>.!.K.....>.q.?.....?...G.....H.%.?.....K...?.....K.0.K.....M.0.@.....>.8.@.....K.8.>.....>._.K.....A.8.?.....?...>.....G...M.....>...>.....>...K.....A.(.@.....A.2.A...$.@.-.M...$.G.8.>...$.M.q.?...%.>.(.>...(.>...>...(.A...0...*.>.2.?...+.?...?...,.>.8.>...,.?.(.?...,.G...>...,.G.(.>...,.K.!.K.....>.0.@.....>.2._.....?...K.....G...>.....G.0.A.....K.8.?...0.K...M...2.>.(.>...2.K...?...6.>.(.M...6.A.6.A...6.K.(.>...8.>...>...8.G.(.>...8.K...>...9.>.(.M...9.?.,.C...9.A.*.>...9.L.8.>...q.>.0.H...q.>.8.K.....!.<.?.....8.?...9.3.....+.>.0.M.......K.2.?.......G.0.?.....q.>.'.?.....,.>.(.M.......K...?.....0.?.8.M.....2.K...K.....+.?...M.......M.5.A.......>...>.......?.q.>.....0.K...K.......M...K.......?.(.M.....(.A.0.@.....(.M.(.!...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):132
                                                                                                Entropy (8bit):4.096745944387419
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlW7s+mlplplmV/ExIMjti5Z/lP3Alsldi9YF:SvGYpCV/LMjtavldi9o
                                                                                                MD5:CE3C1BCB4E03B1A75476B8D7396C9515
                                                                                                SHA1:5ABBCFE32F3AF0BD53FEB8779D7B959518E119AF
                                                                                                SHA-256:6D51FE711A2EDCE669FD776778B85474085A0F4068ED61802646B6E428B9C9CC
                                                                                                SHA-512:A54504D4B3F7EA491BDF8A02833AE1822B729EB7E0B0F7F41656411D773957E2F1326605D45D5A09007A66113CE4D735B34AB5619EBC82A15FFC730C7506ADA0
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .{\...................{\....R..s....O.1.E.O...........[.....e...z\|\..j.....V......`...P...P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.411243631352237
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/E9:SBtkJ1li6gml/o
                                                                                                MD5:A0E7F0023EFE9D9DA802A0C5A941F8CE
                                                                                                SHA1:E4522C97B99704605469449C21AEEF8E03A0AD3E
                                                                                                SHA-256:756032017E2D9DEB9EC1508DAFB605009EADF6D859FF309BBCD6E49BB2D8D9F2
                                                                                                SHA-512:2B06564FB675F51D96E9945A303D9AADAEABB8173222AC644AC3415D5AC1AEC958D70F651A5C85561CDD79E0F4B713D43117332A8536A251F4FB48800076AB01
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....s...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.905547915629603
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/EZMx/i3:SBtkJYlU8g8l/zZu
                                                                                                MD5:FDA7107459FC09A594A5F3920C0F7DBA
                                                                                                SHA1:9DDCB2E2ECE873608AA43CABA4F145F5568A792D
                                                                                                SHA-256:45D37274BE14BD0B14FA4C0A3BAE888FE0F955E02316A38CD57991AEC296AF00
                                                                                                SHA-512:49ABD03EA512EE4DFAA0A556F94C594A67F94CBD4E3CC79EEB5A742FBBDE6CA2159CBE62765397D48C74CAF1611C7E960C9AEDD83BFB1454B4825775B20C2331
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s..p.a._.G.u.r.u._.I.N...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):121484
                                                                                                Entropy (8bit):4.34897404391638
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:Q5gJ9gqjUu5UyWQae6I5mJUfJU946m3Zb8okMaEc725UMuyeQ2jXc+fxQxc7y0hL:2gJiuaJkJH2L
                                                                                                MD5:774C36C7C26169F949286336BC52C2AA
                                                                                                SHA1:0C5FDB84228C828912C8EF0722C24F524BC557E5
                                                                                                SHA-256:76F7C78A49AC38E8EF210E44800FD25C2D0AB3063E62F70799A0A8DC50B8CE1C
                                                                                                SHA-512:4FD4938E7096D0ECA2B8925575D99750F659BE926F4A49776A209FA92DAE2D416BA99C70D3BAAD97CD2CF1285454D0A038F2C43CE06E8C8E124CDF66118CA18C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .........v...v...........v..R..sKeys.calendar.cf.colAlternate.colBackwards.colCaseFirst.colCaseLevel.colNormalization.colNumeric.colStrength.collation.currency.hc.lb.numbers.timezone.Languages.ach.ada.ady.agq.anp.ar_001.arn.arp.asa.awa.ban.bas.be.bem.bez.bg.bgn.bho.bin.bm.bn.brx.bs.bug.byn.ca.ceb.cgg.chk.chm.chr.chy.ckb.cop.crs.cs.cu.cv.dak.dav.de_CH.dgr.dje.dsb.dua.dv.dyo.dz.dzg.ebu.efi.egy.eka.en_GB.en_US.eu.ewo.fa.ff.fil.fj.fon.fr.fur.fy.gaa.gag.gan.gez.gil.gor.got.grc.gsw.gu.guz.gv.gwi.hak.he.hil.hit.hmn.hsb.hsn.ht.hup.hz.iba.ibb.ie.ilo.io.ja.jbo.jgo.jmc.jv.kab.kac.kaj.kam.kbd.kcg.kde.kea.kfo.kg.kha.khq.ki.kkj.kln.kmb.kn.ko.koi.kok.kpe.krc.krl.kru.ksb.ksf.ksh.ku.kum.kv.kw.ky.lad.lez.lkt.loz.lrc.lua.lun.luo.lus.luy.mad.mag.mai.mas.mdf.men.mer.mfe.mgh.mgo.min.mk.mni.moh.mos.mt.mua.mul.mus.mwl.my.myv.mzn.nan.nap.naq.nds_NL.new.nia.niu.nl.nl_BE.nmg.nn.nnh.nog.nqo.nso.nus.nv.nyn.pa.pag.pam.pap.pau.pcm.phn.prg.qu.quc.rap.rar.rof.root.rup.rwk.sad.sah.sa
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):9100
                                                                                                Entropy (8bit):4.871376882845236
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:QP7fUhtjoHc0tt1vq8jtuyGpmyUBGk6x8iI4/Yu5E:AUYV5jtIeB56+sDE
                                                                                                MD5:EE41A7412A182CB15B38C497674AED2D
                                                                                                SHA1:91DCF8F0CBF98DB8B3A7148E8D963670FE6997B4
                                                                                                SHA-256:CA12C3EC7275BFE5CFCF257B16D832BEA1661FAA549F31F7FC0A11764B537F1D
                                                                                                SHA-512:3BF0064188D4EBB9DA226FE71E0C7C3B28C2F4030AA76D21DCF057B189F644C667DB2A8E63F736BA6E202F4187CC18624C6571D4755B769FC2BCCC14FCF48B3C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...........................R..s..G.F.....E.1...'.(.F...'.A.....'.J.H...'...H...,.,.H...1.H.|...3...'...3.G.H...A.'.F...D.'.H...F...H...H.'.................2...*.(.*.J...'.0.1.J...'.A.1.J...'.F...4...'.H...'...'...,.....'...(.H...'...E.H...(.A...'...(...(.'...*.'...~...*.*.H.E...*.1...J...*...3.H...*.....1...-.(.4.J.....'.3.....2.H.F.J...3.H...'...3...F.'...4.J.F.J...9.(.1.J...B.'.2.B...D.F./.'...D.F.......D...|.H...E.'.3.J...E.E...B...E.J.|.'...E...G.J...F.H.......F...(.'...H.'.1.....H.D.H.A...J./.J.4...~...*.H.......E.'.......F.J.........J.....'...H.....1./.J.....H.1.......H.E.........D.J.....H.3.J.....H.~.'...*.'.E...D...'./.J.:.J...'.1.2.J.'...'.1.E.F.J...'.3.'.E.J...'.3.H.J.J...'.:...E.J...'.D.H...H...'.H.'./.J...'.H.'.1.J...'.H...J.'...'...J.F.J...'...'.F.J...(.'.3...J...(.'.D.F.....(.'.E.1.G...(.1...D.J...(.D.H...J...(.F...D.G...(.H.3.F.J...*.'.,...J...*.G.'.F.'...*...E.F.J.../.'...1.(.../.1...H.'.../.H.'.D.'...1.H.F.......3.'.F...H...3.F./.G.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1626531665973814
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM8E/flMl3ViGj1:Sv1jtBj1
                                                                                                MD5:AAE879C1E1523CD47B76124DFB953F5C
                                                                                                SHA1:9E6F3E4D87189A381EA5CA35148E2BC4C2618686
                                                                                                SHA-256:5AB1E574C48682E6FEEA216E71B16150335EEA3D23AF856A0E6F71CE715DE137
                                                                                                SHA-512:7FF20635476D644CCDF277A9DFDB01DC95FBB46C92C4FD119CEBC16758380935F09B4DD1B6B240E9336465E637AC47CDCA02C32DFC67CA0CCB170B2B17AB89DF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.\/...................\/....R..s....j.V...[/
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1626531665973814
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM8E/flMl3ViGj1:Sv1jtBj1
                                                                                                MD5:AAE879C1E1523CD47B76124DFB953F5C
                                                                                                SHA1:9E6F3E4D87189A381EA5CA35148E2BC4C2618686
                                                                                                SHA-256:5AB1E574C48682E6FEEA216E71B16150335EEA3D23AF856A0E6F71CE715DE137
                                                                                                SHA-512:7FF20635476D644CCDF277A9DFDB01DC95FBB46C92C4FD119CEBC16758380935F09B4DD1B6B240E9336465E637AC47CDCA02C32DFC67CA0CCB170B2B17AB89DF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.\/...................\/....R..s....j.V...[/
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1626531665973814
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM8E/flMl3ViGj1:Sv1jtBj1
                                                                                                MD5:AAE879C1E1523CD47B76124DFB953F5C
                                                                                                SHA1:9E6F3E4D87189A381EA5CA35148E2BC4C2618686
                                                                                                SHA-256:5AB1E574C48682E6FEEA216E71B16150335EEA3D23AF856A0E6F71CE715DE137
                                                                                                SHA-512:7FF20635476D644CCDF277A9DFDB01DC95FBB46C92C4FD119CEBC16758380935F09B4DD1B6B240E9336465E637AC47CDCA02C32DFC67CA0CCB170B2B17AB89DF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.\/...................\/....R..s....j.V...[/
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1626531665973814
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM8E/flMl3ViGj1:Sv1jtBj1
                                                                                                MD5:AAE879C1E1523CD47B76124DFB953F5C
                                                                                                SHA1:9E6F3E4D87189A381EA5CA35148E2BC4C2618686
                                                                                                SHA-256:5AB1E574C48682E6FEEA216E71B16150335EEA3D23AF856A0E6F71CE715DE137
                                                                                                SHA-512:7FF20635476D644CCDF277A9DFDB01DC95FBB46C92C4FD119CEBC16758380935F09B4DD1B6B240E9336465E637AC47CDCA02C32DFC67CA0CCB170B2B17AB89DF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.\/...................\/....R..s....j.V...[/
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1626531665973814
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM8E/flMl3ViGj1:Sv1jtBj1
                                                                                                MD5:AAE879C1E1523CD47B76124DFB953F5C
                                                                                                SHA1:9E6F3E4D87189A381EA5CA35148E2BC4C2618686
                                                                                                SHA-256:5AB1E574C48682E6FEEA216E71B16150335EEA3D23AF856A0E6F71CE715DE137
                                                                                                SHA-512:7FF20635476D644CCDF277A9DFDB01DC95FBB46C92C4FD119CEBC16758380935F09B4DD1B6B240E9336465E637AC47CDCA02C32DFC67CA0CCB170B2B17AB89DF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.\/...................\/....R..s....j.V...[/
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):140
                                                                                                Entropy (8bit):3.6172901478789785
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlyFgmlvlN/eeMKlVj7bmwRmKlMl/FzLDolB3Bf:SvmgoC+AeWl+D3J
                                                                                                MD5:C9AD04416D48F3F3DA6EDE6BF0DE3140
                                                                                                SHA1:9E71BD328567ED1326639D020FC3521367901F94
                                                                                                SHA-256:29090AF3B728DD6D613B3C0C5269DBF7127B38F9B88F57F5131F7EA282735785
                                                                                                SHA-512:D8AB2C3AA6F4B163C3FB38E0C9CE4787BE312CC84B9B6A38CC30327CFE651C47DE79E02CE604BFA8A3572134BA4540823C2907727FACD6EB9EEBE4DB9CF2C430
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..I....................I....R..s..s.w.a.h.i.l.i. .(.R... .D... .C.o.n.g.o.).....*.V..I.I....V......P.4.`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):196
                                                                                                Entropy (8bit):4.611742020142585
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlvjlsqEblPp/EXj+JtzeDsH/LEZRtnHC+KgkiblFilF7xFUT9OrD7ATd:Sv6qE8uzew4vc+7koFGTCT9PE8v
                                                                                                MD5:E79BF68AFC384525C535D2D648FDEAEE
                                                                                                SHA1:9B2F0600AFA8E647142230547D1B203F0A2A5AE2
                                                                                                SHA-256:51A9BFAD37156747790AEC44BFE76A0C5B5ED341741AE6DE1427FB181E51E3D0
                                                                                                SHA-512:7EDBC482544BCBFBB5CE0430495779C7D87DB572A7CB3F92FDB1390F8DEC3B0FB92D0AE0EACDE00A414A7B9ECE2401E4A3B1B4CF5ECE5C982C79900E5D431786
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................".. ........)...)...............R..s....../d........{.{.{.......".e!..n!....t....................A.`e!.`...`r..`...`...`...`.m.`L..`...P..V.^..........`... ...P...P
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):22184
                                                                                                Entropy (8bit):4.731542920391909
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:oAjeRYOPIl3aQ9tRp0/cxsT9Pa2E5Xf+Wf+xCYt7:oAUYj99tRpKcxsTVa2E5v+Q+xCYV
                                                                                                MD5:89FB6F6C53679CFD7F8EC70353D62535
                                                                                                SHA1:21C9512F826AA841C28615008309931E67DF2E8E
                                                                                                SHA-256:B85FCD2EC5B4045C9621A9A887B7ED5E06D3545352744ABFBEE9F9AE12AB0408
                                                                                                SHA-512:A4A52015C9E859A2E55DF6FA9A3AC37BBE6985610662EC5F5738D33CA452F8CA745DC90F62DCC2F7B830B09254C4F74A85CD3EB6BE9A8D736D0B69A56CA1465C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .<......................4...R..s..2.C...O.>...:.>.<...<.@.>...A.O.=...M.2.5...B.L.O.?...3.0.=.L...3.1.0.O...4.0.7.0...:.0.9.0...:.8.3.0...;.8.A.C...;.>.<.0...<.0.9.O...=.>.A.C...B.8.2.8...1.0.<.C.<...0.G.>.;.8...1.0.D.8.O...1.5.4.6.0...1.8.;.8.=...1.@.0.C.8...1.C.E.8.4...4.8.C.;.0...7.C.=.L.8...:.0.4.6.8...:.0.@.8.1...;.0.=.3.>...;.0.=.=.0...;.5.?.E.0...;.C.E.L.O...<.8.5.=.5...=.L.>.@.>...?.>.8.A.:...E.0.:.:.0...E.0.=.L.1...:.0.9.N.3.0...0.:.>.>.A.5...2.>.;.5.0.8...4.6.5.@.<.0...:.0.9.B.E.8...:.8.:.C.9.N...;.0.E.=.4.0...;.8.F.8.0.=...=.N.9.-.H.C...>.A.5.4.6.8...?.0.3.A.?.0...?.>.=.0.?.5...A.0.@.0.B.8...A.8.4.0.<.0...A.;.5.9.2.8...A.>.@.0.=.8...B.C.@.>.9.>...E.0.=.C.=.C...G.6.C.0.=.L...G.6.C.8.=.L.....8.=.L.8.=.L...'.0.A.B.=.>.5...0.9.=.A.:.8.9...0.@.0.1.8.F.0...2.0.9.A.:.0.O...2.>.4.A.:.8.9...3.>.B.A.:.0.O...3.>.B.A.:.8.9...3.@.0.=.B.E.0...4.0.B.A.:.8.9...4.5.7.5.@.5.B...8.=.C.?.8.0.:...:.C.B.5.=.0.8...<.M.=.A.:.8.9...=.N.=.>.@.A.:...>.4.6.8.1.2.0...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):10204
                                                                                                Entropy (8bit):4.852425927529368
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:kkHm5ZyMjyyJ4U1WOo8qCFuIjZdR/77J/ig8iI4CmKBO:kkHILJBho8qC3ZbvJ/ig8soO
                                                                                                MD5:DCD011C3A56643E59D0CEA477B271AC5
                                                                                                SHA1:4F0EE664AF28C2B4576B01CD55DFEF47F839AEEF
                                                                                                SHA-256:026667604E035B3AA364E193CAB04D74DDA68164EB4A64AD86960666D4955514
                                                                                                SHA-512:53FC453AEA2CD467D84BD9D74312596429F9025D760E8A842AB8EDD29FC54ECC237993EF12FCCD9467252B86DDDCFE2445A294F7333F1AE03C910EAD515E261E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................R..s..........E.1...'./.H...'.3.H...'.J.H...(.D.F...(.F.J...*.1.....,.J.2...1.H.'...1.H.}...3.G.H...3...H...A.,.J...A.F.4...E.D.J...F...H...J./.4.....J.........'.......F.......J.......H.....4.J...*.'.E.D...*.D...H...D.'.&.H.....'.&.J...".&.1.4...'.2.(.....'.2.1.J...'.A.'.1...'.F...4...'.J.(.F...'.J.A.....'...'.F...'...(.H...(.'.D.J...(.1.E.J...(.4...1...*.E.F.J...*.J.'.~...*.J.*.E...*.J.3.H...*...1.J.....'.3.J...2.H.F.J...3.'...'...3.'./.J...3.3.D.J...3.F...J...3.J.F.'...4.'.E.J...B.'.2.B...D.F...'...D.H.2.J...E.'.1.J...E.H.3.J...E.H.F.....E.J.*.'...E.J...E...F.'.&.H...F.H.H.J...F.J.H.1...G.H.~.'...H.D.H.F...H.H.D.A...H.J.D.4...~.1.4.F...~.D.H.F...~.H.D.4.....'.F.'.....E...'.......J.2.........F.....J.F.4.....'.E.F.....1./.J.....1.J.......D.H.F.....H.1.......H.1.H.....H.E.J.....H.E.......~.J.D.....H...F...'.H...J.'...(.F...D.'.....F.'...'...".&.J.F.H...".3.'.E.J...'.1...F.J...'.D.H...H...'.D.J.H.}...'.H.'...J...'.H.J.1.3...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9323076876404954
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMVlEmt6E7lVjo:Sv5mt6gu
                                                                                                MD5:7A89E9A370E8D0E313BA5AA754E5C449
                                                                                                SHA1:A496DD9BD098B73B616735A39F7C1D89090DB418
                                                                                                SHA-256:D7E1DF633942F0A1FE760B0FEA2D4D152F79D98369D85E5B1EBDB4F7B82ABFE5
                                                                                                SHA-512:3CF2B4B5EF0129B38FBC0FD7D951A01057155A063918F3294E172F295179E1F09F8A2DBEB78A4D6981F71D1BFE63ACF5491E4C670696B71F3A8E6F5EF7C8A519
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..L....................L....R..s.......L
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):888
                                                                                                Entropy (8bit):4.2198271209621385
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:YpamSuWfhXmwTg/PxoAIn5n09HDCxIIvYDrSo:YplSpfhXmYg/PxoAI5n09HDC6fl
                                                                                                MD5:65871B9CAD3C2BDBCA7CC20611513271
                                                                                                SHA1:527C21E819BEC5CCE74684249E609898F84C6B79
                                                                                                SHA-256:29485F790CCD21207071AC3D258BA22E7137884CF67364DE30D3A9A8DF641D27
                                                                                                SHA-512:517169C6EFE007CB9F19A438EBCA124798C5A45393BC315162D2F2CADE47685CAC0A58A47D68492D05492BF9EC603E967A34C6D7FDD392863590496A6FD9C893
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..T.............-......T....R..s..T.a.k.a.n.t...T.a.x.m.i.r.t...T.a.z.u.l.u.t...T.a.[.r.a.b.t...T.a.c.i.n.w.i.t...T.a.f.u.r.s.i.t...T.a.g.r.i.g.i.t...T.a.h.a.w.s.a.t...T.a.h.i.n.d.i.t...T.a.l.i.m.a.n.t...T.a.m.h.a.r.i.t...T.a.n.g.l.i.z.t...T.a.t.a.m.i.l.t...T.a.t.c.i.k.i.t...T.a.t.u.r.k.i.t...T.a.y.r.u.b.a.t...T.a.b.l.c.a.r.i.t...T.a.b.n.j.a.b.i.t...T.a.b.n.c.a.l.i.t...T.a.b.u.l.u.n.i.t...T.a.b.[.m.q.i.z.t...T.a.h.n.c.a.r.i.t...T.a.n.i.b.a.l.i.t...T.a.s.u.m.a.l.i.t...T.a.b.i.l.a.r.u.s.t...T.a.b.i.r.m.a.n.i.t...T.a.f.i.t.n.a.m.i.t...T.a.h.u.l.a.n.d.i.t...T.a.j.a.b.b.u.n.i.t...T.a.s.b.n.y.u.l.i.t...T.a.s.h.e.l.%.i.y.t...T.a.t.a.y.l.a.n.d.i.t...-.@...[.......*.7.B.X.o.....@.....'.........D.Y.......0.[.........A...M.............H.F......T.T.TtU$U8U.U.T.T.T.U.T.T.T.TVU.T...<.Uc6.T...<.U`U.U.UBULU.<...T.UjU.).U.U.U.)...U.U.T.T..j...V....`5..P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9059918981668114
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMIl66E7lQ/S5rn:Svh66gQU
                                                                                                MD5:99429A48939E3A225D47899070309528
                                                                                                SHA1:36A1F05D4FCCF23B1BA16BD50E95AFAE57C50C09
                                                                                                SHA-256:FA96AEAB1127F8C3AF7390DE4E541F58C54BF15C3F6710613FED47ABE3AFA9BA
                                                                                                SHA-512:C704259C73F1F7F75BFDDAB84C0B7B1342623DC13AC03212F05A130BE3CB91737FD770842D5CA97E4065BE4E677CA3CD8994D6B00A9C510B91486CC5B4C5877C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....V...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):10896
                                                                                                Entropy (8bit):4.223066769778727
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:RFpdaY3LzattteIemLMdOx4owEgBZ6mAYHo4Jxala8UNL:REY7zWtNeiMdW4oqeIosxala8Ud
                                                                                                MD5:C79DED5764E47E5337B4DE89CF3391FA
                                                                                                SHA1:F11701CD08D048BB3425CE00588F41DC9D3BBCEA
                                                                                                SHA-256:E688614AC9658237F3622F69BACB65363B39715F0B2EEF78395B49DC60F76281
                                                                                                SHA-512:5A2F35D6DEEEE49A39D6327D0317B0285C601E97274A81B5CFE4AC8E4F1B9C841FA5BF242111CC1FFBD8370E5FCCF1A8C086712CA05E0249950F45E40CE5B2C9
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................q...R..s..B.o.p.o...E.e.w.e...G.u.r.u...H.a.n.i...J.e.e.g...J.i.g.a...L.a.o.o...T.a.a.y...A.g.e.e.m...C.h.a.g.a...D.a.a.n.a...E.m.b.u.u...F.a.a.y.i...J.a.a.m.o...J.a.k.m.a...J.e.j.e.n...K.a.a.k.o...L.u.h.y.a...M.e.e.r.u...R.a.a.w.a...R.u.u.s.h...S.a.a.q.a...S.a.r.m.a...S.e.e.n.a...S.o.o.g.a...T.e.e.s.o...U.r.d.u.u...Z.u.u.l.u...C.a.r.a.b.i...G.i.r.i.i.k...A.s.e.e.r.i...A.y.r.i.s.h...B.a.f.i.y.a...B.a.s.q.u.u...D.u.a.a.l.a...F.u.u.l.a.h...F.u.u.n.j.o...G.a.n.d.h.a...G.u.u.s.i.i...H.a.m.o.n.g...H.a.w.a.a.y...H.o.o.s.t.a...J.a.r.m.a.l...K.a.a.m.b.a...K.a.s.a.a.q...L.a.a.n.g.i...L.u.w.a.d.a...M.a.l.a.a.y...M.a.n.k.i.s...M.a.s.a.a.y...M.e.e.t.a.a...N.u.w.e.e.r...R.u.n.d.h.i...S.h.i.l.h.a...S.h.o.o.n.a...T.a.a.j.i.k...T.a.a.t.a.r...T.a.i.i.t.a...T.a.m.i.i.l...W.o.o.l.o.f...L.a.a.t.i.i.n...A.x.m.a.a.r.i...B.a.a.n.g.l.a...B.a.s.h.t.u.u...B.i.r.i.t.o.n...B.o.o.l.i.s.h...F.a.a.r.i.s.i...F.a.r.o.w.s.i...H.a.n.g.u.u.l...K.a.b.a.y.l.e...K.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):10552
                                                                                                Entropy (8bit):5.481790059993295
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:TzpGQ/KrMsklUEhe4AgcETZ5lb/X/Yepwn0GK7lE:X/j84Zf/XgUiRSlE
                                                                                                MD5:92476709B9A64A0E58E9583DBF972935
                                                                                                SHA1:B145EF35285D2A078B8AAC8FB7AEB2F44DE78E6E
                                                                                                SHA-256:B2DDA09C087E38D771A63333BBC8910B8DFEA0D2C688A0FF5791B84A3F16AEF1
                                                                                                SHA-512:A154D280A7ACA93287F89C2011E51D103C03CE4FC1100D602382046B33B49DBD468ECFE22579BB8D908F6C236F17826EF8A44C4211B9871C050237F7283A760E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................2.. .L......F...F.........L.....R..s.._.C...c.c.p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
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.8579990406079685
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/ERlSU5YMi3:SBtkJYlU8g8l/6/5YMu
                                                                                                MD5:A15124D06FD24A4A238B2EB31920CF34
                                                                                                SHA1:AD43C7F01AE88C5BBA503E599CEDE23898ED674C
                                                                                                SHA-256:E1348D8D920E82A1D6C023A8F2D6A22DD87F0F22CF4DDE990D52A08105EAD5FC
                                                                                                SHA-512:DBA7DD33AA90BDF0CD1F6528A9E6AA30A56930744E917AE70B6755C48611F3FCBA311914BD53FC546E569A231908052CEE302FF50FE37CF90174973DEC0449F5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s..s.r._.C.y.r.l._.B.A...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):144
                                                                                                Entropy (8bit):4.712820713570597
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tln0sthjljl/y/Vidi5tmpaPhYAD7i3J7neEIRF:Svkswh5tegiFnezj
                                                                                                MD5:6784226232236569B7296713F1858249
                                                                                                SHA1:C43FC2D97DD78D8E097447C463FF0CEE8004F5BE
                                                                                                SHA-256:0A7C74E48E8DBD95E94E8B017D204A9C04073836B7D052B50AE5B7E257EE490E
                                                                                                SHA-512:4B92CBB1E77AC89E6F3B9534F11166541D0DA9E76F669C61F88A12718015F58AD5054F1FC131BE58C27445EC6B1D868CE154248C33B3125D75B3051B44EE81AC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .h....................h.....R..s................z...H...8.j.}...fG.L.N.%...........a...g.}.....V......P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.8779990406079685
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/ERlSU5Wul/k/3:SBtkJYlU8g8l/6/5Wutkv
                                                                                                MD5:66806A37CE763270B3A15362E29C0DCA
                                                                                                SHA1:E573AD547E059776C19D58B72E8C9CD375D6969D
                                                                                                SHA-256:B0E0D0CA4AE4759F834840A0507CE38B2E0312610AF678974EF669A8A23B5DD4
                                                                                                SHA-512:CACF1BEC380379A5944A02B298AFE4C5D114D6DD1DEF785B43274366C362AA936A6F564A6E6A8A7704DD4ADD2E1868E9103C0645C2C5587CA03CF4D9A882C35F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s..s.r._.C.y.r.l._.X.K...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):188
                                                                                                Entropy (8bit):3.5488868316723865
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tldF+lE/ll03098lXlhfkWVtP5T86Hts1so0AUlyt2lH9Kl1d:SvOlfu0Xr3Vl5Tng67i2avd
                                                                                                MD5:F16147C91B5B9ED819C0BC42667B4144
                                                                                                SHA1:4A1DD125B5B4523E0ADD16EC5318642A03607170
                                                                                                SHA-256:49EF275FD720F8A6326BA408E726F15D45DD66CE03A82777E1B2E29C30C1A97B
                                                                                                SHA-512:3D3E1522BDAC78A1925036CFC805B7DF065234C0184933ED9EA6355D944A68750733625E2F5770FF741221095732BBF6EAA9C88DF1CE4738166F172BADA19605
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................ .. .\/.....'...'.........\/ ...R..s..t.i.d.s.z.o.n...k.i.r.g.i.z.i.s.k.a...p.e.r.s.i.s.k.-.a.r.a.b.i.s.k.a.......]/....e/..e.p/........V...%..P(..P+..P[/.`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):13012
                                                                                                Entropy (8bit):4.562190553715316
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:CyTFRPBRgfVOroQYzUak2E6uvmDw/CkG2HprJZV8D/ib40uO6vCKq9c:CMFRiVOroQYze2E6EmDw6IHplZiDz0J2
                                                                                                MD5:804938AA06806DF4F177526C7B8A8C07
                                                                                                SHA1:257C7D7986B4CDDB6FF48C0E5DEF89EAAB55947E
                                                                                                SHA-256:8E4E4FB04850ACFD87BEC9893EA7BF29541350C24CE966E593CC7298FB495901
                                                                                                SHA-512:04041E965DDD43891A9DE5A6B81A092B8EA3F8558163E91F8F9E5CAA37D5855CFCAC1B61B5FCE68B3676E6A69E2DB9FFD8F804E5728EAA828F457F3966F32E96
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................q...R..s..K.i.a.s.u...K.i.e.w.e...K.i.f.o.n...K.i.h.a.n...K.i.k.o.m...K.i.v.a.i...K.i.y.a.o...M.y.a.m.a...K.i.a.i.n.u...K.i.b.u.l.u...K.i.e.m.b.u...K.i.f.i.j.i...K.i.f.i.n.i...K.i.h.i.t.i...K.i.i.b.a.n...K.i.j.u.l.a...K.i.k.o.m.i...K.i.k.o.r.o...K.i.m.a.n.x...K.i.m.a.r.i...K.i.m.e.r.u...K.i.n.a.m.a...K.i.s.e.n.a...K.i.s.h.a.n...K.i.s.o.g.a...K.i.t.e.s.o...K.i.j.o.j.i.a...K.i.l.a.o.s.i...K.a.l.e.n.d.a...K.a.r.j.a.l.a...K.i.a.k.a.n.i...K.i.a.k.o.l.i...K.i.a.r.a.m.u...K.i.a.v.a.r.i...K.i.b.e.m.b.a...K.i.c.h.e.k.i...K.i.f.a.r.o.e...K.i.f.l.e.m.i...K.i.g.a.n.d.a...K.i.h.a.w.a.i...K.i.j.a.l.u.o...K.i.k.i.s.i.i...K.i.k.o.n.g.o...K.i.k.r.i.k.i...K.i.k.u.r.d.i...K.i.m.a.l.e.i...K.i.m.i.s.r.i...K.i.m.o.n.g.o...K.i.n.i.a.s.i...K.i.n.i.u.e.a...K.i.n.o.r.w.e...K.i.r.a.n.g.i...K.i.r.o.m.b.o...K.i.s.a.n.g.u...K.i.s.k.o.t.i...K.i.s.o.t.h.o...K.i.s.w.a.t.i...K.i.t.o.n.g.a...K.i.v.u.n.j.o...K.i.y.i.d.d.i...K.i.l.a.t.i.n.i...C.h.a. .j.a.d.i...K.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):22048
                                                                                                Entropy (8bit):4.647099492702514
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:e8hupi1Jb+CmD8MmuI8gbq/2CJFWgCdr3P7nT/gXbyb4jiYjOAnOH4nSbQirXOWP:e8hR1JbLmD83R5bKCdkOsjQxbQire9PA
                                                                                                MD5:486E5CE7C7A4F22A67EBE6594B253688
                                                                                                SHA1:E8F529F28A24CDB7FD3205DF56CAB5139172F1D9
                                                                                                SHA-256:6DEED9C5BE6C536E49FB4624DDDAF329A055FE072717BA061443BC4044FCF2A1
                                                                                                SHA-512:235B42E1FE26F18726143B8BCB0A5CB647F03F405FB09CEADE09B411A2ACAF9FE4A9594DDD5AEDD544F90C7DDDD4F8622078FFC83A1D37BF17EDD575D28A765A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................l.. ........................C...R..s....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):284
                                                                                                Entropy (8bit):5.798176336157329
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SvKgeWt5AvxROtZxCt83DFxTZN6M46izrxZiYtXl03Qf:jgeWt5Av8bZNiJzrHiYtXS3Qf
                                                                                                MD5:C7A09ED3C5AC1866BB6545BB7EDE628A
                                                                                                SHA1:7254D148502925A8EAC1FF9783CF1567215253F5
                                                                                                SHA-256:B389A5D1AF38E0A37D2571B4C402840BEB1145470C4A9C877709C01B5F891AED
                                                                                                SHA-512:B02847C320DA6452DDCA4686D274B159A451E894A733981CEA1C91CB66F6B19A33A1508B45030ED2E77282263A1FA683F04BEAE8D3A985781B813E88D81A7B6B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................;.. ........?...?...-.......;...R..s..K.i.t.e.s.o...-.@...[.......*.7.B.X.o.....@.....'.........D.Y.......0.[.........A.M...............H.F........#..G.G.#.#.H..2.G.......0.\...G....|G..s0..]#i0K0A0..}0R....#.....G.#.0...\.#..........V......P...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.411243631352237
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/E9:SBtkJ1li6gml/o
                                                                                                MD5:A0E7F0023EFE9D9DA802A0C5A941F8CE
                                                                                                SHA1:E4522C97B99704605469449C21AEEF8E03A0AD3E
                                                                                                SHA-256:756032017E2D9DEB9EC1508DAFB605009EADF6D859FF309BBCD6E49BB2D8D9F2
                                                                                                SHA-512:2B06564FB675F51D96E9945A303D9AADAEABB8173222AC644AC3415D5AC1AEC958D70F651A5C85561CDD79E0F4B713D43117332A8536A251F4FB48800076AB01
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....s...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):7692
                                                                                                Entropy (8bit):4.796322836638135
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:PQM4Kp3t925Ir6GwuPt6oFOo00kp1roug8Ja/cetkriedVXWOEgVobRpt:PQTKp3+A69uDgKkpacPbddWGyTt
                                                                                                MD5:D86F82633086F6653282898C71CA1D9A
                                                                                                SHA1:2915C9E959A5D61AB0D69320558E1D6765250EF7
                                                                                                SHA-256:6EB7787CDD1B547E12B871AB2C643CA06CA25BEF8D05C1BDA01F7A4717CC0799
                                                                                                SHA-512:F791F0AF84D08989E7CBF5E184012333AF38A3A7DED413D0C7C6B8339B3C93B7470FD06E50EDB1953B1B148A4AC78C53A7EAA49C5B250F7D0B90240C82AF6590
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................k.. .\......{...{...-.....\.f...R..s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
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.925547915629603
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/Egl6lwl3l/i3:SBtkJYlU8g8l/Dl6K/u
                                                                                                MD5:A32CF3695027572FBBB3676506E21897
                                                                                                SHA1:EBDBD013BC651EE05A5B28DF31EA4B9E4FEBBD71
                                                                                                SHA-256:51D0D1CCEEA79E7FBF0D679BB3570B8EB10AD9D9B44A687197CFC540DFA26796
                                                                                                SHA-512:E5CE86F52CCB1B77CC53D68C421DD19BAF79AF7AC2AA7181737A93900D4BC463EC0CBDB582EDD3A87687B55E03775A7CB6DDA55137C7900829DE2754A7B011AE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s..u.z._.L.a.t.n._.U.Z...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):31176
                                                                                                Entropy (8bit):4.660094340995951
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:v/dvgQPa9mvYvTqeyyxqselsgM+LeYa7u4bc8zq2p5oK8S1Pm4MuaLWvTjRqU3Fq:vlvgQlYDH1MeLq492U5oSR5W6ymqx6T4
                                                                                                MD5:B7B06373C3013F642CA12338782065D9
                                                                                                SHA1:3392B47820E92430656DD73217A67C8325C003E6
                                                                                                SHA-256:58CE9110E0501D7EF9B687BFC0EC8FE867664100023D87769BFD361422F0CADB
                                                                                                SHA-512:EF9EB18BAA3DB08B6B7B8056CA36334509C25E47B9CAE60206203DA5A5A10D43BC17CCD253EDCD86ABE728CFD3E9B95E247972E87C03FE760F1049BE19BBAEA5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................V.. .h......j...j...)..........R..s..S.....A.d.l.m...A.g.h.b...B.h.k.s...D.o.g.r...E.l.b.a...E.l.y.m...H.a.t.r...L...c.h...M.a.h.j...M.a.k.a...M.a.r.c...M.e.d.f...M.u.l.t...N.a.n.d...O.s.g.e...P.a.u.c...Q.a.a.g...S.i.d.d...S.o.g.d...S.o.g.o...S.o.y.o...W.c.h.o...Z.a.n.b...B.A.R.L.A...C.O.R.N.U.....a. ...m...A.O.1.9.9.0...A.R.A.N.E.S...A.S.A.N.T.E...A.U.V.E.R.N...C.I.S.A.U.P...C.R.E.I.S.S...C.h... .D.i...G.A.S.C.O.N...G.R.I.T.A.L...H... .m...t...N.I.C.A.R.D...U.N.I.F.O.N.......n. ...m...A.K.U.A.P.E.M...B.A.L.A.N.K.A...C.h... .S...p...C.h... .H...n...C.h... .L...o...C.h... .V.a.i...G.R.C.L.A.S.S...G.R.M.I.S.T.R...H...n. .l...m...L.E.M.O.S.I.N...M...i. .g.i.....P.R.O.V.E.N.C...T.i...n. .t.....{.0.}. .n...t...I.J.E.K.A.V.S.K...B.A.S.I.C.E.N.G...C.O.L.B.1.9.4.5...C.h... .B.a.l.i...C.h... .C.h...m...C.h... .H.a.n.b...C.h... .J.a.m.o...C.h... .J.a.v.a...C.h... .N.. K.o...C.h... .O.d.i.a...C.h... .T.h...i...F.O.N.K.I.R.S.H...G.i...n. .t.h.....I.V.A.N.C.H.O.V...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):12684
                                                                                                Entropy (8bit):6.787165028955761
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:zU21Sr+dcpQdxO1wqsLGPWl0skTu7N9OrZ3Ta/HvRH0aFSUB:zxYm7dxOwGuyk/PdzJB
                                                                                                MD5:EC54D352E1595EF0AFA846E478726AC8
                                                                                                SHA1:3E54BE34AF6225780594917FF112F31AAF434B20
                                                                                                SHA-256:8B49DCBA77A78A888AD07872DB057C32BA5D8EB51AAABA2B10B9179CC1347380
                                                                                                SHA-512:BA1C5B7B82A5DCDEB9B082441768DD370A7DC19AE934E0C607A81B913CA7F2065395E28C31F7B6715A6FE9644F1A492F5D2897F5902E1A4CF72CFC6D82D95F92
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................G.. ........[...[...[...........R..s...e.e...e..0N.e..[O.S...O.e..hQb_..lQ6R..lQ.S...Q.S..`S.e...S.l..4T....X.e.._[.e...[.e...c.e..pe<P...e:S..Il...Xn...vt.e..5u.....{SO...|...A~SO..,..e..'..^..c....._.e...\..e...](..e....8u.e..(....e..l..l.e...NaS.e...N(u:S...NLu.e..9N...e..LN...e...NU..e...NP..e...O.Y.e...O.^.e...O.s.e..[OW..e...P.T.e...P.b.e..KQ..e..pQZS.e..pQ.].e...Q._.e...Q.\.e...Q.c.e...R.g.e...R.e.e...R.~.e..WS.\.e..ZS.Y.e..aS.Y.e..aS.Z.e..aS.^.e..aSwc.e..aS4t.e..aS...e..bSeY.e..bSRf.e..bS..e..pS<\.e...S...e...STX.e...TyQ.e...T...e...T._.e...VE..e...VbS.e...W.Q.e..-WQY.e..NW.R.e...WpQ.e...W.~.e...W.R.e..GY.R.e...[aS.e...[.[....[...e...[.b.e...[yr.e...[.V.e...])R.e...^.t.e..r^...e...^.Y.e..i`.^.e..NbNb.e...byQ.e...b...e..wcKQ.e...c+Y.e...c.Y.e...d.N.e...e...e...eNm.e...e.b+Y...e,g.S...f.R.e...f.\.e...f...e...g.T.e..1g.b.e...g!X.e...g.^.e...g.R.e...h.P.e..9h.....Qh.S.e..Qh.b.e...h...e...j.~.S..'k.u.e..Lk._.e...k<\.e...k.g.e...k)R.e...l
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640495
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMu86E7lb1y:Svd86gRy
                                                                                                MD5:6A7D6D2ED1DAC4F1FC3433AF4AD9EA61
                                                                                                SHA1:72AC982A0486B52D53A67CDD50C8D0072128202F
                                                                                                SHA-256:AC05B5309D3D2D1ED26197B7387015779873FE5AD798D11AAFB24883293998FD
                                                                                                SHA-512:C8AA478ACB70DC1F0FFE948CC8AEB075FCB3FA01E927B8C2554DAA6D305FE956BED73E55ADB129C2071DC70DE4AC1CF82826AE90CA2EE20F3BB5DF5051C66100
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..W....................W....R..s.......W
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.162653166597382
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMullNiHyC:SvdXC
                                                                                                MD5:F7824A6561441504F1ED9A2CF43149F2
                                                                                                SHA1:EC9E05A4DA7636FB737666D40461FD8447F0849E
                                                                                                SHA-256:849C7B03350D7AD6191B21CB38AE728D7469A2C7B2B51611C21A4BC9FF2FCCF4
                                                                                                SHA-512:872C2196F54F0C87844CD75E6878385D4BB821EE5431BFDB5DA7B7BE0821EE1758D285573D798B1C3508D41C8AE4CD3E66CFD8D5F086E3BA5D3F5F8075CD2A6C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..W....................W....R..s....j.V..W#0
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.411243631352237
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/E9:SBtkJ1li6gml/o
                                                                                                MD5:A0E7F0023EFE9D9DA802A0C5A941F8CE
                                                                                                SHA1:E4522C97B99704605469449C21AEEF8E03A0AD3E
                                                                                                SHA-256:756032017E2D9DEB9EC1508DAFB605009EADF6D859FF309BBCD6E49BB2D8D9F2
                                                                                                SHA-512:2B06564FB675F51D96E9945A303D9AADAEABB8173222AC644AC3415D5AC1AEC958D70F651A5C85561CDD79E0F4B713D43117332A8536A251F4FB48800076AB01
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s....s...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.925547915629603
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/E7Rysh3:SBtkJYlU8g8l/A9
                                                                                                MD5:213DE4A1ECC8A496153A51F4B2D263DB
                                                                                                SHA1:378FAE5458D865287F39894A67342711FD28EF45
                                                                                                SHA-256:6C119D44F243C92115286A9A360648640C7CEB0949EEAD9CD823202168389606
                                                                                                SHA-512:A09E5EACB5F967884DCBB23722DE3AEBEFB976971911F4D330CE9F9A1DBFB60A9560EC6BA4C7D1CF4DA7D0B6BE389484717B55B65D3AC6AA12136E1109835E7C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................R..s..z.h._.H.a.n.t._.M.O...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):10896
                                                                                                Entropy (8bit):4.848304799348323
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:EFugFaBLsBkqhFjbD/uZnxd4q6DN6W+qG0RxKw5jmieQ3IXkkHJ61D:cuiiLseiFfD/u5xd4q6DN6W+uRxKRyYc
                                                                                                MD5:D04534CBE1DF91398D60A89FEB773C3D
                                                                                                SHA1:FB1E3D2FCBE3D83B70344F0445973F5DE4449096
                                                                                                SHA-256:788C5AA080BCD6296C7F8F980A37524D449A71F5D6736E9DB9D8B1D5AF2FE9A7
                                                                                                SHA-512:7CBF63A16B0A063D5BE87526AF58A844DB2A0CEF27463C2A01F852CDFB2138F5E0941C146676F5BD02054CEA095E60E7683E3857E758E58EBBCF9D95628803EB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................`...R..s..I.-.B.G.N...i.s.i.-.H.a.n...i.z.i.m.i.l.i...o.k.o.s.i.k.o...i.s.i.-.T.h.a.i...i.s.i.-.A.k.a.n...i.s.i.-.I.g.b.o...i.s.i.-.M.a.r.i...i.s.i.-.U.r.d.u...i.s.i.-.G.r.e.e.k...i.s.i.-.T.a.m.i.l...I.k.h.a.l.e.n.d.a...I.k.h.a.r.e.n.s.i...i.-.E.n.g.l.i.s.h...i.s.i.-.G.u.s.l.i...i.s.i.-.I.r.i.s.h...i.s.i.-.K.o.n.g.o...i.s.i.-.M.a.l.a.y...i.s.i.-.W.a.r.a.y...{.0.}. .. .A.l.l...i.s.i.-.A.r.a.b.i.c...I.z.i.n.o.m.b.o.l.o...U.l.i.m.i.:. .{.0.}...a.m.a.s.i.m.b.u.l.i...i.s.i.-.A.z.e.r.i.a...i.s.i.-.F.r.e.n.c.h...i.s.i.-.G.e.r.m.a.n...i.s.i.-.K.y.r.g.y.z...i.s.i.-.N.e.w.a.r.i...i.s.i.-.P.o.l.i.s.h...i.s.i.-.Y.o.r.u.b.a...H.l.e.l.a. .k.o.n.k.e...i.-.F.u.l.l.w.i.d.t.h...i.s.i.-.A.l.b.a.n.i.a...i.s.i.-.A.r.m.e.n.i.a...i.s.i.-.B.e.n.g.a.l.i...i.s.i.-.B.u.l.g.a.r.i...i.s.i.-.C.h.i.n.e.s.e...i.s.i.-.F.i.n.n.i.s.h...i.s.i.-.G.a.l.i.c.i.a...i.s.i.-.H.a.i.t.i.a.n...i.s.i.-.K.o.n.k.a.n.i...i.s.i.-.K.u.r.d.i.s.h...i.s.i.-.P.e.r.s.i.a.n...i.s.i.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2808
                                                                                                Entropy (8bit):5.678019583191219
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:rcHAlKB1d8GlD48r0l/gh454L0cl4LcBXqhuH/HyJ2JO6HmXdm5:ggWVm8gdsdl4wXqT+OQ95
                                                                                                MD5:B7A53C5BF8FFFEBD3B3A3575E406F2AF
                                                                                                SHA1:EBB6199CADAE6F12F9C4714B28115FEEDB277B61
                                                                                                SHA-256:CD084B89A2E2A83CCC11D876DAAE11FF1D0366B8F67A4DEC2EDFBE0716C3C531
                                                                                                SHA-512:C6FB7908DCCC1BD3B14FDEF7A3AB97DFBC6BD2078DC35E17D1CC8C5D5EC799DA3C544B0F8469DDB054DA33532FB963F11CA85331FE413D1C9A14887A1006334F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................+................M.e.y...Z.o.m...A.o.g...J.o.l...J.o.n...O.r.a...A.l.a.h...A.l.a.k...A.l.a.r...J.o.n.a...Z.o.m.a...A.n.i.o...A.l.a.t.s...J.o.l.a.y...A.n.d.r.o...O.m.a.l.y...T.a.o.n.a...A.p.r.i.l.y...M.a.r.t.s.a...V.o.l.a.n.a...A.l.a.h.a.d.y...J.a.n.o.a.r.y...O.k.t.o.b.r.a...M.i.n.i.t.r.a...A.l.a.r.o.b.i.a...A.s.a.b.o.t.s.y...D.e.s.a.m.b.r.a...F.e.b.r.o.a.r.y...N.o.v.a.m.b.r.a...S.e.g.o.n.d.r.a...A.l.a.k.a.m.i.s.y...A.o.g.o.s.i.t.r.a...S.e.p.t.a.m.b.r.a...H.e.r.i.n.a.n.d.r.o...R.a.h.a.m.p.i.t.s.o...A.l.a.t.s.i.n.a.i.n.y...A.l.o.h.a.n.. i. .J.K...A.o.r.i.a.n.. i. .J.K...[.c. .q. .u. .w. .x.]...T.e.l.o.v.o.l.a.n.a. .f.a.h.a.r.o.a...T.e.l.o.v.o.l.a.n.a. .f.a.h.e.f.a.t.r.a...T.e.l.o.v.o.l.a.n.a. .v.o.a.l.o.h.a.n.y...+.[.A. .B. .D. .E. .F. .G. .H. .I. .J. .K. .L. .M. .N. .O. .P. .R. .S. .T. .V. .Y. .Z.]...A.[.a. ... ... .b. .d. .e. ... ... ... ... .f. .g. .h. .i. ... ... ... .j. .k. .l. .m. .n. ... .o. ... .p. .r. .s. .t. .v. .y. .z.].....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1688
                                                                                                Entropy (8bit):5.056917531863066
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:rk2pmjsSeNjpr2E6DDMxSxVxo5+c9EzuxEzV0lDOXKzFeGXK2EyEZpl0ezeCR:rkemjKNjpqE6PMxSxVxo5+c9ESxEp0k/
                                                                                                MD5:EAD5D7580E3C134B0111067E96716565
                                                                                                SHA1:C68B589B9C15E1D6A38A826608FF3A4C2B084EA4
                                                                                                SHA-256:B9F60530043A737B639276EF9CE5BB108B0132159E7377F704C0716D56767E05
                                                                                                SHA-512:5D879FD1ABC8CC928C4525D495ABD1B421B309E6B7C79B811D8A929F4F4DDB79CE37FBBCD23DFC1A9B5665BFA5842E22DD0291303C4293CF52A05A8812A4A70E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................P........H.Y...Y.Y...A.r.a...C.h.e...K.u.m...K.w.a...M.o.c...M.o.j...N.a.n...R.a.r...T.i.s...U.n.a...Y.e.l...i.s.a.a...y.a.k.a...m.w.e.r.i...S.a.b.a.t.o...l.e.l.. l.o...m.e.. l.l.o...n.i.h.u.k.u...k.a.l.. l.a.i...n.. c.h.a.n.a...w.i.c.h.i.s.h.u...i.s.e.k.u.n.d.e...A.r.a.h.a.m.i.s.i...m.c.h.o.c.h.i.l.. l...Y.o.p.i.a. .y.e.s.u...i.w.i.k.i. .m.o.c.h.a...H.i.n.a.p.i.y.a. .y.e.s.u...M.w.e.r.i. .w.o. .k.u.m.i...M.w.e.r.i. .w.o. .n.a.n.e...M.w.e.r.i. .w.o. .s.a.b.a...M.w.e.r.i. .w.o. .t.i.s.a...M.w.e.r.i. .w.o. .k.w.a.n.z.a...M.w.e.r.i. .w.o. .u.n.a.y.e.l.i...M.w.e.r.i. .w.o. .u.n.e.r.a.r.u...M.w.e.r.i. .w.o. .u.n.e.t.h.a.n.u...M.w.e.r.i. .w.o. .u.n.e.c.h.e.s.h.e...M.w.e.r.i. .w.o. .k.u.m.i. .n.a. .m.o.j.a...M.w.e.r.i. .w.o. .k.u.m.i. .n.a. .y.e.l.. l.i...M.w.e.r.i. .w.o. .t.h.a.n.u. .n.a. .m.o.c.h.a...n.i.h.u.k.u. .n.o. .m.w.i.s.h.o. .w.a. .w.i.k.i.........NN....k..)...4.wEy................................!.$.....0............. .'.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):18956
                                                                                                Entropy (8bit):5.810867234104039
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:IHiKBMPHKIb6qyMQo2uvNsXiOn019ZB9eu6WfbC4ffUR5QYqbLTZF00DrYc7iYly:wIbW6NsXiH3rjC4KQYARfzly
                                                                                                MD5:84282F62A1AA229A48F931C7018D2C87
                                                                                                SHA1:9C20DB16599E668A275850C5414FA7164D3CF24F
                                                                                                SHA-256:C0C7AB86A76C399B80795BA2B5DF138C3A25BC407EA4ED7FC1F0FA3341FA93BF
                                                                                                SHA-512:AF63B8AB19CDFC3BF041C559887ED3C2BAFFF1CDAA521D7B72F55077352F1E124C7933735EB7CC900088E158B72F253889AEF5DBCAC96A2A9B871F76603AB418
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................b.. .<......{...{...V.....<.i........m...k...l...n...o.......6.......g.g...g.h...g.i...g.f.....G.....5...&.G...6.A...&.A...6.....8.............A.....B...!.?...(.K...+.G.....>...8.>.........$.?.j.....B.(...$.?.0...$.G.0...$.L.$...*.L.7.....>.....$.>.8...........$.?.g...$.?.h...$.?.i.....?.....0.......0.5.?...6.(.?...8.+.....8.+.0...8.G.......>.2.....>.!.../.A...0.../.A...1.................>.0.....&.>.0.....,.>.(.....7.>.".....*.?.*...../.>.0.....2.A.2.....A.2.H...$.K.,.>...(.>.8.@...*.9.>.....,.>.,.>...8...>.3...8.G.(.G.....0...9.....>.(.G...'.M.5...........3.....K.9.....0...>.....0...>.,...H.-.m.m.../.B...8.../.B...G...9.>. .0...9.C.&./...-.>.&.M.0.......*.B.........6.?.0.....H.$.M.0...$.>...A.....$.?.6.0.@...$.G.5.G.$...&.A.*.>.0...(.?.8.>.(...*.>...(.>.....G.9.G.0...6.G.5.>.$...8.?.5.>.(...9.>.$.K.0...9.G.&.>.0.....0.0...9.....?.....B...9.>. ...A...9.>. .......9.>. .8.K.....8.*.B.......*.M.0.?.......M...K.......8.M.....!.?.8.G.........0.>.......K.9.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):220
                                                                                                Entropy (8bit):4.5062548838343375
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SvGfCllKtu1/tY+6oxf6224LyPqhUG/oX0FAQnUqN:jmQtu1D1f6sWPTG6GUqN
                                                                                                MD5:EDBCCF817D5DBD629FB8596125B49775
                                                                                                SHA1:56C2FF31B97882EBCDD4BF34050583826C5AE6B1
                                                                                                SHA-256:80B4FA07CF54225E5940E6C8D1F515302D8274960DA296C9B51A0C286DA23F69
                                                                                                SHA-512:0309D7659F088AAFDD9B8D2C90005734C13FE4F91F83568E62085C5BDC5D86D3A976E124A64031A8799F47CD38F25E2F3B05314B8250265D34E7CCAE1200A285
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................*.. ......../.../........................Y4......NN.....h.B7w.3DyEyy................h.B7w.3.yW*eh9........................P...P....... ....................`...".. $.. ....o.w. .. ...`&..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):9752
                                                                                                Entropy (8bit):5.445383449559793
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:RKLLE4z7cu7an+pzZv+2AaJONv1LqztvBaTMA9ZfqWiglBYy:RKLwK4DaF9BaoA9VqWNlBZ
                                                                                                MD5:14378C6F55EA8C017AE94A0CDA1CF27B
                                                                                                SHA1:B5C1240FCB923C80B2A3C113D396EFBB95F6A73D
                                                                                                SHA-256:57CDE9931598171C8EF4C48A1B2F0CE44A2798604FB27609D05D2CE19E5E42C6
                                                                                                SHA-512:F5B1F0EC83ACC5C69EA2D42068586CCC7021CBF0123E122D3A18F5138F5F48065A3CEAF4B42E6837BB2B867B3A01CB157D8B90E9C6AF04EFC0F6BE0A059E2496
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................h.. ........~...~...4.......B........ ...&.m...E.r...S.b...T.l... .m...&.d...A.p...A.w...D.....J.n...L.j...M.j...M.z...N.v...O.b...Q.K...S.t...T.n...W.K... .n...E.r.b...S.i.b...T.l.i...T.n.e... .i.m...&.a.d...&.a.m...Q.E.K...A.w.w...D.i.....F.r.a...L.u.l...M.e.j...O.t.t... .u.n...j.u.m...S.e.n.a...F.r.a.r...|.o.n.a...i.s.s.a...L.u.l.j.u...M.a.r.z.u...M.e.j.j.u...X.a.h.a.r... .u.n.j.u...[.c. .y.]...g.'.a.d.a...i.l.l.u.m...J.a.n.n.a.r...E.,. .M.-.d...A.w.w.i.s.s.u...I.l.-.&.a.d.d...I.s.-.S.i.b.t...O.t.t.u.b.r.u...M.e.t.r.i.k.u...l.b.i.e.r.a.'...s.e.k.o.n.d.a...D.i...e.m.b.r.u...I.l.-.&.a.m.i.s...L.-.E.r.b.g.'.a...N.o.v.e.m.b.r.u...Q.Q.Q.Q. .-. .y...{.0.}. .u. .{.1.}...1.e.l. .k.w.a.r.t...2.n.i. .k.w.a.r.t...3.e.t. .k.w.a.r.t...I.l.-. .i.m.g.'.a...I.t.-.T.l.i.e.t.a...S.e.t.t.e.m.b.r.u...s.i.e.g.'.a. .i.l.u...{.0.}.,. .u. .{.1.}...!.i.m.g.'.a. .i.l.u...4.b.a.. .k.w.a.r.t...m.i.n.u.t.a. .i.l.u...{.0.}. .&.d... .i.l.u...G.G.G.G.G. .M.M.M. .y...W.a.r.a. .K.r.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):14992
                                                                                                Entropy (8bit):5.553911380584789
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:rXWoOPKq0HdI+ukEs4nhyliMJoH2r9kx+GKiSxMMKQ3Wil4q:1Xi5QGil4q
                                                                                                MD5:3A86006F374C9039ABABF84626068173
                                                                                                SHA1:B5AE8DEA97D4F93EAAEF82A3EB5AE6AAB2AF625F
                                                                                                SHA-256:AFC117398E2508DC84F3F6F0766E10260DED0D16DB25F0F2594818E333E621B7
                                                                                                SHA-512:921A95FBAB345BEE995B6C240D0B98FB5B785875AC3B804006BC1925EFB72A598D46C44433D51BED52BB566957AA6BF8F661E241AADD4A34E8F110566D4D1985
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................V.......:....................!...'...).......................J.....1...!.......0.........../.....1.....0.......1.......:.......:.......:.....-./......./...!...,...!...6.....=...:...../...:...m.y.m.r...'...<.................../.........1.7.........6...!...=.2...!...1.....!.....:...!...-./.....6.....:...!.1.,...:...).../...:......./...:.......1.7.........:...;...!...<.,.8.....1.7.....:.....1.,...<.,...!...:.9...+...$...-.....:...B. .H.:.m.m...c.c.c...1.7...d./.M.J. .E...{.0.}.....:...../...1.0......./...1.0.......6...+...:.........:.9...,...$.....1...1.7...../.6...1...:.......0.../...1.....0...-./...:...........:...,...........!...8.......:...1.7.........0.....:.8.....;...:.8...6......./...>...:.....,.....7.:.....!...0.8...<./...!.../...:...,...!...6...;.,.8...!.,.8.....,.8...$.!...;.-...:.....<.,.......1.8...../...9.....0.8.......0.0.../...1.......0...1.,...-.......0...1.,...:.......:.....:...,.......:.....+.........-./.....:...,.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):53856
                                                                                                Entropy (8bit):5.901391108627108
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:10O6vxFTmBsncJOgSsCzH3rgrPF1upF7DJ03AHhPRjelRP:136vH0qcMgSswgF1u7iAHhPR6r
                                                                                                MD5:A45E58F36E178B29D487B4D23E53971A
                                                                                                SHA1:FDAC567626074D20C678DFC0F858C5F2E4402B99
                                                                                                SHA-256:BB31DD85424A3BA36C90FA7C0BFDFF5B63F91E94E0AA1CC3630A9AB1F8396532
                                                                                                SHA-512:CE59B53CFE57D586C77DBF0B5C53141E20E0A25D29DB6A6504E90B4A749989B7081A6D458277D40C3F50471548B75E23C4ADCE60AC8276D7AD9230ED7AA6BB5D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........Nrm2................P....i..4...4...4...4...4...4...............X)...g......R....`...e...g..........3irT..E.a-..+.~...@.{.....;.{.....+.Y.......Q.......M...+.+.....6.n.+.......+.1.o...+.....G.g.....".A.~.g.....$.+.^.u.......+.A.a.........U.......+.%.3.s.......+.+.+.+.+.(.+.+.+.+.+.+.+.+.+.+.+.+.+.+.T.+.+...+.+...+...+.+.+...-.m.+.......K.F.+.+.......2.r.....2.r.....2.r.....1.a.....!.T.......F.t.+.+.+.+.......+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.S.`.+...+.+.+.+.+...+...+...+.2.+.+.r.......R.......K.......K.+.......K.......K.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):29580
                                                                                                Entropy (8bit):6.01533807474763
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:elqnsK1s1dSE4kV/AE1GZ555xkKSqH9d8a:el1KCS6A555SU
                                                                                                MD5:AC2F4EC11C08420A951B944B29CE2429
                                                                                                SHA1:902078221B3223AB738835C6AF0D68465E34B5B7
                                                                                                SHA-256:FFA8D90455FEF85E98E8095B99011F9619FD00122682DEB4C22166563C564A78
                                                                                                SHA-512:6781DFD23CFB4B5361ADBBF192629E801370334D7458F7BDDFE683CC2EE5B7E6FBA4609B211D635B35FD52114415B2CDBA6E79F2E8D0E7F251BE072B4A0EF44E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................V................O.s...A.a.p...R.a.t...T.u.t...m.e.i...v.g.j...G.e.i.t...H.a.a.n...H.o.n.d...h.e.e.t...k.o.e.l...k.o.u.d...w.a.r.m...A.b.i.b...T.. e.r...S.j.a.....m.r.t.....d.i.e.r...h.a.r.t...n...C.....p.i.j.l...v...C.....v.l.a.g...D.r.a.a.k...P.a.a.r.d...S.l.a.n.g...B.a.b.a.h...T.u.b.a.h...e.r.a. .0...m.n.d. .1...m.n.d. .2...m.n.d. .3...m.n.d. .4...m.n.d. .5...m.n.d. .6...m.n.d. .7...m.n.d. .8...m.n.d. .9...a.v.o.n.d...M.o.e.h.....S.j.a.w.....e.r.a. .1...m.a.a.r.t...B.r.i.t.s...t.o.e.t.s...K.o.n.i.j.n...T.i.j.g.e.r...V.a.r.k.e.n...A.d.a.r. .A...A.d.a.r. .B...E.l.l.o.e.l...K.i.y.a.h.k...M.a.a.g.h.a...S.j.e.v.a.t...m.n.d. .1.0...m.n.d. .1.1...m.n.d. .1.2...S.j.a.w.a.l...v...g...j.....c.i.j.f.e.r...d.-.M.M. .U...g.e.b.o.u.w...n...C.h.r.....o.p.m.a.a.k...r.e.i.z.e.n...v...C.h.r.....B.a.. u.n.a.h...P.a.g.u.m...n...T.a.m.m.o.e.z...T.i.s.j.r.i.e...m.a.a.n.d. .1...m.a.a.n.d. .2...m.a.a.n.d. .3...m.a.a.n.d. .4...m.a.a.n.d. .5...m.a.a.n.d. .
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):88
                                                                                                Entropy (8bit):2.6835941172605455
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlKelBjlgljl/wP5Fja7n:SBtkJTl4S2
                                                                                                MD5:1929DEFEE467163B0CD728B6D59F8CE0
                                                                                                SHA1:8B3D327517678CFC0819CD41B2DD788D7CE93B61
                                                                                                SHA-256:1F55FECE3C18E10D5A03074F9200546B0C6FC1701A80AB7ADFA7AE230F4DED4E
                                                                                                SHA-512:2A60AD62F64DE972EFADF999F431BD900A737ED6B1E270DBA214B53013EAFF2960AF4459EE7B4A16D73A90DCD3ECC291C66EBEFC42CD86E706E5316E32B22B32
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.................................n.b._.N.O.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):88
                                                                                                Entropy (8bit):2.6608668445332726
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlKelBjlgljl/wP5Rja7n:SBtkJTl4S6
                                                                                                MD5:73403BA652DA107A8E56986D72F5243B
                                                                                                SHA1:8AB3AF9BDC29BBF3058167DE4BE40FF02A5E6937
                                                                                                SHA-256:A1AC086A8942F081E82B5AE88CF3F69E501438B15E321733B21C0A5CC7ECC536
                                                                                                SHA-512:AEFC103FA6264783A2B2DB38A27A3A8A1578F8C0395F322EEC51B718EC21A2FF1316EC03C6998DBC9B623F38488645EBFCE2A032FBAE4A5A03B92E7EB99E0C43
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.................................n.n._.N.O.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1232
                                                                                                Entropy (8bit):5.536271573364604
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:ng+tAIL3kZtYT7tqi/7t6j6TvMIe06TvMs4YT86zVJEVi:g+tp3otYdZ6+jMIerjMzYT3EVi
                                                                                                MD5:F3808D807307AAE69A1753E613D76A94
                                                                                                SHA1:EFD294AF4278290BF7D114FDDF2EF7FB1C05C37E
                                                                                                SHA-256:B2E5EFFE5DD7FFBFE9319FD40F632D058D718C4969C175D31B232F24967B07EF
                                                                                                SHA-512:466046BFBB246FBA5BD3B492E11995197F57FF4049FAE2343750C2A4249479C1D0C6A789CCB0D0D23145A078BF14050561FF6B123F5D124AED0F41A79A114BF1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................!.. .m......,...,.........m..........K.B.Z...K.K.N...K.M.K...K.M.N...K.M.S...K.M.W...K.N.B...K.N.K...K.S.T...K.T.N...O.K.B...O.K.N...O.K.S...O.K.T...O.R.K...S.A.N...S.a.n.d.e...E.s.a.n.d.e...S.h.a.a.h.a...E.i.z.o.o.b.a...K.W.O.T.A. .1...K.W.O.T.A. .2...K.W.O.T.A. .3...K.W.O.T.A. .4...O.b.u.n.a.k.u...E.r.i.z.o.o.b.a...O.k.w.a.k.a.n.a...O.r.w.a.k.a.n.a...E.s.h.a.a.h.a. .z.a........)..k..)...4.wEy..................................!.$...0.............'./..4....eN>...D....L...3..].N..).P.M.N......k..)...4.wW*eh................................!.$...0.............'./..4....eN>...D....L...3..].N..).P.M.N..................4=Y0.=...=(=..>.....>......4..j.R......}..n.1...r..v.~.z..M.......=80.<...<.<1I.<C0t%..l...G.A..4D..4G.G.D.>.J.../...^.a.d.g.............h.~.................H....<..<....Y.........................................<....................P....... ...............P........ ...(.......0.............. ... ........8...;...........>...K...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):14580
                                                                                                Entropy (8bit):5.68156160232456
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:XGw4vvkTeSuGT3pQsLB8vDyNjtXuBqMD/+:X+vvkTeSuGT3pQsLqv0tXuBDr+
                                                                                                MD5:C065C1817B5FD2811F2850C5298DAE7A
                                                                                                SHA1:CF3F70C18690ADE405BB3B4F815E7E24E19A686E
                                                                                                SHA-256:F5111C749FD7D610A60E22D900D445DCBB19CC2BADAABB06786B0C98EB421441
                                                                                                SHA-512:BA6FB105D83A50E549524200E6AD64D8F7C46E9BDE55AFC186ACAC7AD6FE1AA46099C3D0FDC8B55CAD8B85ACF50C54740CA77324BD29CDD007F3013E5F52B331
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........5...5...V....................6...........A.....A.........!.?...+.G...,.....,.A.....>...8.G.........*.B...8.K.......A.(...0.,.?...6.(.?.....0.9...*.6.A.....?.........?...8.G.......A.0.A.....0.0.9.....0.(.?.....0.,.?...o.r.y.a.......M.......(.M._...6.0.@.0...9.C.&._..._.A...G.......7.M.......A.2.>.........M...3...6.A...M.0.....0.0.0.9.....0.0.(.?.....0.0.,.?...$.M.0._.........K...?.....$. .8.K...*.$.>...>...*.A.0.A.7...,.?.,.?.'.....9.?.3.>.../.K.!.<.>.....*.M.0.G.2.....0.0.0.(.?.....0.0.0.,.?.....0...M.0.?.....9.?. .8.K...9.>...M...>.....>...M...?.....$. .,.A.'.....$. ...>.8.....$...>.2.?...*.&.>.0.M.%...,.M.0.G.2.M.../.>.$.M.0.>...8...6.K.'....._.A...8.M.. ......M...K.,.0.....>.(.A...0.@...(.-.G...M.,.0...+.G.,.C...0.@.....>.0.M...M.......0.0...M.0.?.....9.?. .,.A.'.....$. .0.,.?.......$. .6.(.?.....{.0.}. .&.?.(.....9.?. ...>.8.....M.0.@.!.<.>.....$. .,.0.M.7.....$. .,.A.'.......$. .8.K.......*.>.#.?.*.>.....8.M...>...2.?...0.0.0. .9...>.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):17376
                                                                                                Entropy (8bit):5.864006114762211
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:2uZ0sDRJM4RfEfzbfYPEDLquOn9wFPOU19bxvrcfi2F4ghuuQNxm4BYx7y755nL5:2w0IRJ5ERWub9Ii2FvhuuQNc4BG7YqMN
                                                                                                MD5:3955A45BD6CD23FBBB5E84843E3B680E
                                                                                                SHA1:50CA52EDA3A8C758526D25E0FB6A140E13952AB1
                                                                                                SHA-256:D940D24BC363B18733F4A5FC68DDD96BBCCF765704DB01B75A714F44E20DE93C
                                                                                                SHA-512:CC0D7F7D0902E6A04BD26A76E959A37B4D6AFF01B77500ECD03E49442DA0A3ADBAA1A9E978965D3ED396B5CDBD3592543CFA05540D1682C8F58FF22316448003
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................V....................i...j...k...l...m...n...o.....5.........g.g...g.h...........(.....A.....B...+.<.....>.....p...5.@...8.K...g.f.....p...!.G.......&.0.....q.......G.$.....B.(.....G. .....?.0...*.K.9.....>.....8.@.(...9.>.\...9.A.#...&.8.p...(.5.p...+.<.0...,.A.q.....p.....0...,...8.$.p...8.+.....8.+.0.....p.......0.$.....G.!...&.?.2...8.<.....9.K.0...9.G...0.....>.2.0.....>.2.1......./.0.....*.H.*.....,.>.(.....q.8.B.....2.A.2.....@.........q.$.......G.5.......K.......$.K.,.>...+.q...#...,.>.,.>.....>.0.......G.9.0.....q...0...8.>...#...9...2.G...9.H.!.0...-.2...G.....?.p.....8.>...>...8.p...$.......$.B.......8.$.....A.2.>...0.>.......0.>.......8.<.......8.<.>.....g.u.r.u.....p.!.>.....p.!.G...*.L.&.>...,.#.$.0.....L.8.....5.?.q.%...8.0.@.0...8.<.>.....8.5.G.0.G...0.>.$.@.........<.>.0.....&.0. .I.....8.+.p.!.....K.!.0.!...$.>.9.8.8...(.?.8.>.(...(.G...<.@...*.>...(.>...,.>.9...(...-.>.&.K.......H.8.0.>...5.H.8.>.....8.<.G.5.....8.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.870450165586334
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/6nEoMx/E3:SBtkJYlU8g8l/f5Z4
                                                                                                MD5:4F503FC7E15796F5859820FFD974D465
                                                                                                SHA1:B9BEFED1CD772E3A79A6061C80CFB8E20F197950
                                                                                                SHA-256:AD2AAAD02567047B612355694D4CD372D941465E69343D2455EAB6BBE5F2C75A
                                                                                                SHA-512:19864CB9B1845E94008FD3D0D21F486BA9F64BF99A3E7B53AFB2048105D97E796217BBF416D09EDAADD88F92B2CC95E6787D54BEF7D4D8C917CF2B70480BC20B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.................................p.a._.G.u.r.u._.I.N...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):9048
                                                                                                Entropy (8bit):5.9844525393082115
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:LPsb7j7bKfIHLPLsXYmDOcr9vALALr4bxnxxND0CZ8H:L4z+gxhLAL6f+
                                                                                                MD5:4380FEB3B2EB10293C94823E470BAAB2
                                                                                                SHA1:CF1090D3504DA519805DC5A13A4227D9CF0B4E66
                                                                                                SHA-256:4D70C5C2D9373474A07D279F6A91036962A13B5AE64C808C30A68899F31E5854
                                                                                                SHA-512:AA14EFE80C74FE8E35861BAF03F61035A757F2FFD6892940FCB9810BDFB33FF1804E3D0D9D9FE1FB70C60DA47B72190CAF2CD655CC4C4C60F481203671A11B43
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................V...............E.......(...D...E...*.D.G...H.......~...1...2...G...9...~.....J.2...:...E...../.H.F.....:...H.....J.H.F.....1.(.J.9...2.E.1.....:.H.......E...G.'...5.A.1.G...(.J.1.:...,.H...G...D.H.(.G...F.(.'.*...H.,.H./.....F.(.F.../.1...F.......D.1.F.....,.E.'.9.G...,.F.H.1.J...1.'.,.'.(...D...F./.....~.'.H.3.'.....F...'.......J.*.1.'...+.'.F.J.G.../.B.J.B.G...E.J.'.4.*...*.F.B.J.7...4.E...1.....E...|.1.....H./.'.F.......'.1.H.......F...(.*.......J.F.G.........'.~...H.J.3.'...'...~.J.F...F.....'.3.'./.G.'...'.3.H.J.F.'...(.G.'./.1.'...,.J.'.3.*.'...3.D.H.'.:.G...E.1.:.H.E.....(.D. ...'.D...A.(.1.H.1.J...'...E.H.,.....A.9.'.D.J.*...E.*.A.1.B.G...F.'.1...F.G.....'.1.*.J...'...-.D.'.D. .-.,...1.(.J.9. .I.I...3.1.'.H.'.F.'...:.(.1...H.D.....3...~.*.E.(.1...(./.D.H.H.F.....(.1.J.*.'.F.J...(.J.1.:.H.F.G...:... .,.'.E.H...A...(.1.H.1.J...E.3...../.D.....|.H.F. .F...G...~.1.H.3.....'.D...,.E.H.E.'. .I.I.../.'.D.B.'.9./.G...~.G.'.D...H.F.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1470892603744245
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllpxlRhstP9hGn:SvMMZhstWn
                                                                                                MD5:1EBD2CF7B1B1688EDBA5E6481651878D
                                                                                                SHA1:D7475C1E2105A5316F89BAD639102A22E59E8206
                                                                                                SHA-256:8840ADEBC3ABC62843F8E6350F2E28528A3CA15D65FA9979BED3BF44566867A9
                                                                                                SHA-512:208EF55200983034D2E782B061C3C065E60832CB443D5B4CFDBE9297D338E9867089B7F26FD2A7BD7C25BDD11E8B5C7C7BDAA77A409DC679A931256CA038AA0A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.....................................o.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1470892603744245
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllpxlRhstP9hGn:SvMMZhstWn
                                                                                                MD5:1EBD2CF7B1B1688EDBA5E6481651878D
                                                                                                SHA1:D7475C1E2105A5316F89BAD639102A22E59E8206
                                                                                                SHA-256:8840ADEBC3ABC62843F8E6350F2E28528A3CA15D65FA9979BED3BF44566867A9
                                                                                                SHA-512:208EF55200983034D2E782B061C3C065E60832CB443D5B4CFDBE9297D338E9867089B7F26FD2A7BD7C25BDD11E8B5C7C7BDAA77A409DC679A931256CA038AA0A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.....................................o.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):7612
                                                                                                Entropy (8bit):5.700235005775752
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:zbdt8C1Y3QjaFpJF2YYyiiKWkqtWEfYCg6c:5n6tiiQ5gc
                                                                                                MD5:2E275A6E4C3F7184E8D9D6DC8B097126
                                                                                                SHA1:A23F12E961EDB0A6DA20B54000013F173BE04E77
                                                                                                SHA-256:BE06000773B6585D1419BEDB574471BDB18A9C34E71AB90A23BD19FFE12D992B
                                                                                                SHA-512:599F2AB9D93E01254820DACA7E73E7F69F64664F437009792A14AA73A44141311F58384F9AD85A72007D2F68A40A38384522CD59F5DE8EFB9556B1EB68077927
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................Y.. ........g...g...B.......Y........X...d.C...D.o.m...J.u.e...M.i.....V.i.e...D.a.y...D.i.c...E.n.e...p.a.q.a.r.i.n...k.a.y. .h.o.r.a...-.{.0.}. .L.u.n.e.s...+.{.0.}. .L.u.n.e.s...d. .M.M.M. .y.,. .G...h.a.m.u.q. .w.a.t.a...k.a.y. .m.i.n.u.t.o...k.u.n.a.n. .w.a.t.a...q.a.y.n.a. .w.a.t.a...-.{.0.}. .J.u.e.v.e.s...-.{.0.}. .S...b.a.d.o...+.{.0.}. .J.u.e.v.e.s...+.{.0.}. .M.a.r.t.e.s...+.{.0.}. .S...b.a.d.o...k.u.n.a.n. .L.u.n.e.s...q.a.y.n.a. .L.u.n.e.s...h.a.m.u.q. .L.u.n.e.s...h.a.m.u.q. .k.i.l.l.a...k.u.n.a.n. .k.i.l.l.a...q.a.y.n.a. .k.i.l.l.a...-.{.0.}. .V.i.e.r.n.e.s...+.{.0.}. .V.i.e.r.n.e.s...h.a.m.u.q. .J.u.e.v.e.s...h.a.m.u.q. .M.a.r.t.e.s...k.u.n.a.n. .J.u.e.v.e.s...k.u.n.a.n. .M.a.r.t.e.s...k.u.n.a.n. .S...b.a.d.o...q.a.y.n.a. .J.u.e.v.e.s...q.a.y.n.a. .M.a.r.t.e.s...q.a.y.n.a. .S...b.a.d.o...{.0.}. .s.e.m.a.n.a.p.i...h.a.m.u.q. .S...b.a.d.o...h.a.m.u.q. .s.e.m.a.n.a...k.u.n.a.n. .s.e.m.a.n.a...q.a.y.n.a. .s.e.m.a.n.a...Q.a.y.n.a. .V.i.e.r.n.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):88
                                                                                                Entropy (8bit):2.64671783887604
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlW/lRl/jlklbl+3N/lnPn:SBtkJGtaaPn
                                                                                                MD5:AA8A7AA673D89EF3789A8F51E0A80829
                                                                                                SHA1:052FC49617344392438BD75F84E6F7662C50D294
                                                                                                SHA-256:0C3E87EC57077F2273433A6859EA6DDD7AFC5B2A272E475EDA076833239882C5
                                                                                                SHA-512:B96A6BF5258AF5D6EE582E2EF722F31017DC8FE8CAAF92A912AADB4E38E10645F451FCCAB8FC5EE95B48DF52A2A9E760F12C4255EC80B03BEF791C6551227CB5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................%%ALIAS...a.r..... .....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2724
                                                                                                Entropy (8bit):3.8125465320367646
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:W2aPeNfBSfxkhrHNpVMnRzklEfOcTJmPm58mdJjRXExJVSfRbQuM1uMxg4WFLsdN:UPeWsTedJur0JjRqJVSfRMuuuKg4WmP
                                                                                                MD5:821396B7A9D6576E8990CE5BD73F877D
                                                                                                SHA1:3ABFF51745D30E34FDFBF962A996C9471D9C6C78
                                                                                                SHA-256:DAD4F85C45A47C1C5A79A71E297EB80DA2F08A1E6D61DF3E372F8056AAC86943
                                                                                                SHA-512:75500CFCF13A4A55F08C327E972AA292108A6C27B7CA5EDCFEE4E4D16835A522FA290B6F05749B46D13D12B41E0DD28AC3D3201D3C08EE53CC746EA6427526C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................RBNFRules.SpelloutRules.Version...2.:. .d.v.a.;...2.:. .d.v.e.;...3.:. .t.r.i.;...5.:. .p.e.t.;...0.:. .n.u.l.a.;...6.:. .a.e.s.t.;...8.:. .o.s.a.m.;...1.:. .j.e.d.a.n.;...1.:. .j.e.d.n.o.;...2...1...2.7...2.2...7.:. .s.e.d.a.m.;...9.:. .d.e.v.e.t.;...1.0.:. .d.e.s.e.t.;...4.:. ...e.t.i.r.i.;...x...x.:. .=.0...0.=.;...1.:. .j.e.d.i.n.i.c.a.;...-.x.:. .m.i.n.u.s. .>.>.;...1.2.:. .d.v.a.n.a.e.s.t.;...1.3.:. .t.r.i.n.a.e.s.t.;...1.5.:. .p.e.t.n.a.e.s.t.;...1.0.0.:. .s.t.o.[. .>.>.].;...1.1.:. .j.e.d.e.n.a.e.s.t.;...1.4.:. ...e.t.r.n.a.e.s.t.;...1.6.:. .a.e.s.t.n.a.e.s.t.;...1.8.:. .o.s.a.m.n.a.e.s.t.;...1.7.:. .s.e.d.a.m.n.a.e.s.t.;...1.9.:. .d.e.v.e.t.n.a.e.s.t.;...6.0.0.:. .a.e.s.t.o.[. .>.>.].;...2.0.0.:. .d.v.e.s.t.a.[. .>.>.].;...3.0.0.:. .t.r.i.s.t.a.[. .>.>.].;...5.0.0.:. .p.e.t.s.t.o.[. .>.>.].;...5.0.:. .p.e.d.e.s.e.t.[. .>.>.].;...x...x.:. .<.<. .z.a.r.e.z. .>.>.;...2.0.:. .d.v.a.d.e.s.e.t.[. .>.>.].;...3.0.:. .t.r.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):8256
                                                                                                Entropy (8bit):3.6514733298145963
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:MORhOM+Zr8qMa9bdTccODcImjrzUfB7eeeperKGL5sLQHoCA3M8P2+F9vQFFdsYA:MORhOM+Zr8qMa9bdTccODcImjrzUfB7W
                                                                                                MD5:CC029FAF0B35257C9BC280F6C49E5AAF
                                                                                                SHA1:6E0DC67FB2C8AF385D57AC643B9E5F28407DD149
                                                                                                SHA-256:323F889FD6976D0D64A659218BA951ADB53348BF8323794990708E15F055467C
                                                                                                SHA-512:415BFD4E3497EFD23752DA9B6E5D1FEC40770C721A851BC0ADB196393DBAE03BC50C1428DA6896041618FDF89108DDF8B38C6AF7227CF41E27E9E81ED52CE838
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................RBNFRules.SpelloutRules.Version...0.:. .e.;...0.:. .t.e.;...0.:. .d.e.;...1.:. .e.n.;...1.:. .e.t.;...2.:. .t.o.;...9.:. .n.i.;...0.:. .n.u.l.;...1.0.:. .t.i.;...3.:. .t.r.e.;...5.:. .f.e.m.;...7.:. .s.y.v.;...4.:. .f.i.r.e.;...6.:. .s.e.k.s.;...8.:. .o.t.t.e.;...0.:. .n.u.l.t.e.;...1.2.:. .t.o.l.v.;...2...1...2.7...2.2...2.:. .a.n.d.e.n.;...2.:. .a.n.d.e.t.;...5.:. .f.e.m.t.e.;...1.:. .f...r.s.t.e.;...%.%.o.r.d.-.e.-.c.:...%.%.o.r.d.-.e.-.n.:...1.8.:. .a.t.t.e.n.;...3.:. .t.r.e.d.j.e.;...4.:. .f.j.e.r.d.e.;...6.:. .s.j.e.t.t.e.;...9.:. .n.i.e.n.d.e.;...%.%.o.r.d.-.d.e.-.c.:...%.%.o.r.d.-.d.e.-.n.:...%.%.o.r.d.-.t.e.-.c.:...%.%.o.r.d.-.t.e.-.n.:...1.0.:. .t.i.e.n.d.e.;...1.1.:. .e.l.l.e.v.e.;...1.2.:. .t.o.l.v.t.e.;...1.5.:. .f.e.m.t.e.n.;...1.7.:. .s.y.t.t.e.n.;...1.9.:. .n.i.t.t.e.n.;...7.:. .s.y.v.e.n.d.e.;...8.:. .o.t.t.e.n.d.e.;...x...x.:. .=.0...0.=.;...%.%.a.n.d.-.s.m.a.l.l.:...1.1.:. .e.l.l.e.v.t.e.;...1.3.:. .t.r.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):7840
                                                                                                Entropy (8bit):3.77137862592975
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:Yft6G3tYGp4JLGL3dQEU8w3uW5xoQ7zqS1tkMLK/yRJSfCvuJIrqFErV4HMCiHR0:6xnp4JLGLNQEU8w3uW5xoQ7zqS1tkMLY
                                                                                                MD5:F96736364A1510705D95E38827ADE063
                                                                                                SHA1:CFF0A353A2A86D60A1990A59565D63B5A0D87949
                                                                                                SHA-256:03DD1121F14C7CBCCA3D474A309A34BEE7776FACD2DB746A28B26EFC8A48B8B6
                                                                                                SHA-512:004CB0E1BFF063C34641AE604B13650B1B6D891507ADE42793249DE7AB8B1D694A5471C14FEA57D834DA56DEDC9CA2D8B8525D5BB3629DE90C39B50776382755
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................%%Parent.RBNFRules.OrdinalRules.SpelloutRules.Version.....%.%.t.h.:...0.:. .t.h.;...%.%.a.n.d.:...e.n._.0.0.1...1.:. .o.n.e.;...2.:. .t.w.o.;...6.:. .s.i.x.;...%.%.a.n.d.-.o.:...%.%.t.i.e.t.h.:...-.x.:. ..">.>.;...0.:. .z.e.r.o.;...1.0.:. .t.e.n.;...4.:. .f.o.u.r.;...5.:. .f.i.v.e.;...9.:. .n.i.n.e.;...%.%.c.o.m.m.a.s.:...0.:. .t.i.e.t.h.;...1.:. .f.i.r.s.t.;...2...1...3.5...1.3...3.:. .t.h.i.r.d.;...3.:. .t.h.r.e.e.;...5.:. .f.i.f.t.h.;...6.:. .s.i.x.t.h.;...7.:. .s.e.v.e.n.;...8.:. .e.i.g.h.t.;...9.:. .n.i.n.t.h.;...%.%.2.d.-.y.e.a.r.:...0.:. .z.e.r.o.t.h.;...1.0.:. .t.e.n.t.h.;...2.:. .s.e.c.o.n.d.;...4.:. .f.o.u.r.t.h.;...8.:. .e.i.g.h.t.h.;...%.%.c.o.m.m.a.s.-.o.:...0.:. .h.u.n.d.r.e.d.;...1.1.:. .e.l.e.v.e.n.;...1.2.:. .t.w.e.l.v.e.;...7.:. .s.e.v.e.n.t.h.;...1.2.:. .t.w.e.l.f.t.h.;...1.5.:. .f.i.f.t.e.e.n.;...1.6.:. .s.i.x.t.e.e.n.;...-.x.:. .m.i.n.u.s. .>.>.;...1.1.:. .e.l.e.v.e.n.t.h.;...1.3.:. .t.h.i.r.t.e.e.n.;.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):8456
                                                                                                Entropy (8bit):3.8624830970369954
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:YL/zBbubZbRKE/zV7Ksr7fSNqCLenaWdmdQhQ7vN/0ReR+U:Y/zQ9bvZlr7fSNqCLenddCQhQ7l/0ReV
                                                                                                MD5:7939D34D047E6C7161E1BF695112964E
                                                                                                SHA1:B5AB319C696A3847E91970D98B1ACCB9C3D16802
                                                                                                SHA-256:6E42D0A53C0B2BA3F236D6AD4BAD59358DB36677142AE38ABAE39C13EB383E76
                                                                                                SHA-512:E731C9889510311A3F97EAE82A1606E56581F02255E1EC6A138AB445062A4D4CBD75E206B31E0E9C005202CD2BF9E2D917274AB10CD93E4123CD1379D7FAF4D4
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................6.. ........:...:...........2...RBNFRules.OrdinalRules.SpelloutRules.Version......0.:. ...;...2.:. ...;...4.:. ...;...1.:. .u.n.;...1.:. .I...;...3.:. .I...;...1.:. .u.n.a.;...1.:. .u.n.o.;...2.0.:. .>.>.;...2.:. .d.o.s.;...0.:. .c.e.r.o.;...-.x.:. ..">.>.;...1.0.0.:. .>.>.;...3.:. .t.r.e.s.;...6.:. .s.e.i.s.;...8.:. .o.c.h.o.;...6.:. .s.e.x.t.o.;...1.0.:. .d.i.e.z.;...1.1.:. .o.n.c.e.;...1.2.:. .d.o.c.e.;...2...1...2.7...3.3...5.:. .c.i.n.c.o.;...6.:. .s.e.x.t.a.;...7.:. .s.i.e.t.e.;...9.:. .n.u.e.v.e.;...1.0.0.:. .c.i.e.n.;...4.:. .c.u.a.r.t.o.;...5.:. .q.u.i.n.t.o.;...8.:. .o.c.t.a.v.o.;...9.:. .n.o.v.e.n.o.;...1.3.:. .t.r.e.c.e.;...1.:. .p.r.i.m.e.r.;...3.:. .t.e.r.c.e.r.;...4.:. .c.u.a.r.t.a.;...4.:. .c.u.a.t.r.o.;...5.:. .q.u.i.n.t.a.;...8.:. .o.c.t.a.v.a.;...9.:. .n.o.v.e.n.a.;...1.0.:. .d...c.i.m.o.;...2.:. .s.e.g.u.n.d.o.;...7.:. .s...p.t.i.m.o.;...1.0.:. .d...c.i.m.a.;...1.5.:. .q.u.i.n.c.e.;...1.:. .p.r.i.m.e.r.a.;...1.:. .p.r.i.m.e.r.o.;...2.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):96
                                                                                                Entropy (8bit):2.767068904684046
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlF12PllvlsltloBk6lY0kEPn:SBtkJuelXo1lzn
                                                                                                MD5:01AC728B63D66869B5A2D94A2F88B64F
                                                                                                SHA1:E12801ED14CB0B7BB6252A3666C9C97820F15EE9
                                                                                                SHA-256:59A741F29DB4FD6792C6B24842F42AA8F9EF4E61C3F9085FDE8B92F29C76960C
                                                                                                SHA-512:132080285A86E399D3F920F470FAFCF39AC76D5370A492BEC00AF161C2C537E8368335F675E006B2EE64F6FFB02A78423A4BC7BB636342C5B92F13F4AB4C3E39
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................%%ALIAS...e.s._.4.1.9..... .....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):10236
                                                                                                Entropy (8bit):4.30288241120569
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:ryWMULPyUSwVx8gV+mx8H24NTp73TKyjxIsxov9W5xpdwNisjtsbAsctUcwgXAwM:PLRVx8gV+mxM24NTp7Tpk9W5xHwNgAs3
                                                                                                MD5:197500A0C869F3CA04F2D1C865B8E282
                                                                                                SHA1:556662FF748B61695076EDE9EA7AA4C06206C460
                                                                                                SHA-256:C01C8336FA3F17895628B80D52C67195B68630DDA8233B870BAFB1F0D1B1387F
                                                                                                SHA-512:C41C105D853D40C722961BA0C32411162516A25B68CD49DA7E1393266D77B6C73F05BBE29823FDB70D1779EAD7D447179F8BC50342F6A0209E7F36EE1453D737
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................RBNFRules.SpelloutRules.Version...6.:. .....;...0.:. .......;...1.:. .......;...2.:. .......;...2.:. .......;...1.:. .......;...5.:. .......;...6.:. .......;...7.:. .......;...9.:. .......;...6.:. .........;...7.:. .........;...9.:. .........;...1.0.:. .......;...2.:. .........;...3.:. .........;...4.:. .........;...5.:. .........;...6.:. .........;...7.:. .........;...9.:. .........;...8.:. ...........;...1.0.0.:. .......;...1.0.:. .........;...2.:. ...........;...3.:. ...........;...4.:. ...........;...5.:. ...........;...8.:. ...........;...1.0.:. .........;...1.:. ...........;...2...1...3.8...3.4...2.:. ...........;...3.:. ...........;...3.:. ...........;...4.:. ...........;...4.:. ...........;...5.:. ...........;...6.:. ...........;...7.:. ...........;...8.:. ...........;...9.:. ...........;...2.0.:. ...........;...6.0.:. ...........;...7.0.:. ...........;...9.0.:. ...........;...1.0.:. ...........;...1.:. ...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):88
                                                                                                Entropy (8bit):2.64671783887604
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlW/lRl/jlklbl+/+GPn:SBtkJGtaDYn
                                                                                                MD5:10B328EA87427AC0A91DB7AD5D9043DC
                                                                                                SHA1:34ECD90BE5FFB01A9DF4AFB11DD68D3E6353C709
                                                                                                SHA-256:137192AB9E551B5215DBE7072638AD3EC74B6B3591BED05665D6243FDAB63AEE
                                                                                                SHA-512:25C99AD2F4157C7C08430322CD2821FDF1E8CA3DCE8474FC9A2038F690BBC58E09A1E26AB594DD8FCF5BA87548BD3371911E60E6C879D1C7E981517A22E98D4C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................%%ALIAS...i.d..... .....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):3072
                                                                                                Entropy (8bit):3.6206983228534515
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:erYXR/SrQIHRsR2YfmB65iJHJxR0K0i3q12f25kxfcJrVBS2V4C+BY4avakxmG8I:x/qenfeJHJ30KK+NxfcJruCE+ZpPDf
                                                                                                MD5:B9773C5EA3C7968F4F48C0BF6120E929
                                                                                                SHA1:1D0E7A8019FDF1FFC29A5424A1D31F82988A5299
                                                                                                SHA-256:BFA24A298DD628CA101B298A52AF55C72F37B345AAFC7F7720583B1F3A848D08
                                                                                                SHA-512:52D2D55CAD82BBBE9511573C13102EFE63253D2ADE2CE1BAF2D60CFCD48C21B5B3C9D5EF2F30EC7348AABAD2FB5EDC5E5245FF3A2EAE3606DFEF9AD8A9CE6677
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................RBNFRules.SpelloutRules.Version...0.:. .n.u.u.l.u.;...2...1...2.7...2.2...1.0.:. .q.u.l.i.t.;...2.:. .m.a.r.l.u.k.;...1.:. .a.t.a.a.s.e.q.;...4.:. .s.i.s.a.m.a.t.;...x...x.:. .=.0...0.=.;...1.0.:. .q.u.l.i.n.i.k.;...3.:. .p.i.n.g.a.s.u.t.;...5.:. .t.a.l.l.i.m.a.t.;...-.x.:. .m.i.n.u.s. .>.>.;...2.:. .m.a.r.l.u.n.n.i.k.;...4.:. .s.i.s.a.m.a.n.i.k.;...%.%.n.u.m.b.e.r.t.i.m.e.s.:...1.1.:. .a.q.q.a.n.i.l.i.t.;...3.:. .p.i.n.g.a.s.u.n.i.k.;...5.:. .t.a.l.l.i.m.a.n.i.k.;...6.:. .a.r.f.i.n.i.l.l.i.t.;...1.1.:. .a.q.q.a.n.i.l.i.n.i.k.;...6.:. .a.r.f.i.n.i.l.i.n.n.i.k.;...x...x.:. .<.<. .k.o.m.m.a. .>.>.;...1.6.:. .a.r.f.e.r.s.a.n.i.l.l.i.t.;...7.:. .a.r.f.i.n.e.q.-.m.a.r.l.u.k.;...1.0.0.:. .u.u.t.r.i.t.i.t.[. .>.>.].;...%.s.p.e.l.l.o.u.t.-.c.a.r.d.i.n.a.l.:...1.2.:. .a.q.q.a.n.e.q.-.m.a.r.l.u.k.;...9.:. .a.r.f.i.n.e.q.-.s.i.s.a.m.a.t.;...%.s.p.e.l.l.o.u.t.-.n.u.m.b.e.r.i.n.g.:...1.4.:. .a.q.q.a.n.e.q.-.s.i.s.a.m.a.t.;...1.6.:. .a.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1608
                                                                                                Entropy (8bit):4.351115188008445
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:WE2SFlNz9zEij/0VZcWftJQh2M5JmvVOaEYmdJm59aoX8ffIp8E:HFlNz/SiWftJQh2CJ+VO+0JqaDIpF
                                                                                                MD5:5C4C33E736544B8000AB3E420CE0760E
                                                                                                SHA1:DDC214898D46CD2A61BC52E514C035AD75ED115D
                                                                                                SHA-256:4866ADDBB0F027D694567820AA80387B2F8D73AD4A2A97625DD7816D3202A2F3
                                                                                                SHA-512:D8844DCC8A74FFC65149B674774EDAF5B6256BC1EA8A6FCFB09648F693316E16F93C5F55CFABBC48756C627048AC3BAB89E5C7815B0853AEBBD47777A39C08E2
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................RBNFRules.OrdinalRules.SpelloutRules.Version......3.:. .....;...1.:. .......;...2.:. .......;...4.:. .......;...-.x.:. ..">.>.;...0.:. ...........;...2...1...1.9...1.4...5.:. ...........;...-.x.:. ...... >.>.;...8.:. ...............;...6.:. .................;...7.:. .................;...9.:. .................;...0.:. .....=.#.,.#.#.0.=.;...1.0.:. .......[.. >.>.].;...2.0.:. .........[.. >.>.].;...4.0.:. ...........[.. >.>.].;...5.0.:. ...........[.. >.>.].;...9.0.:. ...........[.. >.>.].;...%.%.l.e.n.i.e.n.t.-.p.a.r.s.e.:...%.d.i.g.i.t.s.-.o.r.d.i.n.a.l.:...1.0.0.:. .<.<.. ....[.. >.>.].;...3.0.:. .............[.. >.>.].;...6.0.:. .............[.. >.>.].;...7.0.:. .............[.. >.>.].;...x...x.:. .<.<.. ....... >.>.>.;...8.0.:. ...............[.. >.>.].;...%.s.p.e.l.l.o.u.t.-.o.r.d.i.n.a.l.:...%.s.p.e.l.l.o.u.t.-.c.a.r.d.i.n.a.l.:...1.0.0.0.:. .<.<.. ........[.. >.>.].;...%.s.p.e.l.l.o.u.t.-.n.u.m.b.e.r.i.n.g.:...1.0.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2640
                                                                                                Entropy (8bit):3.7860179628388178
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:RGEdE53ED4UurVJRqJ3vqActXcfHjurjuSoCo6:RGKY3i4UurVJcJ3vqAcNcfDsj1oCP
                                                                                                MD5:F4ABEDC58338889FC6D06BF10AF5E3EA
                                                                                                SHA1:35212AF034052457F2686E1E0B5D31AB1DE8F2D2
                                                                                                SHA-256:7BB0259CFAEEE039E9EBF5E558672DE9A2A593B0FEA7FB0568DDA3FAF56E488B
                                                                                                SHA-512:0863676CA9CBBEAF734EED03B3A8E83B69069E849C3B084931114F5915FB637B83D23A9A17D30F274CF35CC98A10044AE12B4EDA3FF69EF26FE4AAE41BF263D7
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................RBNFRules.SpelloutRules.Version...2.:. .d.i.v.;...6.:. .s.e.a.;...3.:. .t.r.+.s.;...1.:. .v.i.e.n.;...2.:. .d.i.v.i.;...4.:. ...e.t.r.;...5.:. .p.i.e.c.;...6.:. .s.e.a.i.;...0.:. .n.u.l.l.e.;...1.:. .v.i.e.n.a.;...1.:. .v.i.e.n.s.;...2...1...2.7...2.2...2.:. .d.i.v.a.s.;...4.:. ...e.t.r.i.;...5.:. .p.i.e.c.i.;...6.:. .s.e.a.a.s.;...8.:. .a.s.t.o.F.;...9.:. .d.e.v.i.F.;...1.0.:. .E.R.R.O.R.;...4.:. ...e.t.r.a.s.;...5.:. .p.i.e.c.a.s.;...7.:. .s.e.p.t.i.F.;...8.:. .a.s.t.o.F.i.;...9.:. .d.e.v.i.F.i.;...1.0.:. .d.e.s.m.i.t.;...7.:. .s.e.p.t.i.F.i.;...8.:. .a.s.t.o.F.a.s.;...9.:. .d.e.v.i.F.a.s.;...x...x.:. .=.0...0.=.;...7.:. .s.e.p.t.i.F.a.s.;...-.x.:. .m.+.n.u.s. .>.>.;...1.0.0.:. .s.i.m.t.[. .>.>.].;...x...x.:. .<.<. .k.o.m.a.t.s. .>.>.;...1.0.0.0.:. .t.k.k.s.t.o.a.[. .>.>.].;...%.%.s.p.e.l.l.o.u.t.-.p.r.e.f.i.x.e.d.:...%.s.p.e.l.l.o.u.t.-.n.u.m.b.e.r.i.n.g.:...%.s.p.e.l.l.o.u.t.-.n.u.m.b.e.r.i.n.g.-.y.e.a.r.:...0.:. .=.%.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1732
                                                                                                Entropy (8bit):3.701304332168578
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:Wk/WZlKB2JBEjEoKPJQcwNlJQJmGhpJm58meJvqEj9P2A0Z:WZl62JtPJQcwNlJQJhhpJrJvF9D0Z
                                                                                                MD5:1460F4EA03CF6115DE2DC70F022C5816
                                                                                                SHA1:3884E0697F4969D487F19BF5280CD54F0BE611D3
                                                                                                SHA-256:9C4A65707B6E08B8284BAC29DD1AD122CD813580CF02D804184CFC54BC2F86D9
                                                                                                SHA-512:A888F8E6F89B03B08A969275C8B870B697EE074655F823E61FB40C4BC86C084974F061A0609037F79C1898FC7186773524674E7F61800FCA10B1C15EE5EAF013
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................RBNFRules.OrdinalRules.SpelloutRules.Version......2.:. .d.u.a.;...1.:. .s.a.t.u.;...3.:. .t.i.g.a.;...5.:. .l.i.m.a.;...6.:. .e.n.a.m.;...1.:. .N.o... .1.;...2...1...4.9...2.4...4.:. .e.m.p.a.t.;...7.:. .t.u.j.u.h.;...8.:. .l.a.p.a.n.;...0.:. .k.o.s.o.n.g.;...1.:. .p.e.r.t.a.m.a.;...x...x.:. .=.0...0.=.;...0.:. .k.e.k.o.s.o.n.g.;...1.0.:. .s.e.p.u.l.u.h.;...1.1.:. .s.e.b.e.l.a.s.;...9.:. .s.e.m.b.i.l.a.n.;...1.2.:. .>.>. .b.e.l.a.s.;...0.:. .k.e.-.=.#.,.#.#.0.=.;...2.:. .k.e.-.=.#.,.#.#.0.=.;...-.x.:. .n.e.g.a.t.i.f. .>.>.;...x...x.:. .=.#.,.#.#.0...#.=.;...%.d.i.g.i.t.s.-.o.r.d.i.n.a.l.:...-.x.:. .."k.e.-.>.#.,.#.#.0.>.;...%.s.p.e.l.l.o.u.t.-.o.r.d.i.n.a.l.:...1.0.0.0.:. .s.e.r.i.b.u.[. .>.>.].;...1.0.0.:. .s.e.r.a.t.u.s.[. .>.>.].;...2.0.:. .<.<. .p.u.l.u.h.[. .>.>.].;...%.s.p.e.l.l.o.u.t.-.c.a.r.d.i.n.a.l.:...2.0.0.0.:. .<.<. .r.i.b.u.[. .>.>.].;...2.0.0.:. .<.<. .r.a.t.u.s.[. .>.>.].;...%.s.p.e.l.l.o.u.t.-.n.u.m.b.e.r.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):4624
                                                                                                Entropy (8bit):3.732707836468624
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:YsqXJG7JKOuw+xojaNE7JtTpCHHjsvJJpmrqoQHN3tCwzsnVkbQ:RsGFKOuw+xojaNEFZpCHHjsvJJpmrqoz
                                                                                                MD5:77882A56008261A3F1C1B82C4742F04A
                                                                                                SHA1:74A3A994A98426A4DF69110784CB9615CFAD1CC7
                                                                                                SHA-256:69023C6711C9E5F709807508D1C3D0D0DD6004CE3B67D5E63775B06817B1B695
                                                                                                SHA-512:4EF697373D45BD3890F099F84FCF4CCAC5E0FB72D99A7A78A9FB414B73DBA1A33A926B215A7CBB9F6586A13354DB4A099BE8C476B61986D78E198A1ABC627CAC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................x.. ........|...|...........t...RBNFRules.OrdinalRules.SpelloutRules.Version......0.:. .n.u.l.;...0.:. .s.t.e.;...1.:. .e.e.n.;...6.:. .z.e.s.;...-.x.:. ..">.>.;...1.1.:. .e.l.f.;...2.:. .t.w.e.e.;...3.:. .d.r.i.e.;...4.:. .v.i.e.r.;...5.:. .v.i.j.f.;...8.:. .a.c.h.t.;...1.0.:. .t.i.e.n.;...2...1...2.7...2.2...3.:. .d.e.r.d.e.;...7.:. .z.e.v.e.n.;...9.:. .n.e.g.e.n.;...%.%.2.d.-.y.e.a.r.:...%.%.o.r.d.-.s.t.e.:...0.:. .n.u.l.s.t.e.;...1.:. .e.e.r.s.t.e.;...2.:. .t.w.e.e.d.e.;...-.x.:. .m.i.n. .>.>.;...0.:. .h.o.n.d.e.r.d.;...1.2.:. .t.w.a.a.l.f.;...1.:. .e.e.n...e.n...;...x...x.:. .=.0...0.=.;...%.%.n.u.m.b.e.r.-.e.n.:...0.:. .=.#.,.#.#.0.=.e.;...1.3.:. .d.e.r.t.i.e.n.;...1.6.:. .z.e.s.t.i.e.n.;...2.:. .t.w.e.e.....n...;...3.:. .d.r.i.e.....n...;...1.4.:. .v.e.e.r.t.i.e.n.;...1.5.:. .v.i.j.f.t.i.e.n.;...1.8.:. .a.c.h.t.t.i.e.n.;...1.7.:. .z.e.v.e.n.t.i.e.n.;...1.9.:. .n.e.g.e.n.t.i.e.n.;...x...x.:. .=.#.,.#.#.0...#.=.;...%.d.i.g.i.t.s.-.o.r.d.i.n.a.l.:...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):25220
                                                                                                Entropy (8bit):3.7264725011803574
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:Ih1+wDzFI1ZWX2yrKPeyLRaAoCETlR4BB7P04Q/L+YQYc3G/2qksDYnRRXN05OAS:IhnzFI1Zz
                                                                                                MD5:2E98F4B0C4F9B87B9EAF9DABBBE909F4
                                                                                                SHA1:11E45654290B44B19B0A6168ED1219242015EB5A
                                                                                                SHA-256:8EFD9EDC995E6522DCD7C4698698AC5EE1758D5B89C2F7ED5DCCC3402103B2D1
                                                                                                SHA-512:C34529A88F44624A44A829AE6265816F49BC43E6B0FBBE9FBC1B9F74FD2E3264A2D71D34B5C0834EC0EE1DCA46F4BE7E1EF4DE489E29B49E20F873DF4F2B156B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................RBNFRules.SpelloutRules.Version...2.:. .d.w.a.;...0.:. .z.e.r.o.;...0.:. .z.e.r.a.;...0.:. .z.e.r.u.;...3.:. .t.r.z.y.;...5.:. .p.i.....;...2.:. .d.w.a.j.;...2.:. .d.w.i.e.;...2.:. .d.w...m.;...1.:. .j.e.d.e.n.;...8.:. .o.[.m.i.u.;...0.:. .z.e.r.e.m.;...0.:. .z.e.r.z.e.;...1.:. .j.e.d.n.o.;...1.:. .j.e.d.n...;...2.:. .d.w...c.h.;...6.:. .s.z.e.[...;...8.:. .o.s.i.e.m.;...1.:. .j.e.d.n.a.;...2...1...2.7...2.2...2.:. .d.w.o.m.a.;...3.:. .t.r.z.e.j.;...3.:. .t.r.z.e.m.;...1.:. .j.e.d.n.e.j.;...5.:. .p.i...c.i.u.;...1.:. .j.e.d.n.y.m.;...3.:. .t.r.z.e.c.h.;...4.:. .c.z.t.e.r.y.;...7.:. .s.i.e.d.e.m.;...1.0.:. .<.<. .>.>.;...2.:. .d.w.i.e.m.a.;...3.:. .t.r.z.e.m.a.;...6.:. .s.z.e.[.c.i.u.;...7.:. .s.i.e.d.m.i.u.;...1.:. .j.e.d.n.e.g.o.;...1.:. .j.e.d.n.e.m.u.;...4.:. .c.z.t.e.r.e.j.;...4.:. .c.z.t.e.r.e.m.;...8.:. .o.[.m.i.o.m.a.;...x...x.:. .=.0...0.=.;...4.:. .c.z.t.e.r.e.c.h.;...9.:. .d.z.i.e.w.i.....;...1.:. .d.z.i.e.s.i...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):17280
                                                                                                Entropy (8bit):4.238350514170709
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:oc+4C2W7kf0W+crMhJf7lJGJGfg6GuqkPB4vrngY:U4A2kJTlYYY6GprnF
                                                                                                MD5:58AC541781B11DCC8F721CCCCD705366
                                                                                                SHA1:99D2EA7E7A71E287F36545F68F5589026E3BAA25
                                                                                                SHA-256:CBD89E41C0C7C95EB88EC3940253E16F55D28F4DB561AE03A8D3CCBFA89CF381
                                                                                                SHA-512:00E3ACF1D17A5474E8AB4F29EC114DF7F3FAD4C7113181AFACEC8C50137EC866AB498A9578F2779268DC2740DCB5B4D8D928273DAABB4E4406FA24E1F5C9F955
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................RBNFRules.DurationRules.NumberingSystemRules.OrdinalRules.SpelloutRules.Version...0.:. ...;...0.:. .0.;...0.:. .N.;...0.:. .n.;...0.:. ...;...0.:. ...;...0.:. ...;...0.:. .|.;...1.:. .I.;...1.:. .i.;...1.:. ...;...1.:. ...;...1.:. .0.;...1.:. .1.;...1.:. .a.;...1.:. ...;...1.:. ...;...1.:. ...;...1.:. .i.;...2.:. ...;...2.:. ...;...2.:. .2.;...2.:. .2.;...2.:. .b.;...2.:. ...;...2.:. ...;...2.:. ...;...2.:. .j.;...3.:. ...;...3.:. ...;...3.:. .3.;...3.:. .3.;...3.:. .c.;...3.:. ...;...3.:. ...;...3.:. ...;...3.:. .k.;...4.:. ...;...4.:. ...;...4.:. .4.;...4.:. .4.;...4.:. .d.;...4.:. ...;...4.:. ...;...4.:. ...;...4.:. .l.;...5.:. .V.;...5.:. .v.;...5.:. ...;...5.:. ...;...5.:. .T.;...5.:. .5.;...5.:. .e.;...5.:. ...;...5.:. ...;...5.:. ...;...5.:. .m.;...6.:. ...;...6.:. ...;...6.:. .U.;...6.:. .6.;...6.:. .f.;...6.:. ...;...6.:. ...;...6.:. ...;...6.:. .n.;...7.:. ...;...7.:. ...;...7.:. .7.;...7.:. .7.;...7.:. .g.;...7.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):3580
                                                                                                Entropy (8bit):3.8104436721883586
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:iPhTXA6Jur0JjcJVSF72dIEB8j9hxgVqAD0as:MhU0urKjyVSF72dIEB8j9hxgVqus
                                                                                                MD5:EC42639574648397DCD567F7C42EE2C5
                                                                                                SHA1:DA9E597605FE0D68DF2EA2B75BBC3A1FE8824E52
                                                                                                SHA-256:2EE11EDAD8854492F07CB713D82AC77CAE93345FCE997F366634485E5FE2850F
                                                                                                SHA-512:4FE4EE5C58FB76DA73C6A874EDC06A77F96DD1AFE4A4E208D4C76C210F78EE5822AA82A8C7883A57CD825A8BECD4E1E6E2FC6DC53242C1AC8515BDE08520616C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................s.. ........w...w...........q...RBNFRules.SpelloutRules.Version...0.:. .n.i...;...1.:. .e.n.a.;...2.:. .d.v.a.;...2.:. .d.v.e.;...3.:. .t.r.i.;...5.:. .p.e.t.;...6.:. .a.e.s.t.;...8.:. .o.s.e.m.;...2...1...2.7...2.2...2.:. .d.v.i.j.e.;...4.:. .a.t.i.r.i.;...7.:. .s.e.d.e.m.;...9.:. .d.e.v.e.t.;...1.0.:. .d.e.s.e.t.;...1.1.:. .e.n.a.j.s.t.;...x...x.:. .=.0...0.=.;...-.x.:. .m.i.n.u.s. .>.>.;...1.2.:. .d.v.a.n.a.j.s.t.;...1.3.:. .t.r.i.n.a.j.s.t.;...1.5.:. .p.e.t.n.a.j.s.t.;...1.0.0.:. .s.t.o.[. .>.>.].;...1.4.:. .a.t.r.i.n.a.j.s.t.;...1.6.:. .a.e.s.t.n.a.j.s.t.;...1.8.:. .a.s.e.m.n.a.j.s.t.;...1.7.:. .s.e.d.e.m.n.a.j.s.t.;...1.9.:. .d.e.v.e.t.n.a.j.s.t.;...2.0.:. .d.v.a.s.e.t.[. .>.>.].;...6.0.0.:. .a.e.s.t.o.[. .>.>.].;...3.0.0.:. .t.r.i.s.t.o.[. .>.>.].;...3.0.:. .<.<.d.e.s.e.t.[. .>.>.].;...5.0.0.:. .p.e.t.s.t.o.[. .>.>.].;...1.0.0.0.:. .t.i.s.u...u.[. .>.>.].;...2.0.0.:. .d.v.j.e.s.t.o.[. .>.>.].;...8.0.0.:. .o.s.e.m.s.t.o.[. .>.>.].;...x...x.:. .<.<.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):8276
                                                                                                Entropy (8bit):3.771984449203231
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:66VQU0XJMWXpTNp1GyB3AuZDvNpJlHdXeD2AmAXG8jzuzQ2saKfLKDawAM1p1DII:hSU0XJMWXpTNp1GyB3AuZLNpJl9XeShZ
                                                                                                MD5:BB198B47D17ADE021BF1C30C33225F6A
                                                                                                SHA1:A3F69C6713884F2A8E8123C34E50BB16DA175906
                                                                                                SHA-256:56C8078F0BA9995C3AD4C90D155A1B05AC2E83E57EB4CAB83520981670BF4D36
                                                                                                SHA-512:3F146BB7B994C47B544939D3587373A0563C8C18E4CFB4B1BD1C1AE0AF207029E8DA4BB8EAAF47EF2AD84F86E7726429701316A233B15EBE8EEBAE579EE4074E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................RBNFRules.OrdinalRules.SpelloutRules.Version......0.:. .t.e.;...0.:. .d.e.;...1.:. .e.n.;...1.:. .e.t.;...0.:. .n.d.e.;...2.:. .t.v...;...3.:. .t.r.e.;...5.:. .f.e.m.;...6.:. .s.e.x.;...7.:. .s.j.u.;...9.:. .n.i.o.;...1.:. .e.t.t.;...-.x.:. ..">.>.;...0.:. .n.o.l.l.;...1.0.:. .t.i.o.;...4.:. .f.y.r.a.;...8.:. ...t.t.a.;...1.1.:. .e.l.v.a.;...1.2.:. .t.o.l.v.;...2...1...3.4...8.1...2.:. .a.n.d.r.a.;...2.:. .a.n.d.r.e.;...5.:. .f.e.m.t.e.;...0.:. .n.o.l.l.t.e.;...1.8.:. .a.r.t.o.n.;...1.1.:. .e.l.f.t.e.;...1.:. .f...r.s.t.a.;...1.:. .f...r.s.t.e.;...3.:. .t.r.e.d.j.e.;...4.:. .f.j...r.d.e.;...6.:. .s.j...t.t.e.;...7.:. .s.j.u.n.d.e.;...9.:. .n.i.o.n.d.e.;...1.5.:. .f.e.m.t.o.n.;...1.6.:. .s.e.x.t.o.n.;...1.9.:. .n.i.t.t.o.n.;...1.0.:. .t.i.o.n.d.e.;...1.2.:. .t.o.l.f.t.e.;...8.:. ...t.t.o.n.d.e.;...x...x.:. .=.0...0.=.;...1.3.:. .t.r.e.t.t.o.n.;...1.4.:. .f.j.o.r.t.o.n.;...1.7.:. .s.j.u.t.t.o.n.;...1.0.0.0.:. .E.R.R.O.R.;...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):3376
                                                                                                Entropy (8bit):4.405866321543506
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:Svo9u9qDct+kkJoV2UJur0JjcJVS7WD9UTsrks+7gan:p9u9qDctfkJo4qurKjyVS7WpUTsrkn
                                                                                                MD5:EEA91630C532D6A0B1AA586781C3E2A0
                                                                                                SHA1:957EA5B1FE419BCA6DE2E3020E8C26EE90B89270
                                                                                                SHA-256:E0B64AA76A7CD706ABF068A9EA3B804939C2FFD922E1B38E6E57B02C72703984
                                                                                                SHA-512:4D1AFF63D794896E2171A91CACE250F630479A7152E56AD1CADD66587ADB40BD8BC4179C5216689C69A4735C1C48E95E9889816A6CB8F4E10150ADB01807D9E2
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................@.. ........D...D...........>...RBNFRules.SpelloutRules.Version...2.:. .4.2.0.;...2.:. .4.2.V.;...3.:. .B.@.8.;...7.:. .A.V.<.;...0.:. .=.C.;.L.;...1.:. .>.4.8.=.;...1.:. .>.4.=.0.;...1.:. .>.4.=.5.;...2...1...3.0...6.2...5.:. .?...O.B.L.;...6.:. .H.V.A.B.L.;...8.:. .2.V.A.V.<.;...4.:. .G.>.B.8.@.8.;...1.0.:. .4.5.A.O.B.L.;...9.:. .4.5.2...O.B.L.;...x...x.:. .=.0...0.=.;...-.x.:. .<.V.=.C.A. .>.>.;...1.0.0.:. .A.B.>.[. .>.>.].;...4.0.:. .A.>.@.>.:.[. .>.>.].;...1.1.:. .>.4.8.=.0.4.F.O.B.L.;...1.2.:. .4.2.0.=.0.4.F.O.B.L.;...1.3.:. .B.@.8.=.0.4.F.O.B.L.;...1.7.:. .A.V.<.=.0.4.F.O.B.L.;...x...x.:. .<.<. .:.>.<.0. .>.>.;...%.%.l.e.n.i.e.n.t.-.p.a.r.s.e.:...1.5.:. .?...O.B.=.0.4.F.O.B.L.;...1.6.:. .H.V.A.B.=.0.4.F.O.B.L.;...2.0.0.:. .4.2.V.A.B.V.[. .>.>.].;...3.0.0.:. .B.@.8.A.B.0.[. .>.>.].;...7.0.0.:. .A.V.<.A.>.B.[. .>.>.].;...1.4.:. .G.>.B.8.@.=.0.4.F.O.B.L.;...1.8.:. .2.V.A.V.<.=.0.4.F.O.B.L.;...2.0.:. .4.2.0.4.F.O.B.L.[. .>.>.].;...3.0.:. .B.@.8.4.F.O.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):5360
                                                                                                Entropy (8bit):3.9325362330462403
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:JFkVgrbFCDDebtedcbafD1FA/hJqvwzyk6yoQrre1JHhM0nwl32+lLIwb4Mlpnbn:Jzh2jEqvwzyk6y/rrebHh0l32+l8wUM3
                                                                                                MD5:FD4A4AFB2120B5B91A253D5C190864B2
                                                                                                SHA1:53D9E6DECC9BFF43C59C6A6041CDDD9F7226AA2E
                                                                                                SHA-256:EFB949EDD7C1AC82CB265E08B13C5B083A0F7D17222CEC8B4B54E717007346BD
                                                                                                SHA-512:875755F8925163115089BF6656F7A2FA578163F11A510E64CD0C16A49D4536F8481B93CD88FAFF0DF3EF0C2263AFDB59E264BA6684806A4947DFE95B92F7272D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................0.. ........4...4...........,...RBNFRules.OrdinalRules.SpelloutRules.Version......1.:. .;...0.:. ...;...1.:. ..N;...2.:. ..N;...3.:. ..N;...4.:. ..V;...5.:. ..N;...6.:. .mQ;...7.:. ..N;...8.:. .kQ;...9.:. .]N;...1.:. ..X;...2.:. .iQ;...2.:. ...;...3.:. ..S;...4.:. ...;...5.:. ..O;...6.:. .x.;...7.:. ..g;...8.:. .Lc;...9.:. ..s;...-.x.:. ...>.>.;...2...1...4.6...2.4...%.%.n.u.m.b.e.r.2.:...%.%.n.u.m.b.e.r.3.:...%.%.n.u.m.b.e.r.4.:...%.%.n.u.m.b.e.r.5.:...%.%.n.u.m.b.e.r.8.:...1.0.:. .<.<.>.>.>.;...1.0.:. .AS[.>.>.].;...1.0.:. ..b[.>.>.].;...%.%.n.u.m.b.e.r.1.3.:...1.0.0.:. .<.<.>.>.>.;...x...x.:. .=.0...0.=.;...x...x.:. .<.<..>.>.>.;...0.:. .,{=.#.,.#.#.0.=.;...1.0.0.0.:. .<.<.>.>.>.;...2.0.:. .<.<.AS[.>.>.].;...2.0.:. .<.<..b[.>.>.].;...-.x.:. .,{.">.#.,.#.#.0.>.;...x...x.:. .=.#.,.#.#.0...#.=.;...%.d.i.g.i.t.s.-.o.r.d.i.n.a.l.:...%.s.p.e.l.l.o.u.t.-.o.r.d.i.n.a.l.:...%.%.f.i.n.a.n.c.i.a.l.n.u.m.b.e.r.2.:...%.%.f.i.n.a.n.c.i.a.l.n.u.m.b.e.r.3.:...%.%.f.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):88
                                                                                                Entropy (8bit):2.587503530614347
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlw1ylRl/jlklbl+vKalllkC:SBtkJQ2aRalsC
                                                                                                MD5:CD838BDE437B8246547E3DA5B56BC92B
                                                                                                SHA1:7B56EF405386E67AD77E890927ACF9CE8EBA77C4
                                                                                                SHA-256:BE404D9CC9737C0A22CB01C5FE5ED35C37CD87A22C5DBE18893AF3DCC8946816
                                                                                                SHA-512:D9C4D18DE93F999801B873680BE8502ED67DA0665C04E3B182AC1A3BB02E34F82C3B6DDCA54BAD84D37D727F030E2934C73A81FBB6D4779D02CED04528E07492
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................%%ALIAS...y.u.e..... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):7788
                                                                                                Entropy (8bit):3.8632384739723844
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:qE2BWPzacwQ+HLMJpvuJIrqFE15KYjOb+2+ld8w+vlo4lG30dUri5wXOHpE8rx0P:qE2BWPzacwQ+HLMJpvuJIrqFE15KOOb+
                                                                                                MD5:831B03DDF3F05162FA43821D898E2663
                                                                                                SHA1:521967B3BC3134310430D7FCE2B637F2814B906A
                                                                                                SHA-256:A8FD7EBDF62A3C1A7DC93E6FDF0160B4FEF4F1A3D006A37A2C0940DA86EA5ABF
                                                                                                SHA-512:E5FA9C147425AC6698F8EA9BBC2C897EC159CF8F45485944DBE1E6EF4389A821B3B9CB914454D84D35DFCF0C5F02F67CBF1374005F23C616DB29AAB005FD6528
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................%%Parent.RBNFRules.OrdinalRules.SpelloutRules.Version.....r.o.o.t...0.:. ...;...1.:. ..N;...3.:. ..N;...4.:. ..V;...5.:. ..N;...6.:. .mQ;...7.:. ..N;...8.:. .kQ;...9.:. .]N;...2.:. ..N;...0.:. ..0;...1.:. ..X;...2.:. .iQ;...2.:. ...;...3.:. ..S;...4.:. ...;...5.:. ..O;...6.:. .x.;...7.:. ..g;...8.:. .Lc;...9.:. ..s;...-.x.:. ...>.>.;...2...1...2.7...2.2...1.0.:. .<.<.>.>.>.;...1.0.:. .AS[.>.>.].;...1.0.:. ..b[.>.>.].;...1.0.0.:. .<.<.>.>.>.;...x...x.:. .=.0...0.=.;...x...x.:. .<.<..>.>.>.;...%.%.c.a.r.d.i.n.a.l.2.:...%.%.c.a.r.d.i.n.a.l.3.:...%.%.c.a.r.d.i.n.a.l.4.:...%.%.c.a.r.d.i.n.a.l.5.:...%.%.c.a.r.d.i.n.a.l.8.:...0.:. .,{=.#.,.#.#.0.=.;...1.0.0.0.:. .<.<.>.>.>.;...2.0.:. .<.<.AS[.>.>.].;...2.0.:. .<.<..b[.>.>.].;...%.%.c.a.r.d.i.n.a.l.1.3.:...-.x.:. .,{.">.#.,.#.#.0.>.;...x...x.:. .=.#.,.#.#.0...#.=.;...%.d.i.g.i.t.s.-.o.r.d.i.n.a.l.:...%.s.p.e.l.l.o.u.t.-.o.r.d.i.n.a.l.:...%.%.f.i.n.a.n.c.i.a.l.n.u.m.b.e.r.2.:...%.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):96
                                                                                                Entropy (8bit):2.7533913818199895
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlR/Pllvlsltloe1zRqa:SBtkJJelXoeZH
                                                                                                MD5:B01F5E12A340DAA68ECF97BEE56D319B
                                                                                                SHA1:0FFEE54D754C18D881CCCDE4E3E62F1D510C4A6B
                                                                                                SHA-256:288721EEEF5C876ABD385C1CD229ECB72525B1FE396651ADB546CC681ABFD8EB
                                                                                                SHA-512:0B2745AB2D7E702C06ADAE932E248024ED4903A05A30244C6CFC56E6BC45B0886CF3F3D6231F693A48FDBF454A3BAD44F6FA675B9D7716EEFA53C67303824570
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................%%ALIAS...z.h._.H.a.n.t..... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):5716
                                                                                                Entropy (8bit):4.524867939073992
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:2A6ZJ8Fe/VPPOvqy0Seo+xM+rLHAJPg/hE4kqefJ6aAsZOXV19gV81yWelU0kXF7:eLqRvao7SLHABgpEzVh6atZOXb9gekUh
                                                                                                MD5:2C4812488B86E32A65469F8A00BDF496
                                                                                                SHA1:BC7F9E55EE1C39CCB3F1973B51FFC7C780C0BB98
                                                                                                SHA-256:297CBE32B6E0920037DC365944CB981C622A0F1FA4B9AD798BE269BE20CB5AB7
                                                                                                SHA-512:601DBA2B99AF9FD1636F1553B9F0A9EFCA7F1698158B442490199A2F75F31B1731ACA5DF5078C64E2D14C9BA9129EFEE67289B43EF282B5B9D7DB7C073C67C2A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .8....................8.....5K.y..C.h.....E.d.z.....K.a.t.....M.a.l.....T.u.g.....U.m...n.....l...n...C.h.i.l.....E.n.d...a...E.t.a.l.....F.i.d.z.i...G.a.a.n.....G...b...n...H...e.t.....K.p.[.l.....K...w.[.....K.h.n.y.....L.e.b...a...L...w.o.s...M.a.a.t.....S.i.l...a...S...d...n...T.e.e.k.....T.u.K.g.......l.u.b.....B...l.a.e.n...B...l.e.v.....C.h.a.e.n.....D.z.o.d...n...D.[.n.h.m.....E.k.w.a.d.....F.h.n.l...n...G.a.m.b...a...G...y.a.n.....G.h...l...s...K.a.n.a.d.....K.p.u.l...n...K.u.u.w.b.....L.o.s.h...a...L...t.h.v.a...L.[.b.a.n.....M.b.u.t...n...M...d.i.v.....M...l.a.w.....M...y.o.t.....M...l.o.k.....M...n.a.k.u...M...a.n.m.....N.a.e.d.z.....N...w.u.l.....N.[.k.p...a...S...m.o.w.....T.a.e.l...n...T.a.e.w...n...Y.[.m.[...n...Z.a.m.b...a.....n.d.o.l.......K.g.o.l.......l...k.h.....B...b.a.d...s...B...h.a.m...s...B...l.u.n.d.....B.[.l...l...s...B.[...m.u.d.....B.[...n.h...K...B.h...l.u.n.....D.z.a.m.a.n.....D.z...k.p...n...D.z...m.[.k.....E.s...v.a.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):120
                                                                                                Entropy (8bit):3.912622054212684
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlmdlzpll8l/Vlld0yzlYq4v/6l/qaMF:Sv2Oltll9zl5EaMF
                                                                                                MD5:A1D6134CC0DEC5125CBA9339D5658781
                                                                                                SHA1:073953C53A746A9B003B95462F28D5AF00D1A189
                                                                                                SHA-256:D7BF75F303DF4BB4E8DBA6016E67B6901947C92144129C4540A258FC9175F785
                                                                                                SHA-512:166F4CA393A3B514918A586861ECDE4B8FF6E3AC081D1E6A806130011F55E15349B47E456111F2355548768FBAF596F86E2CF8AFC935F377AD530B1F49C54E07
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..Q....................Q....5K.y..#.H.1.H.:.H.'.J.....F.].\..QY>.Q.............P.!.`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9586234771141804
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMwM86E7lz1BsNE:Sv9t6gz17
                                                                                                MD5:C22EC8E4B84B84647296660688B6D7BB
                                                                                                SHA1:2FE414FD38932DCBEADACC13175680F8C0ABD8E7
                                                                                                SHA-256:37FF94DAEF52A8B76ED3DCE758A446BC79EDE3349F84134BEFAA7225C99D58B3
                                                                                                SHA-512:FFA514030D42EF8975FA25B9A20E94A0DBBE63EDBF9C4DAA74631A8FE0BA1A6FF4552AEBB8C6D69A058E2D71F7D169C498E5A42F8FC06465F1EA61E821C0A15B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..!....................!....5K.y.......!
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/dsp:SBtkJ1li6gml/8
                                                                                                MD5:3F209B3AA35603DCBB208A74CAA36C86
                                                                                                SHA1:249DE057005BE697205333ABA0433C5B04653BBB
                                                                                                SHA-256:F3965E339C622C96879DEE316DE42F9E9F693DDEB7A52FDCEBBA027171F2C86A
                                                                                                SHA-512:02411AE5728814057E0CA78D850EEA85B3ACA16DFDBEE97A7C01860DA3B82640EEBE60960938C7F64B05D9E9FE8BAE0B826D242E24B33C40024836F716F17E31
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................5K.y........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):5216
                                                                                                Entropy (8bit):4.526885334594306
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:dxWEZi2CmE2x15Q4WtoyJ36LuKI/rHKkXF9D1+DLPb2G:BV2os8s36qr/jtFRIF
                                                                                                MD5:05A574C06D6947FA65E06359D1AD5A2A
                                                                                                SHA1:162B3B88B25645B893B571B2ED33BD959520B1BB
                                                                                                SHA-256:78E71D23578DAD3FD0076FE41BFC6E8DE35DE5B7F3E71683E378C978B2F366CE
                                                                                                SHA-512:892301DA11CF5E0EC9FFEB7330DA7BB4AD6D809ED809B3BADAED486AE6F035F788FC82A1BFE43150CE411DC5DCCF587E1B36426FD9388AE042317099A6E54C51
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .C!...................C!....5K.y..C...d...G.a.n.....G...n.....G.....m...K.i.n.....K.u.b.....K...l.....L.....s...M...l.i...N.e.r.....P...r.....T...g.o.....i.t.......r...k.....r...K.....m...n...B...l...s...B...t...n...I.n.d.......J.a.m...n...K.e.n.......K.i.p.r.....K...t...r...K...w...t...K...K.g.o...L.i.b.......M.a.l.t.....M...r...s...N...p...l...N...u.[.....P...l.a.....P...n.y.a...S.i.r.......S...m.o.....S...d...K...S...w...s...T.T.K.g.......r.u.b.....B.r...s...l...B...r.a...n...B...n.[...K...D...m.n...k...G.r...k.y.....G...b.T...K...G...m.b.i.....G...y.a.n.....J...b.u.t.....K...n.a.d.....L.e.s...t.....L...d.v.i.....M...l.d...f...M...l...w.i...M...r.o.k.....M...y.T...t...M...n.a.k.....N...j.[...r...P...n...m.a...P...l...n.d...R...a.n.d.....S...s.[...l...T...y.w...n...T...r.k...y...T...v...l.....Y...m.[...n...Z...m.b.i.......K.d.T...r.....K.g.i.y.......K.g.o.l.......g...p.t.......r.l...n.d.....t.a.l.........s.t.r...k.....g.a.n.d.......k.r.[...n.....l.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):7608
                                                                                                Entropy (8bit):4.677065664643768
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:tF48CTqdS4paQnSto7IPOI8CYvJvOtgKS2xLROx2RHmQP2tn7BG8hCXKQH1hoZcV:orx4p2Mj5GVit1BQDlHNJqpJ80Y
                                                                                                MD5:34DEE5BB69C136432F75147A649AB0AC
                                                                                                SHA1:330CE54E21EA1FEFD477CD85EECC25468F192CFD
                                                                                                SHA-256:EB5730CAAA7EB7DE6AD24E3E610956069960689B2A42769BBE8B027F7918CD98
                                                                                                SHA-512:C8CD2E670FFD6E74DA436CED188F5C55AC75542CA233F714C251F785DB4CA11D8EA1B6623E0C9E41888B90963E9E85B4D74A21F88D52AFC510702DA4A36874EF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................_.. ........f...f...$......._...5K.y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
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.3908502676203804
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQuHcKt7g8sOtWwT/r9h:SvFv1UwTDX
                                                                                                MD5:0A1233FBDE8BB786513730F248C00A3F
                                                                                                SHA1:7232253BF6AA1D12EEC2699394B98C99B04185EA
                                                                                                SHA-256:45851FFA7B67ECB0A7D7C0BF4EEF7AE7BF66C5747D8833C5FE65966D28AEA026
                                                                                                SHA-512:6C0F7E0F00F5A49CB8720C9AF67A868145667182B5297ED8F871FFD83D2AF559DF7C2A968F99295E46A8E3831CF60350404AA511747689B3067B518091B9E5D8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................5K.y....S........H.............P...P.!.`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):6384
                                                                                                Entropy (8bit):4.7904041426974775
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:d42p26D71OkW7RICj+p96V7sH7x6q9AdHqppH8nzbqZMJxjRilZ:dtpLkkDoI7x6BqpJ8iZMxjRwZ
                                                                                                MD5:EBAB657F132AB733710CB9FCA1CCC4B9
                                                                                                SHA1:AC1097560B86A22C7471EA87AB52F4A40804E093
                                                                                                SHA-256:70A4F88D751906FD2649AEAAE435DE4D5F5CA3C6101E023DF2480807ED0E0431
                                                                                                SHA-512:2174DA9026E5B4BF6590BC3EEE038A8711B8BDA987985109DBD5B8DED878CCDB2C795A18BF2870E15FFF006497D9684137A98F4D8BC2FA4305437BC811900E9B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................-.. .U......4...4...#.....U.-...5K.y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
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):6132
                                                                                                Entropy (8bit):5.044790248065529
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:pEOOsvtTsvcmPcXlHkHbRhPd3GLbIsqUiVFWvKxJ34UhqppH8nzOB7nMC2F:pxOsVTmRkqzOg2KxJoYqpJ8UM
                                                                                                MD5:66D7E7D0CF90CC589AF6D409CA335E60
                                                                                                SHA1:B61DD0F92AC35EE5ABDFA6F01C1903E15B36702F
                                                                                                SHA-256:131F85262BC6ABBC3021E4DC8BB8D8309D94DE4A2C688F836CBBF30F3F471D30
                                                                                                SHA-512:CAF57C274B4B00EB2028BD9607743C540E4F9BCA61C09D3D584C857587FFA728BCE1980432D39885EE4E043FFCFB9DACAC592037CFEE9AE1C6073AA53594B89E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..!.............&......!....5K.y....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):984
                                                                                                Entropy (8bit):6.664654262645045
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:xmrJVJ7OkJBvWa9D2h1i/veBQ+7TTKO542Kc2hdl/QZ:xMmkXWa9D5HeXTb42SqZ
                                                                                                MD5:2DC65410ADD51F24840BE253B3DE1E6A
                                                                                                SHA1:555D4E6EB7C777E657DC6FA511950B6A31426BA1
                                                                                                SHA-256:E8647FD90A97C6C221DEABE0E4E4F833E3B726C9424091695E2419045D7F2B60
                                                                                                SHA-512:01BEC81C93895A11FDB507BCFE01386D0D590E20827AAD4AB59CE50E25DE3074801996FD2B3AC9D8231AF80049DC5ECAAB8E3AD38AE8FD9B4135706CDC53F60F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..........................5K.y..............................................................................................".+...1.7.:.=.@.C.I.L.O.U.X.[.d.g.j.m.s.v.y.|...............................................................................................!.$.'.*.-.0.3.6.?.B.E.H.K.N.T.W.Z.].`.c.f.i.l.o.r.u.x.{.~............................................................................................... .&.).,./.2.5.8.;.>.A.D.G.J.M.P.Y.\._.b.e.h.k.n.q.t.w.z..............h.J.v.2.!.!..u.wo.".?..."....b@M..3E3...2..-!B!i!G...... ...!$!..k./......`......6./"......{h.#.....~.}.....!..U!2........}.v.}.....!...}.._..#....W"."g.%J..M".I2~.......?~.W...Z..`3.)...Ko?..h..XRQ..2.w.}.`pJ...o.@.`Dw.3.3a"7!.!..u".....hAh;3..'w."l....3...".".@..,...x......_!<J..eo_..I..}.....j..3... q.G..w...".o...".".........."."..~!.A.w.3.h....z@[3q3.@..Z.s!D......"%...w...Ww.@.2.}.`.!q.o..v...o$3....O.'..~.R...?..9..". v`dh... .R... ...........P. .`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):3960
                                                                                                Entropy (8bit):5.0530028166826595
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:lTzcMNUsLjSZe+iZy0Wq/vZyZnFSp0iLsGJ6ctqppH8nzbd/T+P5wa:lvSaG8qpJ88Pia
                                                                                                MD5:DF0C727EB8EDCD974737DD244F7C6520
                                                                                                SHA1:72717F9B521311D3F0A0395B4A4189E2F5C691D0
                                                                                                SHA-256:2CA5055C02A48C3841F0B67148E2256BFC67B8F42133FB3F2373F8787B7D2998
                                                                                                SHA-512:5A8834F667C27D9C7202C392C9B822109252F4B8CD814D7A288451BB0559A83F873973B48B9E5BE9CFE375AFE35E1C6B8BA4EF719774EAB50EB6F50D094B5C30
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .c..............$.....c.....5K.y..W.e.l.t...T...r.k.e.i...Z.y.p.e.r.n...K.o.m.o.r.e.n.....g.y.p.t.e.n...A.l.g.e.r.i.e.n...B.o.l.i.v.i.e.n...N.o.r.w.e.g.e.n...O.s.t.a.s.i.e.n...S.c.h.w.e.d.e.n...S...d.a.s.i.e.n...S...d.s.u.d.a.n...M.a.l.e.d.i.v.e.n.....t.h.i.o.p.i.e.n...C.o.o.k.i.n.s.e.l.n...F.r.a.n.k.r.e.i.c.h.....s.t.e.r.r.e.i.c.h...D.e.u.t.s.c.h.l.a.n.d...K.o.k.o.s.i.n.s.e.l.n...N.i.e.d.e.r.l.a.n.d.e...P.h.i.l.i.p.p.i.n.e.n.....l.a.n.d.i.n.s.e.l.n...G.r.i.e.c.h.e.n.l.a.n.d...K.a.i.m.a.n.i.n.s.e.l.n...L.a.t.e.i.n.a.m.e.r.i.k.a...M.i.t.t.e.l.a.m.e.r.i.k.a...N.e.u.k.a.l.e.d.o.n.i.e.n...E.l.f.e.n.b.e.i.n.k...s.t.e...F.a.l.k.l.a.n.d.i.n.s.e.l.n...M.a.r.s.h.a.l.l.i.n.s.e.l.n...N.o.r.d.m.a.z.e.d.o.n.i.e.n...P.i.t.c.a.i.r.n.i.n.s.e.l.n...W.e.i.h.n.a.c.h.t.s.i.n.s.e.l.....u...e.r.e.s. .O.z.e.a.n.i.e.n...S.u.b.s.a.h.a.r.a.-.A.f.r.i.k.a...S...d.l.i.c.h.e.s. .A.f.r.i.k.a.....q.u.a.t.o.r.i.a.l.g.u.i.n.e.a...B.r.u.n.e.i. .D.a.r.u.s.s.a.l.a.m...E.u.r.o.p...i.s.c.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):92
                                                                                                Entropy (8bit):3.2671709230250316
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tluFkC/qql3dsalqhE:Sv6kZSBlqhE
                                                                                                MD5:DEF3D8069BB3F45379085CFF1EA1996C
                                                                                                SHA1:5D3AB1B6D9A8D7F1AA9DB960CE351D48901EE966
                                                                                                SHA-256:28FA3D1D9F85BBC9F344B1770319754341F34237383A73894800D63C4F3B46D0
                                                                                                SHA-512:544F0896F423D5B92A4E02A23776F3941F54E6CDE3BBE6453F4580C9E68A61E7B425579A96966B33770D55675E49168A99E6CB8087204EBF0BB4C9E2467B4F4B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..........................5K.y..................P.!.`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):8476
                                                                                                Entropy (8bit):4.518835379037381
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:WhO7Lb3bYnDYxGYND13fatg05W2ai1vzLeG1ZcYaALYHBBEQqpJ8l3y4L:WhKLbCYxbND18g05f9LtKFq844L
                                                                                                MD5:B32404B41A7BC39D37EA29C78CD0BF57
                                                                                                SHA1:2D3A4547D3CC57FD7FF76335B8FF44003BF679C5
                                                                                                SHA-256:77BAF4407E2F8B92AB213C8D905483AC6670AEE91392D7928314523D210B422F
                                                                                                SHA-512:9FA15CFD5C2E26EA7C050532E85EC2D6BE4640B2AD89E2F0DB4E681FAA642BE78544B57F7788330DBD0084FEC6FED6B2FF05597A7CA0C49E688BC1F651D20649
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................8.. ........?...?...&.......8...5K.y....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1782170728203383
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
                                                                                                MD5:7621254D9D701161592F4F0CBBF6F7BF
                                                                                                SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
                                                                                                SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
                                                                                                SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..!....................!....5K.y........a..!
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1782170728203383
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
                                                                                                MD5:7621254D9D701161592F4F0CBBF6F7BF
                                                                                                SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
                                                                                                SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
                                                                                                SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..!....................!....5K.y........a..!
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1782170728203383
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
                                                                                                MD5:7621254D9D701161592F4F0CBBF6F7BF
                                                                                                SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
                                                                                                SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
                                                                                                SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..!....................!....5K.y........a..!
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1782170728203383
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
                                                                                                MD5:7621254D9D701161592F4F0CBBF6F7BF
                                                                                                SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
                                                                                                SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
                                                                                                SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..!....................!....5K.y........a..!
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):3.2778628487696895
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlu1clst0t8tVV1LlUlh+V/91mNJi:SvKclsGt8bHLOl0sNs
                                                                                                MD5:425F7078B30F5B06665033F62FECC465
                                                                                                SHA1:11D34F02901FDEA72514A99542F69029AFC4030C
                                                                                                SHA-256:B4FACD886D586845AB18C1F33F2842BDB4550C002959724A42FE303E5A7EB2A7
                                                                                                SHA-512:7A8217E2B5B7998732824D70428DDA3C6C4A77BF333B097778909E8C477B626C27130E22580B6D1C7BEC95A78B1455D3803F73015CD296D759CAA37870A0FD56
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................5K.y..2...1...4.8...5.0.............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1782170728203383
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
                                                                                                MD5:7621254D9D701161592F4F0CBBF6F7BF
                                                                                                SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
                                                                                                SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
                                                                                                SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..!....................!....5K.y........a..!
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1782170728203383
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
                                                                                                MD5:7621254D9D701161592F4F0CBBF6F7BF
                                                                                                SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
                                                                                                SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
                                                                                                SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..!....................!....5K.y........a..!
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1782170728203383
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
                                                                                                MD5:7621254D9D701161592F4F0CBBF6F7BF
                                                                                                SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
                                                                                                SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
                                                                                                SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..!....................!....5K.y........a..!
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1782170728203383
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
                                                                                                MD5:7621254D9D701161592F4F0CBBF6F7BF
                                                                                                SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
                                                                                                SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
                                                                                                SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..!....................!....5K.y........a..!
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1782170728203383
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
                                                                                                MD5:7621254D9D701161592F4F0CBBF6F7BF
                                                                                                SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
                                                                                                SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
                                                                                                SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..!....................!....5K.y........a..!
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1782170728203383
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
                                                                                                MD5:7621254D9D701161592F4F0CBBF6F7BF
                                                                                                SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
                                                                                                SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
                                                                                                SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..!....................!....5K.y........a..!
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1782170728203383
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
                                                                                                MD5:7621254D9D701161592F4F0CBBF6F7BF
                                                                                                SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
                                                                                                SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
                                                                                                SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..!....................!....5K.y........a..!
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1782170728203383
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMwMllJ8lvm1Z:Sv9Rvm1Z
                                                                                                MD5:7621254D9D701161592F4F0CBBF6F7BF
                                                                                                SHA1:D41412336A9893E9A9DD439B13A3C65435018DA3
                                                                                                SHA-256:DB13F9C7B55BCCF734F5C6D3C56DFED65EDA9DC7976E24F0A862F2408A6E529F
                                                                                                SHA-512:DFE7EACC4058D1862EB6EF8305A388BD27249FE2B91DF08C3102928B066454B322FB55AC7A34DE0E27A87D2112B6A374E674B27B1296240EFE46C5BB135D0A20
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..!....................!....5K.y........a..!
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1376531665973815
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
                                                                                                MD5:847E775630F25D5D30746D2ABA9615C0
                                                                                                SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
                                                                                                SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
                                                                                                SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.. .................... ....5K.y........a..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1376531665973815
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
                                                                                                MD5:847E775630F25D5D30746D2ABA9615C0
                                                                                                SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
                                                                                                SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
                                                                                                SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.. .................... ....5K.y........a..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.178217072820338
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM/llCy8lvm1H:Svhlvm1H
                                                                                                MD5:558E0FDA40BF93F5445F09E14F2ACC09
                                                                                                SHA1:FD9E71B80869C8BC7870FD2946D2C3B84EBA5E0C
                                                                                                SHA-256:CDF68F3DA7C805CC6792BA6A17654EB87E429F01BE96957FB2F468444E334D4C
                                                                                                SHA-512:46DFC8C70742851B726EF03359880D49371A03F9264BDF4E7B5A0C47DA978EF19C8034DD2D56BFAFCD6329713F8EA40077535BB4BAD4FBE942CF7830FA7BBE6F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.*#...................*#....5K.y........a.)#
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1376531665973815
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
                                                                                                MD5:847E775630F25D5D30746D2ABA9615C0
                                                                                                SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
                                                                                                SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
                                                                                                SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.. .................... ....5K.y........a..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1376531665973815
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
                                                                                                MD5:847E775630F25D5D30746D2ABA9615C0
                                                                                                SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
                                                                                                SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
                                                                                                SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.. .................... ....5K.y........a..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):88
                                                                                                Entropy (8bit):2.7148996570578574
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlKelBjlgljl/k8ALlQpo:SBtkJTl4Kl2o
                                                                                                MD5:12BE3D5BB9B96E2BE6DA7B2DD273699A
                                                                                                SHA1:3A4556BD049B2C67A408A789DB6812780D606332
                                                                                                SHA-256:D8D507E53D278D6B3F9322121CD46D54D9629FF946869C8D4CD941F0F777C2A6
                                                                                                SHA-512:B7FACCFB049ECF7EA5B9C93274A3B9B2E6AB894EAC0099D72150BD31401356179A2A5E6DCB0650958F567D586F67CCD768FA78C6D40DF3229FDE0498ACB29F55
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................5K.y..e.n._.Z.W.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1376531665973815
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
                                                                                                MD5:847E775630F25D5D30746D2ABA9615C0
                                                                                                SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
                                                                                                SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
                                                                                                SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.. .................... ....5K.y........a..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1376531665973815
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
                                                                                                MD5:847E775630F25D5D30746D2ABA9615C0
                                                                                                SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
                                                                                                SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
                                                                                                SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.. .................... ....5K.y........a..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1376531665973815
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
                                                                                                MD5:847E775630F25D5D30746D2ABA9615C0
                                                                                                SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
                                                                                                SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
                                                                                                SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.. .................... ....5K.y........a..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1376531665973815
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
                                                                                                MD5:847E775630F25D5D30746D2ABA9615C0
                                                                                                SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
                                                                                                SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
                                                                                                SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.. .................... ....5K.y........a..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1376531665973815
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
                                                                                                MD5:847E775630F25D5D30746D2ABA9615C0
                                                                                                SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
                                                                                                SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
                                                                                                SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.. .................... ....5K.y........a..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1376531665973815
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
                                                                                                MD5:847E775630F25D5D30746D2ABA9615C0
                                                                                                SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
                                                                                                SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
                                                                                                SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.. .................... ....5K.y........a..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.1376531665973815
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMbEllljq8lvm1g:Sv9Tvm1g
                                                                                                MD5:847E775630F25D5D30746D2ABA9615C0
                                                                                                SHA1:A538E1D8A5ACDBDEC4C3FE3123A46E6311A466DE
                                                                                                SHA-256:4B49D73F1DACC88C3C58BDC9C73014345F9535AD76AF80B72881CA618E0AB804
                                                                                                SHA-512:C7A9C62D9EE17004FB9DABAD8B1877D80387692B50447D1CBAF6178CBA89E56FA4272F7292BA9E26BAFA7585C403580093A5E022031F6D0B96E44C7FF4357BCB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.. .................... ....5K.y........a..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):5384
                                                                                                Entropy (8bit):4.242133896275624
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:+q34wFWjpAlhpy3wVbTUx+5kb5fX93jXQgTge9DsWwiO54pI8:+laUp3gVcxxJXZlwWI8
                                                                                                MD5:98528308F1FBAEFA8C3B0FB33504D201
                                                                                                SHA1:FD88A585EA8127FD54455FF6D9200EC326643542
                                                                                                SHA-256:E5E971CB075C187954AABDD790B9C86B620A9DECA9AB7BC5D95ED401C4B6A789
                                                                                                SHA-512:5DBAC04412DA84E6E8EB03192257C7A7F87169F60E0CA84EF278FF4A2271249BBC3C9BF7BDFF04B6E0763836AEC137F1229B5F1F80F081BC175A67B7BC0BAE8D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................6.. .......:...:..........6...5K.y..K.u.b.o...N.i.u.o.....a.d.o...A.r.u.b.o...F.i...o.j...G.a.n.a.o...G.v.a.m.o...I.r.a.k.o...I.r.a.n.o...K.e.n.j.o...K.i.p.r.o...L.a.o.s.o...L.i.b.i.o...M.a.l.i.o...M.a.l.t.o...M.o.n.d.o...N.a.u.r.o...O.m.a.n.o...P.e.r.u.o...S.a.m.o.o...S.i.r.i.o...T.o.n.g.o...U.s.o.n.o.....i.l.i.o...A.n.d.o.r.o...A.n.g.o.l.o...B.e.l.a.m.o...B.e.l.i.z.o...B.e.n.i.n.o...B.u.t.a.n.o...D.a.n.u.j.o...F.e.r.o.o.j...G.a.b.o.n.o...G.a.m.b.i.o...G.u.j.a.n.o...H.a.i.t.i.o...J.e.m.e.n.o...K.a.n.a.d.o...K.a.t.a.r.o...M.a.j.o.t.o...N.i...e.r.o...P.a.n.a.m.o...R.e.u.n.i.o...R.u.a.n.d.o...R.u.s.u.j.o...S.u.d.a.n.o...T.o.g.o.l.o...T.u.v.a.l.o...U.g.a.n.d.o...Z.a.m.b.i.o.....e.%.u.j.o.....i.n.u.j.o...A.l...e.r.i.o...A.n.g.v.i.l.o...B.a.h.a.m.o.j...B.a.r.b.a.d.o...B.a.r.e.j.n.o...B.e.l.g.u.j.o...B.o.c.v.a.n.o...B.o.l.i.v.i.o...B.r.a.z.i.l.o...B.r.u.n.e.j.o...B.u.r.k.i.n.o...B.u.r.u.n.d.o...D.o.m.i.n.g.o...E.r.i.t.r.e.o...G.r.e.k.u.j.o...G.r.e.n.a.d.o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2728
                                                                                                Entropy (8bit):5.60522054715822
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:EWYU030ufLAfsS/f2S0XIXQA8Bhn9hhwQUCfpJNnqpZXXZJ8HHzHH7hiWVZGj30o:Kkd6OgbBhbLfqppH8nzbhiWV4b0Vdf7c
                                                                                                MD5:C14DCD32E8D42B8370097C12830ECB57
                                                                                                SHA1:CF0E293A0E96C09326DED5F34BFF1FC93AED6BB4
                                                                                                SHA-256:5CE6979AF3C70651590A24EC3CEE816A344FCF8600B8D271E181A1C36C37D86F
                                                                                                SHA-512:7D3EC5A047E5817EC850B8F86CE54F7E00196762A8FC6418122ACF2F2A0F1336490B9D8882029A52FB14439240B6F414DDE844FD855C6641BC13EEDAA85FFC21
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................$...........5K.y..F.i.y.i...J.a.p...n...T...n.e.z...B.a.r...i.n...B.e.l.i.c.e...Y.i.b.u.t.i...A.r.g.e.l.i.a...C.u.r.a.z.a.o...R.u.m.a.n...a...U.c.r.a.n.i.a...C.a.n.a.r.i.a.s...E.s.u.a.t.i.n.i...P.a.k.i.s.t...n...B.a.n.g.l.a.d...s...I.s.l.a.s. .C.o.o.k...S.u.d.a.m...r.i.c.a...I.s.l.a. .B.o.u.v.e.t...I.s.l.a. .d.e. .M.a.n...I.s.l.a.s. .F.e.r.o.e...I.s.l.a.s. ...l.a.n.d...S.a.n.t.a. .E.l.e.n.a...I.s.l.a.s. .C.a.i.m...n...C.e.n.t.r.o.a.m...r.i.c.a...I.s.l.a.s. .S.a.l.o.m...n...L.a.t.i.n.o.a.m...r.i.c.a...I.s.l.a.s. .M.a.l.v.i.n.a.s.....f.r.i.c.a. .c.e.n.t.r.a.l...I.s.l.a. .C.l.i.p.p.e.r.t.o.n...I.s.l.a. .d.e. .N.a.v.i.d.a.d...N.a.c.i.o.n.e.s. .U.n.i.d.a.s...G.u.a.y.a.n.a. .F.r.a.n.c.e.s.a...M.a.c.e.d.o.n.i.a. .(.E.R.Y.M.)...C.o.n.g.o. .(.R.e.p...b.l.i.c.a.)...R.e.g.i...n. .d.e.s.c.o.n.o.c.i.d.a...C.i.u.d.a.d. .d.e.l. .V.a.t.i.c.a.n.o...R.A.E. .d.e. .M.a.c.a.o. .(.C.h.i.n.a.)...S.v.a.l.b.a.r.d. .y. .J.a.n. .M.a.y.e.n...I.s.l.a.s. .T.u.r.c.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):772
                                                                                                Entropy (8bit):4.071665057159609
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:WWzvl0UvlDaaudl04l0UuwlDilDazqOelTX2gzqLm1E9glTil5CeIPGrrs:WSaFEOcaG3Gy1KzCeIPGrrs
                                                                                                MD5:A2E29CC845CD8635840D0B780BE8C621
                                                                                                SHA1:8F05A3933C55E391BEA0FA2A03418FDE3A628ADA
                                                                                                SHA-256:F2A8F7EC03500DA1D48461C5C9654EDB97D59DD8B3B49E8010A117EA4A0BFDA3
                                                                                                SHA-512:3D2BC9A507ECC5B663B8C38DEAA80750E7E96603E660719FE92976D212D7E6A36640BC0197645864BA378944E51CA3AA6D50BFEB29356DD4A8AD6A2CF0A80498
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .........................5K.y..R... .U.....A.s.i.a. .d.e.l. .E.s.t.e...A.s.i.a. .d.e.l. .O.e.s.t.e...I.s.l.a. .A.s.c.e.n.s.i...n...I.s.l.a.s. .C.a.n.a.r.i.a.s...E.u.r.o.p.a. .d.e.l. .E.s.t.e.....f.r.i.c.a. .d.e.l. .E.s.t.e...A.s.i.a. .s.u.d.o.r.i.e.n.t.a.l...E.u.r.o.p.a. .d.e.l. .O.e.s.t.e.....f.r.i.c.a. .d.e.l. .O.e.s.t.e...I.s.l.a.s. .U.l.t.r.a.m.a.r.i.n.a.s...R.e.p...b.l.i.c.a. .d.e.l. .C.o.n.g.o...r.e.g.i...n. .d.e. .M.i.c.r.o.n.e.s.i.a...I.s.l.a.s. .U.l.t.r.a.m.a.r.i.n.a.s. .d.e. .E.E...U.U.....C.o.n.g.o. .(.R.e.p...b.l.i.c.a. .D.e.m.o.c.r...t.i.c.a. .d.e.l. .C.o.n.g.o.).......&.*.2.B.F.J.N.Z.j.r.v.z.........a...........2.S.n.p.>..m.^..MN..\......4k_....z..fb...$.....A.j=Z.....y........................PK..PN..P)#.`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):128
                                                                                                Entropy (8bit):4.0106388429862925
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlEFU/glo7BgTlRP2OcqVA6e4PoY/ef:Sv8U/go7wlp2O3Xq3f
                                                                                                MD5:23FF1E45B7F45B8C1CDF06E183359019
                                                                                                SHA1:34A374D2661E3E7620A680A3EB08AC3015C15645
                                                                                                SHA-256:70DA312294D03A617A82BA66B202FAF9013C1D75899BC4FABAFA3F584CE84FBA
                                                                                                SHA-512:F9574D339FC5C258E36C3C6B85CDCF7BB18105547205C7D6A8640126F5DCC23F63B38B0998CE1E7B5311A0C846567C905447CC7FDDC33D71A2448E70D7A8110D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................5K.y........2.S.n.p.jh.Q......y....................`...P...P. .`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):124
                                                                                                Entropy (8bit):3.8643215884156596
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tldS/mmJ7lNzwd0OkGtl36e4Poe9gF:Sv0/mmRw2OJKq5
                                                                                                MD5:DF8C1B6C2E9D796CC17FDC48CDE3CB5F
                                                                                                SHA1:6B58526E194EB5461EB52568711CF490FC6CE325
                                                                                                SHA-256:6423A955DC8A45912DC4CA81AAA6EDE3554C2DAD3EFE200FF97428EC88995DA0
                                                                                                SHA-512:7C8085034258EBACDA4948E6FCEBCE0F4D9B56DA4FC6377E4CC94B042FC54F9F775D93D6EFBD9877D9E453C9C31876F905E8953298C71C37CF720DEE2FEF9DB2
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................5K.y........2.S.p.jh.Q....y....................`...P...P. .`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):124
                                                                                                Entropy (8bit):3.8643215884156596
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tldS/mmJ7lNzwd0OkGtl36e4Poe9gF:Sv0/mmRw2OJKq5
                                                                                                MD5:DF8C1B6C2E9D796CC17FDC48CDE3CB5F
                                                                                                SHA1:6B58526E194EB5461EB52568711CF490FC6CE325
                                                                                                SHA-256:6423A955DC8A45912DC4CA81AAA6EDE3554C2DAD3EFE200FF97428EC88995DA0
                                                                                                SHA-512:7C8085034258EBACDA4948E6FCEBCE0F4D9B56DA4FC6377E4CC94B042FC54F9F775D93D6EFBD9877D9E453C9C31876F905E8953298C71C37CF720DEE2FEF9DB2
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................5K.y........2.S.p.jh.Q....y....................`...P...P. .`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):5404
                                                                                                Entropy (8bit):4.578439940354441
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:SXjLsIJwCDfQTlHAGxZz8FK1EKdDELXpemPutAdqppH8nzb0hHPjNxGV5JvT:EMIJJoTVlZAFvpeKqpJ8sdPjPGvT
                                                                                                MD5:AA5B93E87201E9BC7D60A49500C120D5
                                                                                                SHA1:866C65836AB4B81286A9C9D2977525D22EDED8B7
                                                                                                SHA-256:61C1D44AD67600EDF24B3616C3DBEDE66FF4C3CC9F297FB911D3C056D684E8EA
                                                                                                SHA-512:E233D5C0B0EFDCD22DE81F7E042D676A60B0A1F2DB95B21685542673C60343CD52D072294011B0CD9A051741E5A0C74F301CF16DAF0F4CAB8CAB0F6710344472
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................8.. .0......?...?...$.....0.8...5K.y..C.I...T.x.a.d...T.x.i.l.e...T.x.i.n.a...Z.i.p.r.e...G.r.e.z.i.a...M.u.n.d.u.a...S.u.e.d.i.a...S.u.i.t.z.a...T.x.e.k.i.a...A.i.n.g.i.r.a...B.a.h.a.m.a.k...B.e.l.g.i.k.a...E.r.r.u.s.i.a...K.a.r.i.b.e.a...K.r.o.a.z.i.a...E.s.p.a.i.n.i.a...F.r.a.n.t.z.i.a...K.a.n.a.r.i.a.k...K.a.n.b.o.d.i.a...K.o.l.o.n.b.i.a...K.o.m.o.r.e.a.k...M.a.l.d.i.v.a.k...M.a.u.r.i.z.i.o...E.r.r.u.m.a.n.i.a...E.s.l.o.v.a.k.i.a...E.u.r.o.g.u.n.e.a...F.i.l.i.p.i.n.a.k...M.a.z.e.d.o.n.i.a...M.o.z.a.m.b.i.k.e...B.o.l.i. .K.o.s.t.a...F.a.l.k.l.a.n.d.a.k...H.e.g.o. .K.o.r.e.a...H.e.g.o. .S.u.d.a.n...H.e.g.o.a.f.r.i.k.a...I.p.a.r. .K.o.r.e.a...K.o.n.g.o. .(.D.R.)...L.u.x.e.n.b.u.r.g.o...S.a.n. .M.a.r.t.i.n...M.a.n. .u.h.a.r.t.e.a...S.a.n.t.a. .L.u.z.i.a...S.e.y.c.h.e.l.l.e.a.k...H.e.g.o. .A.m.e.r.i.k.a...I.p.a.r. .A.m.e.r.i.k.a...N.a.z.i.o. .B.a.t.u.a.k...A.s.i.a. .e.k.i.a.l.d.e.a...C.o.o.k. .u.h.a.r.t.e.a.k...L.a.t.i.n.o.a.m.e.r.i.k.a...A.s.i.a. .e.r.d.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):5828
                                                                                                Entropy (8bit):4.714886250548154
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:IMcfQynIgD52g/jk9vCKeXSwj1DsRM3r+HkLUqppH8nzb4znli5IX:IAynI652X96+RMKHkLUqpJ8+nI5IX
                                                                                                MD5:24089A0D9EAA78C1AD8E02AD7ACEE3C7
                                                                                                SHA1:AFD0C33AE4285C95DE0C248EBA5374F608ABB799
                                                                                                SHA-256:A36815C3A7108C8E95357A448FD6EEBEC3734933B22D6C496A6716029BFE06FC
                                                                                                SHA-512:EE148F7B4986F5A08A990055B45B6931F63CA621F5190D2FC287B8DFFDE61E93ACADFA963B98B7DC4D9EDD50B4E7646AC5AF07294B139BB02845FF874E03CDE3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .6..............$.....6.....5K.y..:.F.'...~.1.H...(.F...F...,.1.2.....,.G.'.F...3.H.&./...3...4.D...4...D.....D...(.....E.'.D.*...F.1.H.....F.~.'.D.....'.~.F.....F...'.....H.(.'.....'.(.F.......F.G...(.1.2...D...(.D.........*.1.....G...3.'.E.H."...3.F...'.D...3.H.&...3...3.H./.'.F...D.*.H.F.....E.'.D.2.....E.'...H.*...E.H.1...3...E...2.......F...H.&.G.....H.2.H.H.....H.E.H.1.....1.F.2.......H...'.F...".D.(.'.F.....".F./.H.1.'...".F...H.D.'...'.*...H.~.....'.3.*.H.F.....'...1.D.F./...'...3.D.F./...(.'.G.'.E.'...(.1.H.F.&.....(.D.'.1.H.3...(.H.D...H.....*.'...D.F./...*.H.H.'.D.H...,...(.H.*.....1.H.'.F./.'...1.H.E.'.F.....3.H.E.'.D.....A.F.D.'.F./...D.G.3.*.'.F...D...(.1...'...E.'.D./...H...E.'...'.&.H...E.D.'.F.2.....F...,.1...G...G.'.&...*.....~.'.D.'.&.H...~.1.*.:.'.D.....'.E.(.H.,.....'.F.'./.'.....1.H.'.3.......D.E.(...'.....1.F.'./.'...".F...H...D.'...'.1.H...H.&.G...'.3.1.'.&...D...'.3.D.H.'.......'.3.D.H.H.F.....'.3.~.'.F...'...'.D.,.2.'...1...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):5156
                                                                                                Entropy (8bit):4.251772609765763
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:nAThdY+tbd/q98SkZ7M6XUgLuH9y0DbhiNvP438wRA+mwiisgtjHLgJb0kXF9D5y:nGY+tc98SkZ7DXhKH97hiNvPG80A+IiZ
                                                                                                MD5:34122262DC803793983D52A11C615FDA
                                                                                                SHA1:492D2CB109D6C4A7E702BE1D98648EE4BB8BD7CD
                                                                                                SHA-256:1D0ECD0E39D703CC42CADC71DF42DA24F217264C5F16BA650CF0B256A7A4F466
                                                                                                SHA-512:9525D2068DB493577999BA3ED3894A434002000DF6420C9B658065410793E1FEA7551BC846FEF2FB869758E1EA5DA469A518B2DB4512022A4A9FA1CEF1BFBF78
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................5K.y..C.a.a.d...B.e.n.e.e...C.i.l.i.i...E.j.i.p.t...E.n.n.d.o...F.i.j.j.i...G.a.b.o.o...G.a.n.a.a...G.u.w.a.m...K.e...a.a...K.u.b.a.a...L.i.b.a.a...M.a.l.t.e...M.a.r.u.k...N.i.u.w.e...P.o.l.o.....S.a.p.o.o...S.i.r.i.i...T.o.g.o.o...B.e.l.j.i.k...B.u.t.a.a.n...E.c.o.p.p.i...E.s.p.a.a.....G.a.m.m.b.i...G.e.r.e.e.s...G.i.y.a.a.n...H.a.y.t.i.i...L.a.w.o.o.s...M.a.y.o.o.t...M.e.k.s.i.k...M.o.r.i.i.s...N.e.p.a.a.l...N.i.j.e.e.r...R.i.i.s.i.i...S.a.m.m.b.i...S.e.y.s.e.l...S.i.i.p.a.r...S.u.d.a.a.n...S.u.w.e.e.d...S.u.w.i.i.s...T.u.r.k.i.i...A.l.a.s.e.r.i...A.l.b.a.n.i.i...A.r.m.e.n.i.i...B.a.h.r.e.y.n...B.e.l.i.i.s.e...B.o.l.i.w.i.i...B.u.r.n.a.a.y...F.e.n.l.a.n.d...G.a.r.n.a.a.d...J.a.m.a.y.k.a...J.e.o.r.g.i.i...J.i.b.u.t.i.i...J.o.r.d.a.n.i...K.a.n.a.d.a.a...K.u.w.e.y.t.i...L.e.t.o.n.i.i...M.a.l.e.s.i.i...N.a.m.i.b.i.i...N.o.r.w.e.e.s...O.n.n.g.i.r.i...O.t.i.r.i.i.s...P.a.n.a.m.a.a...R.e.w.i...o.o...R.u.m.a.n.i.i...S.a.m.o.w.a.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.945547915629603
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/d5YMpDP:SBtkJYlU8g8l/TYoP
                                                                                                MD5:7DF062A814A126F44A2C5EBF127DE11C
                                                                                                SHA1:6707F6D94B7418959EC6EE7C4EE5EF367F0ABE2E
                                                                                                SHA-256:C388334A402D74EC1071728367218E1F2E5C1F146DA3B08605FBE53D3D00ABC3
                                                                                                SHA-512:DEB4D2B65AEA64315B5A5CDE8E72DCAA75A6682D17625589D06396747CF905413BB4DFC13BB5DDCE68AF75A6DDB50E97705E192A28F846E5DE1A4529D787B9BD
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................5K.y..f.f._.L.a.t.n._.G.N...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9159246284584364
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMAt66E7lol1Bsnn:SvHt66goDq
                                                                                                MD5:A0838E6D15B5072DC03BAEB7F98ED41A
                                                                                                SHA1:98AB23737463E55ADA302D75545A9BB32BE19272
                                                                                                SHA-256:825E5F4187683FE01E0FFF595D7CB7CAB8654C5699F0D8386E6C3625A5E3B19F
                                                                                                SHA-512:B4F64FA488F5AF2465E5F986C7B505DF49C23166C022E13DBE764047833735551F67C2F3DACDFFF46A30847E8303DF96270471F990AC48353E6A5BAACAFC3D2A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.. .................... ....5K.y.......
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/dsp:SBtkJ1li6gml/8
                                                                                                MD5:3F209B3AA35603DCBB208A74CAA36C86
                                                                                                SHA1:249DE057005BE697205333ABA0433C5B04653BBB
                                                                                                SHA-256:F3965E339C622C96879DEE316DE42F9E9F693DDEB7A52FDCEBBA027171F2C86A
                                                                                                SHA-512:02411AE5728814057E0CA78D850EEA85B3ACA16DFDBEE97A7C01860DA3B82640EEBE60960938C7F64B05D9E9FE8BAE0B826D242E24B33C40024836F716F17E31
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................5K.y........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):176
                                                                                                Entropy (8bit):3.5291796110164784
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tldFnsllllFxJlzlFlbiYZfUfC0faLkgBIlFUfC0/H24E83lqQt:Sv3MrJZZVZsfaITlFUf24R38Qt
                                                                                                MD5:1A3462FEC297B2C16F431412597054F7
                                                                                                SHA1:5F64484F8A239947F3342543A56DC75B21794B66
                                                                                                SHA-256:A384B7D7029CDF47B70D23110B710D332E117E6FEA9BE44ED331FB54E0B61105
                                                                                                SHA-512:153B73F97468E705286D0FF7D9B391A4EC1DBD3972DA1F1502A18ECC2424F4B3E860913D03391CE374DA1E144C631D2474306A4A300EF503B6554642CAD31473
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................ .. .C!.....$...$.........C! ...5K.y....l.e.s. .G...o.r.g.i.e. .d.u. .S.u.d. .e.t. .S.a.n.d.w.i.c.h. .d.u. .S.u.d.........B!D!..........(..P. .`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):9100
                                                                                                Entropy (8bit):4.109836759452686
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:7uZ267GlZYl+oV6Xsi+626PCAUTI3ifXqpJ89CezL:7uZGDYl+lXsL623AU5vq89Ce/
                                                                                                MD5:282EF635F3BD6E8FBCFCF5D73C7BFD69
                                                                                                SHA1:6F8B12533ED59E55FB32F5800AFFA4BCE44F3C83
                                                                                                SHA-256:DDDDB61FDEAA80A7571BE1679CDE4C1E5596A7DAED657D9A583F4BEF6BF2FE01
                                                                                                SHA-512:894DFA667F6E347BB5A7B278EB00DC124DC03ADF3E666E30B586A3D068E314CD313DA365AD59652DE6BF8C42AB91B47B43B139D926503155E670C6F51A4AFF7D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .9..............$.....9.....5K.y..R.A...C...b.a...F...d.i...G...n.a...O.m...n...A.r...b.a...B.u.t...n...I.o.r...c...I.o.r...n...M...i.l.i...P.e.a.r.....S.u.d...n...A.n.g...l.a...B.e.i.n.i.n...C.e.i.n.i.a...C.o.i.r...a...E.a.r.t.r.a...I...r.d.a.n...L.i.b...i.r...L...t.h.o.s...M.o.r.o.c.o...N.a.b.h.r.u...N.e.a.p...l...N...g.e.i.r...P.a.l.a.b.h.....i.r.i.n.n...A.n. .R.u.i.s...B.r.a.i.s.i.l...C.a.m.a.r.u.n...C...o.p.r.a.s...H.a.i.d.h.t.i...I.o.s.r.a.e.l...L.e.a.s.o.t.o...M.a.c...t.h.u...M.i...n.m.a.r...S.a.m.o.t.h.a...S.u.r.a.n.a.m...S...i.m.b.i.a...T.u.b.h.a.l.u...A.i.l.d.i.r.i.a...A.l.b...i.n.i.a...A.n. .E.a.m.a.n...A.n. .I.t.i.o.p...A.n. .T.u.i.r.c...A.n. .t.-.S...n...B.a.c.h.r.a.i.n...B.e.a.r.m...d.a...B.r...n.a.i.g.h...C.i.r.i.b.e.a.s...C.u.i.b.h...i.t...D.i.a.m.e.u.g.a...E.a.c.u.a.d.o.r...G.r.e.a.n...d.a...G.u.a.d.a.l.u.p...H.o.n.d...r.a.s...L.e.a.b.a.n.o.n...M.e.a.g.s.a.g.o...N.i.g...i.r.i.a...P.a.g.a.s.t...n...R.o.m...i.n.i.a...R.u.b.h.a.n.d.a...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):6328
                                                                                                Entropy (8bit):4.404428572830834
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:3iSCgOFoYpnCF4F1EwQkfsk8mhcfhuRNBs8e8Rn:3xsFoUnO4F1EwhUkFqfh+NKx81
                                                                                                MD5:98AD672586E6D840D2E1F903F6838857
                                                                                                SHA1:5D2DE185390D877CA6738CDEED7DAAC00AA8FAEC
                                                                                                SHA-256:E7F66CA60655C291257B10EAD74E9F6EF964BCF726A3D57FF82229DBB9D06CFB
                                                                                                SHA-512:8EF1F94EF329FFB902709D9A48ABA711E30D18877969EAEACE38E3B5B8674D92C0F4859CCD20BBA48C2446C5683B999838DAC76230CB621B06C672B38A1B5C7D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .0......&...&.........0.....5K.y..W...l.t...A.a.s.i.e...J.e.e.m.e...L.a.a.o.s...P.o.o.l.e...T.o.o.g.o...C.h.i.i.n.a...G.g.a.t.a.r...G.i.n.e.e.a...K.e.e.n.i.a...K.u.w...i.t...L.....b.i.e...M.a.j.o.t.t...S.a.m.o.o.a...S...r.b.i.e...S.....r.i.e...Z.y.p.e.r.e.....g...p.t.e...E.u.r.o.o.p.a...F.i.t.s.c.h.i...G.....r.n.s.i...I.t.a.a.l.i.e...K.o.m.o.o.r.e...L.e.s.o.o.t.o...L.i.t.t.a.u.e...S.c.h.w.i.i.z...T.s.c.h.i.l.e...T...r.g.g.e.i...W.i.e.t.n.a.m...A.l.b.a.a.n.i.e...A.l.g.e.e.r.i.e...A.r.m.e.e.n.i.e...B.a.c.h.r...i.n...B.a.h.a.a.m.a.s...B.e.r.m.u.u.d.a...B.o.l.i.i.v.i.e...B.r.a.s.i.l.i.e...D.s.c.h...r.s.i...E.e.s.t.l.a.n.d...G.e.o.o.r.g.i.e...G.u.a.d...l.u.p...K.r.o.a.a.z.i.e...L.i.b.e.e.r.i.a...M.a.l...i.s.i.a...N.a.m.i.i.b.i.a...N.i.g.e.e.r.i.a...N.o.r.w.e.e.g.e...R.e...n.i.o.o.n...R.u.m.....n.i.e...S.c.h.p.a.n.i.e...S.c.h.w.e.e.d.e...S.l.o.w.a.k...i...S.o.m.a.a.l.i.e...T.o.m.i.n.i.c.a...T.u.n.e.e.s.i.e...T...n.e.m.a.r.k...U.k.r.a.i.i.n.e.....r.i.t.r.e.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):8168
                                                                                                Entropy (8bit):4.603147322781166
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:ynPbwZCbJ4ocfZAA6crroWqz8mDoJDAYgqpJ8GHl/GOsY:yPcZkJzvcnNaeMYgq80B
                                                                                                MD5:87C78D1DDED3E5D2989F06A7E2A03D3E
                                                                                                SHA1:66D8D13763AC9AE97B1AF622245799DD3FC68DA1
                                                                                                SHA-256:39C5A4BFA961A082D2B43D46B8ED1EC5C9B7966BD9023715BEFEB8BBF6F9090D
                                                                                                SHA-512:B7A8234A5010168B92FA785E4622BC769C1EE6A78AFB23FF37AD7CAF495AFF2B940EAA7B33CBBDD5C6DAD16EBF67BECA71897EA5D775E512AA7B63BFE1B38552
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..!.............$......!....5K.y....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):7156
                                                                                                Entropy (8bit):4.395054498069301
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:9I6aIJRhl/hzSrOK77dWbfK7xevyGjyQrnUjJ0JbTm0INwRqppH8nzb5YPKqLF:O67RhLzsdWMGyGjPrU4QqRqpJ8xYPKqh
                                                                                                MD5:881EE7330ACCAF45638EA4108DE598A8
                                                                                                SHA1:7A645D5FE2D1AC5E744FE8DA55C02D462878E34F
                                                                                                SHA-256:88A3250FEEE3C95AB54275107965BDC80B4665DF37BFEC1C6771C33A26E19397
                                                                                                SHA-512:775A64ADB24F5B35585FAEC7AD22867CC2F4C3145B05F25E1CFDFD3D191B99A67F9B6D909A0B0927ABFC2045914512C485A8BA3C2866C8D1B18522B41EB7206B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..z.............$......z....5K.y..S.....B.N.A...M...n...G.v.a.m...K...n.a...K...b.a...N...r.....P.a.l.....S...l.e...T...g.......r.a.k.....r.a.n.....m.a.n...A.l.s...r...B.e.l...s...B...t.a.n...H.a...t.....K.e.n...a...K...p.u.r...L...b...a...S.p...n.n...S.v.i.s.s...T...n.i.s...B.a.r.e.i.n...B.e.l.g...a...B.r...n.e.i...G.a.m.b...a...J...l.a.e.y...K...s...v.....K...v.e.i.t...L.e.s...t.....M.a.l.a.v.....M.e.x...k.....M...n.a.k.....R...a.n.d.a...S.a.m.b...a...S.e.r.b...a...T.a...v.a.n...T...k.e.l.....T...v.a.l.......r.l.a.n.d.....s.l.a.n.d.....s.r.a.e.l.....t.a.l...a.....g.a.n.d.a.....r...g.v.....A.l.b.a.n...a...A.r.m.e.n...a...B...l.i.v...a...B...r...n.d.....D.a.n.m...r.k...D.j...b...t.....E.r...t.r.e.a...E.......p...a...G.e.o.r.g...a...I.n.d.l.a.n.d...J.a.m.a...k.a...K.a.m.e.r...n...K.r...a.t...a...L.i.t.h...e.n...L...b.a.n.o.n...L...b.e.r...a...M.a.l.a.s...a...M.a.r.o.k.k.....M.o.l.d...v.a...N.a.m.i.b...a...N.o.r.e.g.u.r...N...g.e.r...a...P.a.r.a.g.v...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):8556
                                                                                                Entropy (8bit):3.8572651947001155
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:K+rST6GPB2Io0rVZVm1k1iQBqo0ySEsQfFRcba:BEbBI9k1ekJRcO
                                                                                                MD5:A96491F615F7809E5C2F36A46D85AFD2
                                                                                                SHA1:2ED9AB53CC57CAF5FF72000D8011EE11A06ED273
                                                                                                SHA-256:8388B553E2EB3AB9F8C786C2B15130DE9D4BBFDC6C547EC16EB4ED3D9055C854
                                                                                                SHA-512:9C07B0B489D0887102A3D6B06B885433AF9504467B82DA2137C4C188BF42D385733958E8164C4EB1BF845941CF926ECBE9265DAB8CF47C31225D6A553560D4E0
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................O.. ........S...S...........O...5K.y..E.m.e.t.a.b. .C.h.a.d...E.m.e.t.a.b. .C.u.b.a...E.m.e.t.a.b. .F.i.j.i...E.m.e.t.a.b. .G.u.a.m...E.m.e.t.a.b. .I.r.a.n...E.m.e.t.a.b. .I.r.a.q...E.m.e.t.a.b. .L.a.o.s...E.m.e.t.a.b. .M.a.l.i...E.m.e.t.a.b. .N.i.u.e...E.m.e.t.a.b. .O.m.a.n...E.m.e.t.a.b. .P.e.r.u...E.m.e.t.a.b. .T.o.g.o...E.m.e.t.a.b. .A.r.u.b.a...E.m.e.t.a.b. .B.e.n.i.n...E.m.e.t.a.b. .C.h.i.l.e...E.m.e.t.a.b. .C.h.i.n.a...E.m.e.t.a.b. .G.a.b.o.n...E.m.e.t.a.b. .G.h.a.n.a...E.m.e.t.a.b. .H.a.i.t.i...E.m.e.t.a.b. .I.n.d.i.a...E.m.e.t.a.b. .I.t.a.l.y...E.m.e.t.a.b. .J.a.p.a.n...E.m.e.t.a.b. .K.e.n.y.a...E.m.e.t.a.b. .L.i.b.y.a...E.m.e.t.a.b. .M.a.l.t.a...E.m.e.t.a.b. .N.a.u.r.u...E.m.e.t.a.b. .N.e.p.a.l...E.m.e.t.a.b. .P.a.l.a.u...E.m.e.t.a.b. .Q.a.t.a.r...E.m.e.t.a.b. .S.a.m.o.a...E.m.e.t.a.b. .S.p.a.i.n...E.m.e.t.a.b. .S.u.d.a.n...E.m.e.t.a.b. .S.y.r.i.a...E.m.e.t.a.b. .T.o.n.g.a...E.m.e.t.a.b. .Y.e.m.e.n...E.m.e.t.a.b. .n.i.g.e.r...E.m.e.t.a.b. .A.n.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):8676
                                                                                                Entropy (8bit):4.564190554248838
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:E4S8C9i2e0wkc/YqiEtipDZsp1S9l1SnQXHEqpJ89VC:hTmLHwIXs+YNq82
                                                                                                MD5:9577A1BF43D750F1FB7D50F437D20FC8
                                                                                                SHA1:D24BE5CF5719FE6D7E9F104464206D9A561DA25D
                                                                                                SHA-256:9942CE5B879FC51766E09DA90A3EEDB2DE3335AE3EBCE0BBCC446C4F518CCC2A
                                                                                                SHA-512:62E47D77C181ED1A4310E17C2C7DEE45C0182EFFD01D6003ED8675493A9425814704F1F87B7911643BE36F067A294CE9229AC19005298469E2510184418CD0EF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................j.. ..!.....q...q...$......!j...5K.y....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):5728
                                                                                                Entropy (8bit):4.301535633570821
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:btTCHQ3cVUtNfxLH5SL71HO52+P1QmrNtVqlS0kXF9D5+qZy9:l6QsKVZSLpHO52+dQ8NtVq8fFRcoy9
                                                                                                MD5:205E77719702CE43DD69B27461BFC4EE
                                                                                                SHA1:CD89A275C08944D8B0CB681B9BBCEC3D217F3F76
                                                                                                SHA-256:2CBB41EE763649A5D79FBA145F01C3001AAAB8ED369AFB50160026728CDDBB34
                                                                                                SHA-512:121303D0EE758ACD3C522A5F592EBC72AC2432F0CE8F92D656CE784FFE24D0943C9B72F63A51E2A992DC717938EF3762746976694671902D88FFC952E8178B9C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................5K.y..F...i.j.i...G.w.a.n.i...G...a.n.a...G...i.n.e...J...j.i.a...M...a.l.i...N.i...u.e...N...i.j.a...P...e.r.u...T...o.g.o.....m.a.n.i...A.n.d...r.a...A.r...u.b.a...C.h...a.d.i...C.h...i.l.e...C.h...i.n.a...H.a...i.t.i...I.r...a.k.i...J...d.a.n.i...K.y...u.b.a...K...n.a.d.a...K...e.n.y.a...L.a...o.s.i...M.i...a.m.a...M...l.i.t.a...M...s.i.r.i...N.a...u.r.u...P.a.l...a.u...P.a.p...u.a...S.a.m...o.a...S...m.b.i.a...T...o.n.g.a...U.f...i.n.i...U.r...u.s.i...Y...m.e.n.i.....k.w.a.d.o...D.r...e.n.o...A.m.e.r.h.k.a...A.n.g...o.l.a...B.a.h...a.m.a...B.e.l...i.s.e...B.e.n...i.n.i...B.u.k...i.n.i...B.u.t...a.n.i...B...s.i.n.i.a...E.s.t.o.n...a...G.a.b...o.n.i...G.u.y...a.n.a...J.a.m...i.k.a...J.a.p...a.n.i...J.i.b...u.t.i...K.a.t...a.r.i...K.o.m...o.r.o...K...w...i.t.i...L.e.s...o.t.o...M.a.l...a.w.i...M.a.y...o.t.e...M.o.d...i.v.u...M.o.n...a.k.o...M.o.r...i.s.i...M.o.r...o.k.o...N.e.p...a.l.i...P.a.n...a.m.a...P...l.a.n.d.i...R.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):3140
                                                                                                Entropy (8bit):4.108582351284262
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:V9rYqMTeXHSki6ngjSl6hV34a0q9wT350ZNE:VCKyki6nsSl6hVFyTyE
                                                                                                MD5:336EBE33CFC1401C9C398C07F1BB834F
                                                                                                SHA1:CCF59EA8A96E913129151FD5917B95AE342F4765
                                                                                                SHA-256:3BABD6C8C6ADDB43C2606804BCACB523FEE25153B52FB763AD85CBA0F116F2CF
                                                                                                SHA-512:CBBEC77D89D993FE50927360AA524275C8B8EA5F8F4130F4A5B68250827065BEAE0FD185D34001E0ECA157C9E3B49FF815EF360B8EC3988462145B96D4FD99B7
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..}....................}....5K.y..U.f.i.j.i...U.g.a.n.a...U.g.i.n.e...U.g.w.a.m...U.k.u.b.a...U.t.o.g.o...U.t.u.k.i...U.b.e.l.i.n...U.c.h.a.d.i...U.c.h.e.k.i...U.c.h.i.l.e...U.c.h.i.n.a...U.h.a.i.t.i...U.j.o.j.i.a...U.k.e.n.y.a...U.k.o.n.g.o...U.l.i.b.y.a...U.n.o.r.w.e...U.o.m.a.n.i...U.p.a.p.u.a...U.p.e.r.u.u...U.r.u.n.d.i...U.s.a.m.o.a...U.s.a.u.d.i...U.s.i.r.i.a...U.t.o.n.g.a...W.i.r.a.k.i...U.a.n.d.o.r.a...U.b.u.k.i.n.i...U.g.a.b.o.n.i...U.g.a.m.b.i.a...U.g.u.y.a.n.a...U.j.a.p.a.n.i...U.j.i.b.u.t.i...U.k.a.n.a.d.a...U.k.a.t.a.r.i...U.k.o.d.i.v.a...U.k.o.m.o.r.o...U.l.e.s.o.t.o...U.m.a.l.a.w.i...U.m.i.s.i.r.i...U.n.i.j.e.r.i...U.p.a.n.a.m.a...U.s.u.d.a.n.i...U.t.u.v.a.l.u...U.t.w.a.n.i.a...U.y.e.m.e.n.i...U.z.a.m.b.i.a...A.l.u.j.e.r.i.a...U.a.l.b.a.n.i.a...U.g.r.e.n.a.d.a...U.h.i.n.d.i.n.i...U.i.s.r.a.e.l.i...U.j.a.m.a.i.k.a...U.k.o.r.a.s.i.a...U.k.u.p.r.o.s.i...U.l.a.t.i.v.i.a...U.l.i.b.e.r.i.a...U.n.i.j.e.r.i.a...U.p.o.l.a.n.d.i...U.r.i.t.e.r.e.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):6016
                                                                                                Entropy (8bit):4.896917580560711
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:NozdTTJUWaJDYJpTW/rVJw/LOxaZtRTqfEmT7U77tDQU3gCaB2Bvb+qppH8nzb0X:uTTiW+YJpTW/r8/akPyEdtDDwB2Bvqqb
                                                                                                MD5:2E3DC1E886CC54C4B6FB4A3EA8DE82AE
                                                                                                SHA1:2F708EAA76814582D2AFD28C26FC3F4FE11FA609
                                                                                                SHA-256:F3208BAE5D84BD14436FE3662E2881C182AA18D50BD48F344A5B8F8B34C19F5E
                                                                                                SHA-512:0648C07E13E42D044BCBFC2DAD40D20AAA6DBFF2459F0552A7A5479B8216CBF0ECF5987F553F6CF54ECEB6B23BAE4826FFB85EC12AA1B658D21C3B8630B9C9F3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................$...........5K.y............#...........'.5.E.....@.5.:.......@.6.....0.=.8.....5.=.8.....8.2.8.....@.>.A...!.8.@.8...".C.@.:...$.8.6.8...(.2.5.4.../.?.>.=.....=.3.>.;.....0.;.1.0.....0.<.1.8.....0.<.1.8.....0.=.0.4.....0.B.2.8.....0.=.0.<.....>.;.L.H... .C.<.K.=...!.5.@.1.8...#.=.3.0.@...$.@.0.=.F...%.O.B.0.4...-.B.8.>.?.....2.A.B.@.8.....;.1.0.=.8.....@.<.5.=.8.....5.;.L.3.8.....>.;.3.0.@.....>.;.8.2.8.....5.@.<.0.=.....M.;.E.8.9.....@.;.0.=.4.....A.?.0.=.8.....>.@.4.0.=.....0.<.1.>.6.....8.1.5.@.8.....0.;.0.9.7.....5.:.A.8.:.....>.;.4.0.2.....>.=.3.>.;.....0.<.8.1.8.....8.3.5.@.8...!.;.>.2.0.:...#.:.@.0.8.=...%.>.@.2.0.B...-.A.B.>.=.8.....>.B.A.2.0.=.....=.4.>.=.5.7.....>.;.C.<.1.8.....0.:.5.4.>.=.....0.;.L.4.8.2.....>.@.>.:.:.>.....L.O.=.<.0.@.....>.@.2.5.3.8...!.;.>.2.5.=.8...".0.=.7.0.=.8..."...2. ...7.8...$.8.=.;.O.=.4...-.=.M.B.E.M.3...-.@.8.B.@.5.9.....2.A.B.@.0.;.8.....@.3.5.=.B.8.=.....5.=.5.A.C.M.;.....2.0.4.5.;.C.?.....2.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.8796761086931277
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMf6E7lOtdsO:SvS6ga
                                                                                                MD5:0BB3E739719A5C203FED526ABDE45867
                                                                                                SHA1:751D5F5CB5F1680E76B75290014B4750DCE35977
                                                                                                SHA-256:01386960C1900C1CFBE656D29E88EA35F4BA1D78D7988644D86EC45F34801119
                                                                                                SHA-512:2CDDCC772B8B6A40FE928F747197D1B29F08F77831EF1528ADB353041B58D272C685ED2115D71D2E9C1977D497E8B63027EBF98A9A881A422AFC74C410156879
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..'....................'....5K.y.......'
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2908
                                                                                                Entropy (8bit):5.500383084289559
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:zP5tcyaYVibOtE8x+Sgk5ZWnqpZXXZJ8HHzHE7UTqEPmwHyhCnLnliE:zJaYVuOS8mkWqppH8nzOUTqom1CDlP
                                                                                                MD5:427516BD46D7ABFBE78809E700437215
                                                                                                SHA1:ACB8CA7C1519B8FD0D3EC3C8A3C177CDA9CFC348
                                                                                                SHA-256:4FD20050B4E5C96BF2F6F5DAF010201709B8C0C31281CCDACCA5C4DB7D8B1B5E
                                                                                                SHA-512:D0546D2C41348911E6DB6C3D91A74A16BDB3DCDE11C7377A3E2DDFB894C6E96D0ED61EEF01D8C7F811475CF2857BE7A5A5E279FA67C2BAFBD05EAB53A076A8FE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .z..............&.....z.....5K.y..A...S...P.B.B...J.e.p.u.n...J.e.r.m.a.n...B.e.l.a.n.d.a...K.e.m.b.o.j.a...2...1...4.9...2...M.a.g.h.r.i.b.i...S.e.p.a.n.y.o.l...Z.o.n. .E.u.r.o...A.s.i.a. .B.a.r.a.t...A.s.i.a. .T.i.m.u.r...T.i.m.o.r. .T.i.m.u.r...A.f.r.i.k.a. .B.a.r.a.t...A.f.r.i.k.a. .T.i.m.u.r...A.f.r.i.k.a. .U.t.a.r.a...A.s.i.a. .S.e.l.a.t.a.n...E.r.o.p.a.h. .B.a.r.a.t...E.r.o.p.a.h. .T.i.m.u.r...E.r.o.p.a.h. .U.t.a.r.a...K.o.t.a. .V.a.t.i.c.a.n...P.u.l.a.u. .K.r.i.s.m.a.s...P.u.l.a.u. .N.o.r.f.o.l.k...U.t.a.r.a. .A.m.e.r.i.k.a...E.r.o.p.a.h. .S.e.l.a.t.a.n...R.e.p.u.b.l.i.k. .C.z.e.c.h...S.e.l.a.t.a.n. .A.f.r.i.k.a...K.e.s.a.t.u.a.n. .E.r.o.p.a.h...G.u.i.a.n.a. .P.e.r.a.n.c.i.s...M.a.c.e.d.o.n.i.a. .U.t.a.r.a...W.i.l.a.y.a.h. .P.a.l.e.s.t.i.n...A.m.e.r.i.k.a. .S.y.a.r.i.k.a.t...C.o.n.g.o. .(.R.e.p.u.b.l.i.k.)...B.e.l.a.n.d.a. .C.a.r.i.b.b.e.a.n...O.c.e.a.n.i.a. .T.e.r.p.e.n.c.i.l...R.e.p.u.b.l.i.k. .D.o.m.i.n.i.c.a...K.e.p.u.l.a.u.a.n. .F.a.l.k.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):7012
                                                                                                Entropy (8bit):4.454589802438993
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:/RdNPtg6lEdl+iuRDwHA2qs8sWtDqpvBzdg:/PNPtg6li+Z0gm7WpcBhg
                                                                                                MD5:63AF89DDBB1D47406505FF260F8F1236
                                                                                                SHA1:6778D65EDFD8C375CA961D48A30E4912A1EE7811
                                                                                                SHA-256:0C333EA48C3334602D88ACC9A2629853EEDD8D167F828834EEC2AA7B3928BE93
                                                                                                SHA-512:361DCA49295B9B06A59722EAC8F2E0B4E5EB8C1A246B8ED647063A6A128594C56357CCCEC8FB4BBF082A1EA6359DAC9ED20E720FE3754FDA58BB0D3F5C595568
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .z....................z.....5K.y..A.s.j.a...F.i.!.i...D.i.n.j.a.....i.p.r.u...E.w.r.o.p.a...F.r.a.n.z.a...I.|.r.a.e.l...S.p.a.n.j.a...A.f.f.r.i.k.a...i.l.-.M.a.l.i...i...-...i.l.i...i...-...i.n.a...l.-.I.n.d.j.a... .i.b.i.l.t.....O...e.j.a.n.j.a...i.l.-.K.e.n.j.a...i.l.-.L.i.b.j.a...i.n.-.N.i.!.e.r...i.s.-.S.i.r.j.a...i.s.-.S.u.d.a.n...l.-.E.!.i.t.t.u...l.-.I.t.a.l.j.a...I.l.-.B.r.a.|.i.l...M.e.l.a.n.e.s.j.a...P.o.l.i.n.e.s.j.a...i.l.-.B.e.l.!.j.u...i.l.-.G.a.m.b.j.a...i.l.-.G.r.e...j.a...i.l.-.G.u.i.n.e.a...i.l.-.G.u.y.a.n.a...i.l.-.K.u.w.a.j.t...i.l.-.L.a.t.v.j.a...i.l.-.L.i.b.a.n.u...i.l.-.M.a.l.a.w.i...i.l.-.M.a.r.o.k.k...i.l.-. .a.p.p.u.n...i.l.-. .o.r.d.a.n...i.r.-.R.u.s.s.j.a...i.s.-.S.e.r.b.j.a...i.t.-.T.a.j.w.a.n...i.|.-.{.a.m.b.j.a...l.-.A.r.m.e.n.j.a...l.-.E.s.t.o.n.j.a...l.-.E.t.j.o.p.j.a...l.-.I.|.v.e.z.j.a...l.-.U.k.r.a.j.n.a...l.-.U.r.u.g.w.a.j...l.-.i.|.l.a.n.d.a...i.l.-.B.o.l.i.v.j.a...i.l.-.K.r.o.a.z.j.a...i.l.-.L.i.b.e.r.j.a...i.l.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):3296
                                                                                                Entropy (8bit):4.746544504742137
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:C3Tk4asHzql2wjzP5PKTaXaaFp0kXF9D5+4+ehg:3h3pN1fFRcEhg
                                                                                                MD5:5ED1EFBC861226F9ACD4BB217E747B53
                                                                                                SHA1:7B7E7EF3D60422B1E19E849369A5265EC11C0303
                                                                                                SHA-256:A2E4A3BCBD8CF21F361EDD2BC6A109C96BB82ABCDB9304BC3DCE25712E3499A7
                                                                                                SHA-512:021EAE11C95DBA7958CC2885B6F40B112B42D9692B725C2C7039A55B0F6FA5CBBE68017C21F509C0AC4E1008C9B6AAD9A841E362072A02723C4D7697115CFB78
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................,.. .4......0...0.........4.,...5K.y..C.u.b.a.b...F.i.j.i.b...I.r.a.q.i...M.a.l.i.b...P.e.r.u.b...T.o.g.o.b...A.r.u.b.a.b...B.e.n.i.n.s...C.h.i.l.i.b...C.h.i.n.a.b...C.o.n.g.o.b...G.h.a.n.a.b...I.n.d.i.a.b...I.r.a.n.n.i...K.e.n.y.a.b...L.i.b.y.a.b...N.i.g.e.r.i...R.a.s.i.a.b...S.w.e.d.e.b...S.y.r.i.a.b...A.n.g.o.l.a.b...B.h.u.t.a.n.s...E.g.i.p.t.e.b...G.a.m.b.i.a.b...I.r.l.a.n.d.i...I.t.a.l.i.a.b...J.a.p.a.n.n.i...K.a.n.a.d.a.b...M.a.l.a.w.i.b...M.e.x.i.c.o.b...R.w.a.n.d.a.b...S.p.a.n.i.e.b...S.u.d.a.n.n.i...U.g.a.n.d.a.b...Z.a.m.b.i.a.b...A.l.b.a.n.i.a.b...A.l.g.e.r.i.a.b...A.m.e.r.i.k.a.b...A.n.d.o.r.r.a.b...A.r.m.e.n.i.a.b...A.u.s.t.r.i.a.b...B.o.l.i.v.i.a.b...B.u.r.u.n.d.i.b...C.r.o.a.t.i.a.b...D.e.n.m.a.r.k.i...E.c.u.a.d.o.r.i...E.r.i.t.r.e.a.b...E.s.t.o.n.i.a.b...F.i.n.l.a.n.d.i...G.e.o.r.g.i.a.b...J.a.m.a.i.c.a.b...J.o.r.d.a.n.n.i...L.e.s.o.t.h.o.b...L.i.b.e.r.i.a.b...N.a.m.i.b.i.a.b...N.i.g.e.r.i.e.b...N.o.o.r.w.e.e.b...S.o.m.a.l.i.a.b...T.u.n.i.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2796
                                                                                                Entropy (8bit):5.5411897860867265
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:wPxlPMbmDB4agk24Da70rG/9XrX//92tEA/9zVjWQorNnqpZXXZJ8HHzHH7GFmO2:wplEboBHYwI9T92Ku9qqppH8nzbGVSfL
                                                                                                MD5:D2C34DACC62207504883361675C82010
                                                                                                SHA1:0115BDB5D245920954A26E811B0EBFBBC6ECB8AD
                                                                                                SHA-256:4141C6EDD1A0F36328D15A341F268F86CE58D40F6F71B554D24BB2CBEB9CC6D5
                                                                                                SHA-512:F97FBBF3B64930785AEDC0729D611B7BC798E78441B20D8BDAE1F1952D44FFB9DE015A7960162E9E9DBC7DA484E5370F02DD4DCB5BD2D00F087ACFF54C552646
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................$...........5K.y..F.N...E.U...H.e.l.l.a.s...S.v.e.i.t.s...T.y.r.k.i.a...v.e.r.d.e.n...F...r...y.e.n.e...K.o.m.o.r.e.n.e...S...r.-.A.s.i.a...T.s.j.e.k.k.i.a.....s.t.-.A.s.i.a...C.o.o.k...y.e.n.e...M.a.l.d.i.v.e.n.e...e.u.r.o.s.o.n.e.n.....s.t.-.T.i.m.o.r.....s.t.e.r.r.i.k.e...K.o.k.o.s...y.e.n.e.....s.t.-.A.f.r.i.k.a...C.a.y.m.a.n...y.e.n.e...F.i.l.i.p.p.i.n.e.n.e...K.a.n.a.r.i...y.e.n.e...S.e.y.c.h.e.l.l.e.n.e...S.a.l.o.m.o.n...y.e.n.e...H.v.i.t.e.r.u.s.s.l.a.n.d...M.a.r.s.h.a.l.l...y.e.n.e...P.i.t.c.a.i.r.n...y.e.n.e...F.a.l.k.l.a.n.d.s...y.e.n.e...M.e.l.l.o.m.-.A.m.e.r.i.k.a...N.o.r.d.-.M.a.k.e.d.o.n.i.a...N.o.r.d.-.M.a.r.i.a.n.e.n.e...S...r.l.i.g.e. .A.f.r.i.k.a...U.S.A.s. .y.t.r.e. ...y.e.r...N.o.r.d.l.i.g.e. .A.m.e.r.i.k.a...A.f.r.i.k.a. .s...r. .f.o.r. .S.a.h.a.r.a...T.u.r.k.s.-. .o.g. .C.a.i.c.o.s...y.e.n.e...D.e. .b.r.i.t.i.s.k.e. .j.o.m.f.r.u...y.e.n.e...D.e.t. .p.a.l.e.s.t.i.n.s.k.e. .o.m.r...d.e.t...H.e.a.r.d.-. .o.g. .M.c.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/dsp:SBtkJ1li6gml/8
                                                                                                MD5:3F209B3AA35603DCBB208A74CAA36C86
                                                                                                SHA1:249DE057005BE697205333ABA0433C5B04653BBB
                                                                                                SHA-256:F3965E339C622C96879DEE316DE42F9E9F693DDEB7A52FDCEBBA027171F2C86A
                                                                                                SHA-512:02411AE5728814057E0CA78D850EEA85B3ACA16DFDBEE97A7C01860DA3B82640EEBE60960938C7F64B05D9E9FE8BAE0B826D242E24B33C40024836F716F17E31
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................5K.y........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):84
                                                                                                Entropy (8bit):2.692276143673127
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlZelgylslplglYug8RHl9P:SBtkJQltWpglYuHH7P
                                                                                                MD5:A20A266B4FDEA042A20F265468A6A501
                                                                                                SHA1:36F9102A3169B1787817FCEA34E8C0A198761657
                                                                                                SHA-256:D2805C8B1BB6406742A9ECD71F92C9B8302DD930114AA5EEFEF13A66AFC156D2
                                                                                                SHA-512:4D582ADED5FA133C7F83499DC459A518A01BF6B43F1581BCA109D39429C366D2C342F0FCB89A093F3FC0087831BC0DB267367DE99159F5C5968DF422D9A7D707
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................5K.y..n.b...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):88
                                                                                                Entropy (8bit):2.7148996570578574
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlKelBjlgljl/k8RLljai:SBtkJTl4dLR
                                                                                                MD5:CDD1830D8DEC6C5030045EB7264E6618
                                                                                                SHA1:3F94BE38AE0BCD5FE2C17C061397EA2DC667447B
                                                                                                SHA-256:CB425C849B362D7BFC6026AEE3B3211B2C772D843FAB067337FB8DA6C46EDEBC
                                                                                                SHA-512:9FFA9ED115940FB49AC436DC71653F1D7FFD111152E7F9CDBEA6CC2FB7CF37DCA031112905C8223D704BAE154B590CC57A098E57B70705ABDF45603ED729DA05
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................5K.y..n.n._.N.O.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1748
                                                                                                Entropy (8bit):5.754796875499855
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:8qAG2+dovzWINpmkXWa9D5HekaM9c2sXfeL:97ZdS70kXF9D5+7MGPM
                                                                                                MD5:90C26955F2554BF6A6287240F9190520
                                                                                                SHA1:B3277800095C78449D2CB937467C5EB446ABABE9
                                                                                                SHA-256:4C13F180B8EC2A4A89122AC6AE9F45BF87ABD495235461C7A55093968E617769
                                                                                                SHA-512:AC84BB969287ACDE176C5FADC2CCE2DCB520E39748801E984F5651A6328C140476ECA025FA630F36573102E964D10BC219CCE85F6E129583143D36F1FE762001
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................5K.y..G.u.n.i...M.a.r.i...N.e.p.o...I.t.a.r.e...S.w.i.s.i...A.n.g.o.r.a...B.e.r.i.z.e...B.u.f.i.n.i...I.k.w.e.d.a...I.r.a.a.k.a...I.r.a.a.n.i...K.o.r.o.m.o...M.a.r.a.w.i...M.a.r.i.t.a...N.a.i.g.y.a...N.o.o.r.w.e...P.o.c.u.g.o...R.r.a.s.h.a...T.u.v.a.r.u...A.n.g.w.i.r.a...G.a.b.o.o.n.i...G.u.r.i.i.s.i...G.y.o.g.i.y.a...K.u.w.e.i.t.i...P.a.l.a.a.w.u...A.r.u.b.a.n.i.a...B.a.r.a.r.u.s.i...G.y.a.m.a.i.k.a...G.y.a.p.a.a.n.i...H.o.o.r.a.n.d.i...I.r.e.r.a.n.d.i...I.s.i.r.a.i.r.i...K.o.r.a.s.i.y.a...M.o.n.g.o.r.i.a...M.o.r.i.d.o.v.a...M.y.a.n.a.m.a.r...O.s.i.t.u.r.i.a...P.i.t.k.a.i.n.i...P.o.o.r.a.n.d.i...T.a.i.r.a.n.d.i...T.o.k.e.r.a.w.u...U.k.u.r.e.i.n.i...P.a.r.e.s.t.i.i.n.a. .n.a. .G.a.z.a...E.b.i.z.i.n.g.a. .b.y.a. .I.n.d.i.a.n. .e.b.y.a. .B.u.n.g.y.e.r.e.z.a...............................................................................................".+...1.7.:.=.@.C.I.L.O.U.X.[.d.g.j.m.s.v.y.|...............................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):8548
                                                                                                Entropy (8bit):4.518913879329421
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:aRnys3rxKvznNGLHmjPfflDRq8An+2myUbDwKSNXy8OizTqpJ8T6R:4N2GSr3ZUebDnUPq8GR
                                                                                                MD5:DFA60ED2B3D70EC1FD47B6D07E471DEB
                                                                                                SHA1:4994BBFEFE45552D0FB678DDAE2E3B126504A424
                                                                                                SHA-256:B607295DC200962B6EE638DC8742FF3C166D147ED37296C3D16D4061D6620085
                                                                                                SHA-512:9E76BCDB3FEDAA83446124E70040DB69199F566580D6CD00FF28CD1C1A7ECD457B8A8209DE476AC17D78227589F838F8FC614BD8849BC7BA47086A447891E3CA
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................J.. ..!.....Q...Q...&......!J...5K.y..(.?.......0.>.(.....>.(.>.....>.&.M.....?.(.M.....K...K...(.0.q.G...*.G.0.A...+.?...?...-.>.0.$.....>.2.?..._.A...G.....0.A.,.>.......>.2.@.....0.>...M.......>.(.M.....$.>.0.M.....A...$.M.....A.....M.....G...?.......0.M.8.?.....>.*.>.(...(.>.....0...(.>...0.A...(.G.*.>.3...*.>.2.>.....,.?.6.M.q...-.A...>.(.....0.?.8.8.....>...>.......>.2.q.?...0.A.7.?.....2.>...8.M...8.?.0.?.....9... .......9.>...$.?.......?.*.M.......0.A...A.......>.(.>.!.>.....G.(.?._.>.....K.8.K.-.K.....M.q.?.,.>.....>.,.K.(.M.....M.0.@.8.M.....?.2.M.2.@.....0.M...?.......?.,.K...?.....K...M...>...$.>...q.>.(...$.A.-.>.2.A...$.A.0.M...@...*.>.(.>...>...,.G.(.?.(.M...,.G.2.?...M...,.K.2.-.?.......>.2.M...>.....>._.K...G.....K.(.>...K...2.>...-.?.....2.?.,.M._.>...2.G.8.K.%.K...8.0.M.,.?.....8.M.*.G.(.M..._.G...G.(.M.......M...K.2.>.....#.M.!.K.0.>.....2...G.0.?.......2.,.>.(.?.......%.?...*.?.........>.#.M.!.>.....A.0.>...>.......K...K.0.8.M.....>.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):400
                                                                                                Entropy (8bit):4.482269378093527
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SvulJu0hHroiatjy/Wh4r566IAism/cLD/2h+uyaQfKQVifWlKlh6hLLkvl+n:Y0Foam6ssWoDNfZYOQlMlLuo
                                                                                                MD5:0C39DD0B94EAC67B28912AE4F258D1BE
                                                                                                SHA1:0B4AAFE3065506623FC07415EADDDC601C0C0536
                                                                                                SHA-256:25EEC410A057F71FB7AE277487F69D004E38D90BB2DF523CF32458BF74C2EDC0
                                                                                                SHA-512:FCE8C5F0E76B0C20F6D12B196F6F72B2CC32CBF9970DF15D6700C7A6AD49063D372C4C7F86240CA61F35C3B0EE4BE15A149D996870C942E23D5E178E13B0CDEF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................X.. ........\...\...........X...5K.y......(.....7.8.....C.=.5.....=.4.8.../.?.>.=...$.@.0.=.F.....D.@.8.:.......5.@.<.0.=.....2.@.>.?.......:.5.0.=.8...#...@...A.5.....<.5.@.8.:.......@.0.7.8.;.8.....C.K.@.4.7.K.A.B.>.=...!.B.K.@. ...@.8.B.0.=.8.......7.>.=.3... .1...A.B.............6.b.n.....1.s.y...........Y...$.9.N.\. .G.d...@.3.x.l.).....U...............x..P. .`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):7536
                                                                                                Entropy (8bit):4.616013059031144
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:G1NhrTHBIo93MPxOHEvdLenTThdjLAMarNqpJ85tzIrFX:GfhJIcsIcq8UrFX
                                                                                                MD5:F553898247292782F5C9772A0B96A648
                                                                                                SHA1:89B4BF3C035D28D78F81DE0F475D6B5A90367F31
                                                                                                SHA-256:D326D208E514D6C250096C7A76655AF3348D7ED7E083844E3C3CBCA895C52C8B
                                                                                                SHA-512:3D38A2C05A6CCC3D7F3BCD45EA6EC0D317118C3CCE2794C41D65060ED168B0982960B160F3493F3E803D20A5DD2F312303DE5A2C82621A596D7A337FA7128B7E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................M.. .(%.....T...T...$.....(%M...5K.y....$.0.....>.!.../...(.......2.@.....0.>.......0.>.(.......>.(.....,.K.(.....A.........>.(.>.....?.2.@.....*.>.(.....0.8.@.....K...K...(.?./.B...*.2.>.....*.G.0.B...-.>.0.$.......>.......>.2.@.....?.8.0...2.>...8...8.*.G.(...9.H.$.@.....0.B.,.>.....?...,.>.....@.(.@.......A.5.H.$.....0.(...@.....M.0.@.8.....H...@.......0...(.@.....>.0.!.(.....L.....>...$.A.0...@...(.>.....0...(.>...0.B...(.>.0.5.G...(.G.*.>.2...*.(.>...>...+.<.?...@...,.G.(.?.(...-.B...>.(.....2.>.5.@.....>.2...>...2.@.,.@.....8.0.,.@.....8.5.@.!.(...8.>...K.....8.@.0.@.....8.B.!.>.(...8.p.8.>.0...9.p...0.@.....p...K.2.>.....p.!.K.0.>.....8...0.@.......%.K.*.@.......0.B...5.G.....H.(.G.!.>.....H...0.B.(.....K.8.K.5.K.....A./.>.(.>.....H...,.@.........>.....>.....>.0...@.......A.5.>.2.B...$.>...5.>.(...*.K.2.H...!...+.<.0.>...8...,.0...B.!.>...,.0.B.(.G.....,.9.>...>.8...,.9.?.0.@.(...,.G.2.@...<.....>./.K...@.....>.2.&.@.5.....K.(.>...K.....K.0.q...K.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):96
                                                                                                Entropy (8bit):3.229056480515185
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tluFr2t9vlullal1BsP9mZDlMlAtn:Sv6qtmlEDc9mZDlBtn
                                                                                                MD5:B96D1C36722A0227462AD011F3C8E493
                                                                                                SHA1:42B4468CD47F62233636872349C2F3329131D506
                                                                                                SHA-256:3868207145A4594D1CAFC4DA91E606EBD2094D8DBAC643E76050469622725F50
                                                                                                SHA-512:322747A90E8C676D8EBD73A1145B3CDFC40C3617BB8E492A1A623677633AD67C589B25D9FAB19D60CCC613A226386B7D3F3CE5F186FA5DB749A9D8BADD2D7613
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .. .................... ....5K.y...................`...P. .`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/dsp:SBtkJ1li6gml/8
                                                                                                MD5:3F209B3AA35603DCBB208A74CAA36C86
                                                                                                SHA1:249DE057005BE697205333ABA0433C5B04653BBB
                                                                                                SHA-256:F3965E339C622C96879DEE316DE42F9E9F693DDEB7A52FDCEBBA027171F2C86A
                                                                                                SHA-512:02411AE5728814057E0CA78D850EEA85B3ACA16DFDBEE97A7C01860DA3B82640EEBE60960938C7F64B05D9E9FE8BAE0B826D242E24B33C40024836F716F17E31
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................5K.y........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.945547915629603
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/dP7Mx/1P:SBtkJYlU8g8l/1IZ1P
                                                                                                MD5:6760A138D30FB15DA4638F9222503DFE
                                                                                                SHA1:F11F287CF4071D6484E5BA2F5CF82EB91ACDE066
                                                                                                SHA-256:7F2CBEC17D56520885A79550149BB793A867239CE35657A25AA0EB024B2D6A21
                                                                                                SHA-512:169BF401F9977966604D77618717C1BCE84F4B6128F268AB3D73875D44A3D32DB8D358CA9D87F971205836EF2FE87406FBB860A12D483CB188BD2EC73F854B33
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................5K.y..p.a._.G.u.r.u._.I.N...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.905547915629603
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/dPRJDP:SBtkJYlU8g8l/1RZP
                                                                                                MD5:EB9D9231B8A00082A5998FB7EEA309B9
                                                                                                SHA1:3697B4F58D17DB9CF4DD2DF17CA2E820F362C42B
                                                                                                SHA-256:92B84E3D79FD624F95A116E6C68BE1C014B09C1A0CDBEC30B27A4FD8B58A151F
                                                                                                SHA-512:51C0255C24875D448BA3876C8078BE733F8C3632CEC09A1B2E263036E7D315FEC87AA24437E136478A727C71929432FCE83BB8C50ED05DE73A303BED87D49B00
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................5K.y..p.a._.A.r.a.b._.P.K...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):4032
                                                                                                Entropy (8bit):5.032533647396089
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:pxtzkdcGaRGeuYnrOq/cdqppH8nzOhzT9stXx:VzkxaRGeuYnrOq/WqpJ8GqXx
                                                                                                MD5:5B7F485FCFE4220EF1D431BFD09183FA
                                                                                                SHA1:AE6A6B81DE7B5D4EF8306EB4A6EDEA013EE76044
                                                                                                SHA-256:FC6CD34DEDF08360BF728D06295D05B80CE0F04D31A9F455F79B3A38BE7E3992
                                                                                                SHA-512:85E41B2906798812E9B1E90B8CEF1D46D304181A5DFF15D77A63CDF0DEADE6C885A7359CF1DFE5E009F4A8FF31FAAA5AAEDCBB77FB4651D167C75A31F931F8B1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...............&..........5K.y..I.r.....O.m.......s.i.a...B.u.t...o...C.h.a.d.e...E.g.i.t.o...G.a.b...o...I...m.e.n...J.a.p...o...S.u.d...o...S.u.....a...G.r...c.i.a...G...m.b.i.a...I.r.a.q.u.e...M...n.a.c.o...Q.u...n.i.a...S.u...c.i.a...S...r.v.i.a...V.i.e.t.n.....Z...m.b.i.a...A.l.b...n.i.a...A.r.g...l.i.a...A.r.m...n.i.a...C.a.m.b.o.j.a...C.r.o...c.i.a...E.s.p.a.n.h.a...E.s.t...n.i.a...G.e...r.g.i.a...H.u.n.g.r.i.a...L.e.t...n.i.a...M.a.l...s.i.a...P.o.l...n.i.a...R.e.u.n.i...o...R.o.m...n.i.a...U.c.r...n.i.a...A.l.e.m.a.n.h.a...A.m...r.i.c.a.s...C.a.m.a.r...e.s...C.o.l...m.b.i.a...E.r.i.t.r.e.i.a...I.s.l...n.d.i.a...J.o.r.d...n.i.a...L.i.t.u...n.i.a...M.a.u.r...c.i.o...T.a.n.z...n.i.a...T.c.h...q.u.i.a...Z.i.m.b...b.u.e...M.e.l.a.n...s.i.a...P.o.l.i.n...s.i.a...S.e.i.c.h.e.l.e.s...P.s.e.u.d.o.b.i.d.i...A.u.s.t.r.a.l...s.i.a...C.a.z.a.q.u.i.s.t...o...G.r.o.e.n.l...n.d.i.a...I.l.h.a. .B.o.u.v.e.t...I.l.h.a. .d.e. .M.a.n...I.l.h.a.s. .A.l.a.n.d...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.137653166597381
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMKlllFq8lvmY2:SvzlvmB
                                                                                                MD5:606DD5E86352CBA8A2A4F4561837824B
                                                                                                SHA1:5C0059F5CBDD887FB652FA79AD87AAC0F8865EA8
                                                                                                SHA-256:3A85BADE8A7A6DB69C28C9388EF247294248DF06F9D9D406198479426B31D70C
                                                                                                SHA-512:66C908320950530C345997B522E12D7D6603DF931FE32B43644A2DDFA12BE7795C9582C070ADB744FBDE9DF287816FC8584F5F1A2BC2158ABD8BFC9BA4B20E0C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.:"...................:"....5K.y..........9"
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.137653166597381
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMKlllFq8lvmY2:SvzlvmB
                                                                                                MD5:606DD5E86352CBA8A2A4F4561837824B
                                                                                                SHA1:5C0059F5CBDD887FB652FA79AD87AAC0F8865EA8
                                                                                                SHA-256:3A85BADE8A7A6DB69C28C9388EF247294248DF06F9D9D406198479426B31D70C
                                                                                                SHA-512:66C908320950530C345997B522E12D7D6603DF931FE32B43644A2DDFA12BE7795C9582C070ADB744FBDE9DF287816FC8584F5F1A2BC2158ABD8BFC9BA4B20E0C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.:"...................:"....5K.y..........9"
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.137653166597381
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMKlllFq8lvmY2:SvzlvmB
                                                                                                MD5:606DD5E86352CBA8A2A4F4561837824B
                                                                                                SHA1:5C0059F5CBDD887FB652FA79AD87AAC0F8865EA8
                                                                                                SHA-256:3A85BADE8A7A6DB69C28C9388EF247294248DF06F9D9D406198479426B31D70C
                                                                                                SHA-512:66C908320950530C345997B522E12D7D6603DF931FE32B43644A2DDFA12BE7795C9582C070ADB744FBDE9DF287816FC8584F5F1A2BC2158ABD8BFC9BA4B20E0C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.:"...................:"....5K.y..........9"
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1300
                                                                                                Entropy (8bit):6.067993847402924
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:5l9WMwj+lX5sD0Ilan6Mr7nNpmOJx+vJnchZSWZyuLixavv76n0KGtoNUCCL+h8n:RHwWsDJUBr7nVJYvihMWZ+Qv74Gto6CG
                                                                                                MD5:1A951C187745FBC669A2AAF5FE259D85
                                                                                                SHA1:471AC0F9E7EAF3A991B9A0EC779B922410252BAC
                                                                                                SHA-256:4E770FE256A9227FAD9FEE6A655D2CAEB3060D8977A95F2C9C51E17EC46791D8
                                                                                                SHA-512:6A2B27A953CC446A961F231159FF2C4C9E40CC8CB0B0B58CEF44F34E063B36AD87F0202C7F1188FA271DB8C2D9609805B3191814A0D80D0C27D4C5B0AD09B7CE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................9.. ........=...=...........9...5K.y..F.i.y.i...T...n.e.z...B.a.r...i.n...Y.i.b.u.t.i...A.r.g.e.l.i.a...B.o.n.a.i.r.e...C.u.r.a.z.a.o...P.a.k.i.s.t...n...M.a.c.a.o. .R.A.E...E.R.Y. .M.a.c.e.d.o.n.i.a...I.s.l.a. .C.h.r.i.s.t.m.a.s...H.o.n.g. .K.o.n.g. .(.R.A.E.)...P.a.l.e.s.t.i.n.a. .K.a.m.a.c.h.i.k.u.q...E.E...U.U... .I.s.l.a.s. .V...r.g.e.n.e.s...S.a.n.t.a. .S.e.d.e. .(.C.i.u.d.a.d. .d.e.l. .V.a.t.i.c.a.n.o.)...I.s.l.a.s. .m.e.n.o.r.e.s. .a.l.e.j.a.d.a.s. .d.e. .l.o.s. .E.E...U.U.............................................................................%.(.+.1.7.:.=.C.I.L.O.U.X.[.d.g.m.s.v.y...............................................................................!.$.'.*.0.3.6.<.?.B.E.H.K.Q.T.Z.`.c.f.i.l.r.u.x.{.~....................................................................................... .#.&.).,.2.8.;.>.A.J.P.S.Y.\._.b.h.n.q.t.w.z.........K!.5.!.!...@.`.".?19#R'.E3...2....i!$...g3E...'..EvA..}.h`../....3.R..,.U.......U$.3...!.!..U!..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):3756
                                                                                                Entropy (8bit):4.96994431325348
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:6RjBgHiZE09u1gAmcN0wBLmXybNTTjW8joLnmBxuJf0cC+zFh7s74trcs:Iwi1+gAyYdTSkE4xuWcC+zFts74D
                                                                                                MD5:F487A3A428E3C8C4B88A457AFB9F8E90
                                                                                                SHA1:F3C926B63B0D4F86AE91DCC3BF78FCFF3E0213B7
                                                                                                SHA-256:65628294C10054DE4B62CD66558DA6C2E06D1E7FEA9556B46D1F60B15BED52E5
                                                                                                SHA-512:5FA90668B02AA313F5B1E822671F9711D972D7DEA7DD47B7CD943375C47664B61D2C824B8D810142DCB291854494287B08F14997BFF0208C5532AB6D1C6E8E2B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................InstalledLocales.af.agq.ak.ar.ar_AE.ar_LY.ar_SA.asa.ast.az.az_Cyrl.az_Latn.az_Latn_AZ.bas.be.bem.bez.bg.bm.bn.bn_IN.bo.bo_IN.br.brx.bs.bs_Cyrl.bs_Latn.bs_Latn_BA.ca.ccp.ce.ceb.cgg.chr.ckb.cs.cy.da.dav.de_AT.de_CH.dje.dsb.dua.dyo.dz.ebu.ee.el.en.en_150.en_AG.en_AI.en_AT.en_AU.en_BB.en_BE.en_BM.en_BS.en_BW.en_BZ.en_CA.en_CC.en_CH.en_CK.en_CM.en_CX.en_CY.en_DE.en_DG.en_DK.en_DM.en_ER.en_FI.en_FJ.en_FK.en_FM.en_GB.en_GD.en_GG.en_GH.en_GI.en_GM.en_GY.en_HK.en_IE.en_IL.en_IM.en_IN.en_IO.en_JE.en_JM.en_KE.en_KI.en_KN.en_KY.en_LC.en_LR.en_LS.en_MG.en_MO.en_MS.en_MT.en_MU.en_MW.en_MY.en_NA.en_NF.en_NG.en_NL.en_NR.en_NU.en_NZ.en_PG.en_PH.en_PK.en_PN.en_PW.en_RW.en_SB.en_SC.en_SD.en_SE.en_SG.en_SH.en_SI.en_SL.en_SS.en_SX.en_SZ.en_TC.en_TK.en_TO.en_TT.en_TV.en_TZ.en_UG.en_VC.en_VG.en_VU.en_WS.en_ZA.en_ZM.en_ZW.es_419.es_AR.es_BO.es_BR.es_BZ.es_CL.es_CO.es_CR.es_CU.es_DO.es_EC.es_GT.es_HN.es_MX.es_NI.es_PA.es_PE.es_PR.es_PY.es_SV.es_US
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):4736
                                                                                                Entropy (8bit):4.4125393029177555
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:gy83HRYhPvx+alSLGSxnveqQ/V1x0kXF9D5+/jPOC:0hUzEL1xnC//xfFRcrPl
                                                                                                MD5:AF51C4103682C64F7C0AD875320AB903
                                                                                                SHA1:05349C5D2D7532F4F6D86384F20E8ACCA71E4C9B
                                                                                                SHA-256:6B0F9FA0970F32F83C660E0F7FBBA180DF5212FC787FD8936E8D4F6EDD3D09A3
                                                                                                SHA-512:D6D6BCF4EE9C29BB894C669E43DD02A4F07FD9C4473D4097F31AA4472E9484C55456620DF791DE0C614F0EEB6D69316AB149B0BDBF1B228FCD48ACF5680ABBA6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .0....................0.....5K.y..G.a.b.o...K.i.b.a...G.u.n.e.y.a...G.u.y.a.n.e...I.r.i.g.w.e...L.a.t.i.v.a...L.i.b.a.n.i...M.a.r.o.k.e...S.u.w.e.d.i...B.e.l.a.u.s.i...I.k.e.r.e.n.e...K.a.m.b.o.j.e...P.a.r.a.g.w.e...P.o.l.o.n.y.e...U.b.u.d.a.g.e...B.u.r.e.z.i.l.i...B.u.r.u.n.e.y.i...E.k.w.a.t.e.r.i...G.e.r.e.n.a.d.a...I.r.i.l.a.n.d.i...M.a.l.e.z.i.y.a...M.i.g.i.z.i.k.e...M.o.l.u.d.a.v.e...M.o.l.u.d.a.v.i...N.i.j.e.r.i.y.a...N.o.r.u.v.e.j.i...O.t.i.r.i.s.h.e...R.u.m.a.n.i.y.a...S.e.h.e.l.e.n.e...S.e.l.u.s.i.y.a...T.u.n.i.z.i.y.a...T.u.r.u.k.i.y.a...U.b.u.g.a.n.d.e...U.b.u.h.i.n.d.i...U.b.u.r.u.n.d.i...V.a.n.u.w.a.t.u...u. .R.w.a.n.d.a...A.l.i.j.e.r.i.y.a...A.r.u.m.e.n.i.y.a...E.l.i.t.e.r.e.y.a...E.t.i.y.o.p.i.y.a...H.u.n.g.a.r.i.y.a...I.s.i.r.a.h.e.l.i...S.i.n.g.a.p.u.r.u...U.b.u.b.i.l.i.g.i...U.b.u.g.e.r.e.k.i...U.b.u.r.u.s.i.y.a...U.b.u.s.h.i.n.w.a...U.b.u.s.u.w.i.s.i...U.b.u.y.a.p.a.n.i...A.r.i.j.a.n.t.i.n.e...A.y.i.s.i.l.a.n.d.i...B.a.h.a.r.e.y.i.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):5692
                                                                                                Entropy (8bit):4.633986220273737
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:IhZw1J9XjpFGCqA/0ITLBZlYiBY74Q0uLI3YAUs8LCDYlYNQWdf5CVOqppH8nzOx:O0J9XjpFbHTLJY8nuNCZDCYNjN9qpJ8o
                                                                                                MD5:DDA065AB17AA6CE5E7236B6798AD0C12
                                                                                                SHA1:35AC868B54ECCDC6E20F021E56911050804A2BD0
                                                                                                SHA-256:190ECB2F5E12D1D5DC1DFD49C358E4CAF6CB89939759E01AF0AC871F6BA3B4C8
                                                                                                SHA-512:4821C9D6AF71162C665D56DB0BF5D583ADFFB3B18F908A753D81B99B0FC28CA0038B16DA47B1E6E7C64516DD6DD53C579E42567FDF603493544EECC820F2C072
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .p..............&.....p.....5K.y..C.i.a.d...L.u.m.e...C.e.h.i.a...C.i.p.r.u...M.e.x.i.c...F.r.a.n...a...S.u.e.d.i.a...T.u.r.c.i.a...A.m.e.r.i.c.i...C.a.r.a.i.b.e...C.r.o.a...i.a...E.l.v.e...i.a...G.u.i.n.e.e.a...R.o.m...n.i.a...U.n.g.a.r.i.a...B.r.a.z.i.l.i.a...C.o.l.u.m.b.i.a...E.r.i.t.r.e.e.a...F.i.n.l.a.n.d.a...I.o.r.d.a.n.i.a...M.o.z.a.m.b.i.c...S.l.o.v.a.c.i.a...D.a.n.e.m.a.r.c.a...G.u.a.d.e.l.u.p.a...T.h.a.i.l.a.n.d.a...G.r.o.e.n.l.a.n.d.a...I.n.s.u.l.a. .M.a.n...K...r.g...z.s.t.a.n...M.u.n.t.e.n.e.g.r.u...C.a.p.u.l. .V.e.r.d.e...R.e.g.a.t.u.l. .U.n.i.t...S.f...n.t.a. .E.l.e.n.a...S.f...n.t.a. .L.u.c.i.a...A.f.r.i.c.a. .d.e. .S.u.d...A.s.i.a. .C.e.n.t.r.a.l.....C.o.r.e.e.a. .d.e. .S.u.d...I.n.s.u.l.a. .B.o.u.v.e.t...I.n.s.u.l.e.l.e. .C.o.o.k...N.o.u.a. .Z.e.e.l.a.n.d.........r.i.l.e. .d.e. .J.o.s...A.m.e.r.i.c.a. .L.a.t.i.n.....A.m.e.r.i.c.a. .d.e. .S.u.d...A.r.a.b.i.a. .S.a.u.d.i.t.....A.s.i.a. .O.r.i.e.n.t.a.l.....C.o.r.e.e.a. .d.e. .N.o.r.d.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):4748
                                                                                                Entropy (8bit):5.113677125627538
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:cVJYvtVHlZgtCddKxNk1im8mqppH8nzOfkZI4:csv7O5AqpJ8DZI4
                                                                                                MD5:12ECDE3D81167609E17A31EB9DBFC333
                                                                                                SHA1:0DAAFAE6F8752E1828DDBD9A1D911DEC33D1AFC6
                                                                                                SHA-256:4E9EBAC51FAE46E8BA6F24140313C954578ABAC6BF03C4AD0CFE9A53DE038C2D
                                                                                                SHA-512:87B7A8829A587F682419E060D2C028DB02F2D9FB92A26D83C125656D576B28F6B03AC7BA326DD363FA973A124043D79DAE7039A233B35A3A56B7791A4CB12AD3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .U..............&.....U.....5K.y......-...........!.(........... .....0.3.0.<.K.....0.@.8.1.K.....>.<.>.@.K...".C.@.F.8.O...>.-.2. ...M.=.....8.@.3.8.7.8.O.....0.;.L.4.8.2.K...-.A.2.0.B.8.=.8...2.5.A.L. .<.8.@...5.2.@.>.7.>.=.0...>.-.2. ...C.2.5...$.8.;.8.?.?.8.=.K.....8.4.5.@.;.0.=.4.K.....6.=.0.O. ...7.8.O.....6.=.K.9. .!.C.4.0.=.....0.:.0.>. .(.!... .)...>.-.2. ...>.@.D.>.;.:...?.A.5.2.4.>.-.B.i.d.i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
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):472
                                                                                                Entropy (8bit):4.254770992027674
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:44/fR9vL5shJuMOD2rr50BlhZi/BmNmaBh:l/fR9vLsX5D2me
                                                                                                MD5:84DFD43C8EF9EB3171AE7400E9DC72B8
                                                                                                SHA1:D772CB903FBA0062E3CCA46B43AFFEF0DB1B360F
                                                                                                SHA-256:03B3E40268B8ABA753C057ADDB4A7A16DA0D7162D511FDCD7B164C871210C0D4
                                                                                                SHA-512:2D53C67A844A1E0D89E38A6A3D998038AABF017ECB352EF367560E4B1C63F433E23A25093A4BF4913CCAEA0C88B6B75B55F310A202704CF25A550ED187F5A6DE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................j.. ..@.....n...n..........@j...5K.y....-.2. ...C.2.5.....-.2.0. ...C.:.0.....-.2. ...>.@.D.>.;.:.....-.2. . .>.6.4.5.A.B.2.0.....-.2. ...>.7.=.5.A.5.=.8.O.....-.2. ...;.8.?.?.5.@.B.>.=.....-.2.0. .%.5.@.4. .8. ...0.:.4.>.=.0.;.L.4.....1.J.5.4.8.=.5.=.=.K.5. ...@.0.1.A.:.8.5. .-.<.8.@.0.B.K...*...0.;.K.5. .".8.E.>.>.:.5.0.=.A.:.8.5. ...B.4.0.;.5.=.=.K.5. ...A.B.@.>.2.0. .!.(.................(...~.2.S.!AVA.@.@0A.A?A.A.@tA...........P9".`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):520
                                                                                                Entropy (8bit):4.704074939659196
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:D/ctTMh5ByztJoOlI/fkDMJ5MsUE1koxMvaFVlWcf:D/TPgox/l50E1kYMCvlWcf
                                                                                                MD5:2A14AE336F7C498FFE146F79DEF0016E
                                                                                                SHA1:DB3EB814E9C96CCAC20439A59EB258D44BF2FC9D
                                                                                                SHA-256:D864C39B4C66E38E7E2123C66FA4AC550D9AEC5B6F488ECE60207842C78D8CA0
                                                                                                SHA-512:A17BB659E88EE96EB4861A538D95056BB72DE1C4342259FB7ABFB181182394306A57394F82847A0085B4E81F908E45BDD40BBA05F88B60C3472797911CE810EF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................u.. ..U.....z...z..........Uu...5K.y....%.(.....C.C.1.0...'.8.8.;.8...!.C.4.0.0.=.....0.=.0.0.4.0.....8.8.1.8.9.M.....0.?.K.@.K.:.0.....8.M.:.A.8.:.M.....M.=. .0.@.K.K.....0.=. .4.>.9.4.C.....@.0.A.A.K.K.9.0.....L.0.<.0.0.9.:.0...%.>.B.C.3.C. .-.<.8.M.@.8.:.M...!.>...C.@.C.C. .-.<.8.M.@.8.:.M.....<.5.@.8.:.0. .%.>.;.1.>...C.:.B.0.0.E. .(.B.0.0.B.B.0.@.0.......................L.d.y.........$.*.-.l.........Y..U.U.U.Uv..U.U...U..}$.U...U...U.....U.U...U.U6..V..Y..U.............P...P. .`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):984
                                                                                                Entropy (8bit):6.664654262645045
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:xmrJVJ7OkJBvWa9D2h1i/veBQ+7TTKO542Kc2hdl/QZ:xMmkXWa9D5HeXTb42SqZ
                                                                                                MD5:2DC65410ADD51F24840BE253B3DE1E6A
                                                                                                SHA1:555D4E6EB7C777E657DC6FA511950B6A31426BA1
                                                                                                SHA-256:E8647FD90A97C6C221DEABE0E4E4F833E3B726C9424091695E2419045D7F2B60
                                                                                                SHA-512:01BEC81C93895A11FDB507BCFE01386D0D590E20827AAD4AB59CE50E25DE3074801996FD2B3AC9D8231AF80049DC5ECAAB8E3AD38AE8FD9B4135706CDC53F60F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..........................5K.y..............................................................................................".+...1.7.:.=.@.C.I.L.O.U.X.[.d.g.j.m.s.v.y.|...............................................................................................!.$.'.*.-.0.3.6.?.B.E.H.K.N.T.W.Z.].`.c.f.i.l.o.r.u.x.{.~............................................................................................... .&.).,./.2.5.8.;.>.A.D.G.J.M.P.Y.\._.b.e.h.k.n.q.t.w.z..............h.J.v.2.!.!..u.wo.".?..."....b@M..3E3...2..-!B!i!G...... ...!$!..k./......`......6./"......{h.#.....~.}.....!..U!2........}.v.}.....!...}.._..#....W"."g.%J..M".I2~.......?~.W...Z..`3.)...Ko?..h..XRQ..2.w.}.`pJ...o.@.`Dw.3.3a"7!.!..u".....hAh;3..'w."l....3...".".@..,...x......_!<J..eo_..I..}.....j..3... q.G..w...".o...".".........."."..~!.A.w.3.h....z@[3q3.@..Z.s!D......"%...w...Ww.@.2.}.`.!q.o..v...o$3....O.'..~.R...?..9..". v`dh... .R... ...........P. .`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):6596
                                                                                                Entropy (8bit):4.582969781761563
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:7fiPyXjQz2RAZ9P/Vn+qmm5wbeiuXVqpJ80+PB1:7ljQz26bP9L35xrFq89B1
                                                                                                MD5:0CE30C563F2EF94D505E1F752FFCDFF8
                                                                                                SHA1:CC3FB3C19F63161FD93E1F4EFB239AD27227187B
                                                                                                SHA-256:FF89D7A68F20D9190F01409987A044644CDA423F5CEC3A5E06415C7A9D7DD659
                                                                                                SHA-512:55CB9660F862BED36E9CD18108B9F0F43F97E7CAFB609F9D4A03D64B1482D24E3485672A53C9661E76062B4566A76055C5F4DE80B81993863E2D36DBAE8CC588
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................b.. ..}.....i...i...&......}b...5K.y..4.'.E...A.,.J...J.E.F.....'.......D.J...'.}.D.J...(.J.F.F...*.1...J...,.1.3.J.../.F.J.'...D.(.J.'...F.H.H.J...G.J.}.J...~.J.1.H.....H.J.*.....(.H.F...'.3.~.J.F...'.F...J.'...'.J.1.'.F...(.J.D.J.2...*.H.'.D.H...,.1.E.F.J...,.E.J...'...3.1.(.J.'...3.E.H.&.'...9.1.H.(.'...E.'.D.}.'...E.J.'.*.J...E...'.&.H...F.'.1.H.J...F.J.~.'.D...J.H.'.J.3...J.H.F.'.F...}.H.F...'...~.D.'.&.H...~.F.'.E.'.....H.}.'.F.....J...J.'.....'.F...H.....J.F.J.'.....J.H.(.'.....G.'.F.'...".4.}.1.J.'...(.1.'.2.J.D...(.1.H.F...J...(.G.'.E.'.3...(.J.D.,.J.E...(...D.'.1.3...,.'.1.,.J.'...1.H.'.F...'...2.J.E.(.J.'...3.'.&.~.1.3...3.H.&.J...F...4.J. .4.D.2...A.D.~.'.&.F...D.'.*.H.J.'...D.J.3.H...H...D...H.F.J.'...E.'.D.'.H.J...E.'.D./.J.~...E.H.1.H...H...E.H.1.J.4.3...E.H.F.'...H...F.'.&.J.,.1...G.F...H.1.3...H.J.*.F.'.E...J.H...1.J.F...J.H...F...'...~.H.D.J.F.......&.F.'...'.....1.(.'.*.J.....H.3.H.H.H.....J.E.1.H.F.....1.J.F...'.....H.1.F.3.J.....J.E.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2040
                                                                                                Entropy (8bit):5.5574526262727675
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:TlBFHqF4BJ+1GY5PT5K7mkXWa9D5Heq9vC8:TlBFFJc1kXF9D5+kvC8
                                                                                                MD5:357354C43E9AD4E7C379B2D645F8D2E1
                                                                                                SHA1:BF16478ED6FD6BCB1B2D25D6A7E98CA90FAF843D
                                                                                                SHA-256:4ED998147051D8CCA697A887E9781136BEF990899C4FAD009875AC3FD3D6C67C
                                                                                                SHA-512:02A9217D79FC1B392818E4D3802463978A91C02AE649F6650F22D1D4479B9048513D0138FBEC87276E7599F0A133E6CC932B2D110DAA92AD1FCFC55C02EF8B3E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..........................5K.y..I.r.....O.m.....B.u.t...o...C.h.a.d.e...E.g.i.t.o...G.a.b...o...I...m.e.n...J.a.p...o...S.u.d...o...S.u.....a...G.r...c.i.a...G...m.b.i.a...I.r.a.q.u.e...M...n.a.c.o...Q.u...n.i.a...S.u...c.i.a...V.i.e.t.n.....Z...m.b.i.a...A.l.b...n.i.a...A.r.g...l.i.a...A.r.m...n.i.a...C.a.m.b.o.j.a...C.r.o...c.i.a...E.s.p.a.n.h.a...E.s.t...n.i.a...G.e...r.g.i.a...H.o.l.a.n.d.a...H.u.n.g.r.i.a...L.e.t...n.i.a...M.a.l...s.i.a...M.i.a.n.m.a.r...P.o.l...n.i.a...R.e.u.n.i...o...R.o.m...n.i.a...U.c.r...n.i.a...A.l.e.m.a.n.h.a...C.o.l...m.b.i.a...E.r.i.t.r...i.a...I.s.l...n.d.i.a...J.o.r.d...n.i.a...L.i.t.u...n.i.a...M.a.u.r...c.i.o...Z.i.m.b...b.u.e...C.i.n.g.a.p.u.r.a...M.a.c.e.d...n.i.a...C.a.s.a.q.u.i.s.t...o...G.r.o...n.l.a.n.d.i.a...G.u.i.n... .B.i.s.s.a.u...I.l.h.a.s. .C.a.i.m.a.n...C.o.r...i.a. .d.o. .S.u.l...C.o.r...i.a. .d.o. .N.o.r.t.e...B...s.n.i.a.-.H.e.r.z.e.g.o.v.i.n.a...I.l.h.a.s. .T.u.r.k.s. .e. .C.a.i.c.o.s...S...o. .C.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):6352
                                                                                                Entropy (8bit):4.4951873853187125
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:a2mNnLb6/ifMjup2by/koDRDJyvRJqpJ8gmOL2q9yc:gNnLb6/SMjJ+rVIRJq8gmxq9yc
                                                                                                MD5:3999867480C307F863F863BC0B991EA2
                                                                                                SHA1:D1D3F671714F6C4EA8B0062635F14FFD01086651
                                                                                                SHA-256:570AE9E16ED52A366253757650860ECCA1C5B0C2D33BEF9F3E89D53DEF3DCD72
                                                                                                SHA-512:B19F5676B92E7879CFFCEA37202934B29EFE00C62D7AE61D7317D9B725FB55C97669854402591699E52677384FC99C1B103070CFF8932331A314475EFA9AB3BE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................%.. ........,...,...&.......%...5K.y..M.B...A.z.i...O.K.B...S.H.B.A...B.o.t.a...G.a.n.....I.n.d.i...K.i.l.i...K.i.n.....K.u.b.....R.u.s.i.....e.k.i...A.r.u.b.....F.i.x.h.i...G.r.e.q.i...M.a.l.t.....Q.i.p.r.o...S.e.r.b.i...S.u.e.d.i...T.u.r.q.i...A.f.r.i.k.....A.n.g.o.l.....A.u.s.t.r.i...B.e.l.i.z.....E.g.j.i.p.t...E.t.i.o.p.i...E.v.r.o.p.....F.r.a.n.c.....J.a.p.o.n.i...K.o.s.o.v.....K.r.o.a.c.i...L.i.b.e.r.i...M.a.j.o.t.....N.i.g.e.r.i...O.q.e.a.n.i...P.o.l.o.n.i...R.u.a.n.d.....S.p.a.n.j.....U.g.a.n.d.....Z.v.i.c...r...A.l.g.j.e.r.i...A.m.e.r.i.k.....A.n.d.o.r.r.....A.n.g.u.i.l.....B.a.h.r.e.j.n...B.e.r.m.u.d.e...G.e.r.n.s.e.j...G.r.a.n.a.d.....G.u.a.j.a.n.....H.o.l.a.n.d.....I.r.l.a.n.d.....I.s.l.a.n.d.....J.o.r.d.a.n.i...K.a.r.a.i.b.e...K.i.r.g.i.z.i...K.o.l.u.m.b.i...L.i.t.u.a.n.i...M.a.l.a.j.z.i...M.e.k.s.i.k.....M.o.l.d.a.v.i...U.k.r.a.i.n.....X.h.e.r.s.e.j...X.h.i.b.u.t.i...A.u.s.t.r.a.l.i...B.e.l.g.j.i.k.....B.o.t.s.v.a.n.....B.u.l.l.g.a.r.i...D.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):140
                                                                                                Entropy (8bit):4.434946620953675
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tl7T2l/LlVtlDB91kQyWn2b9ydEsSOT/59In:Svul/z1Do9ydZTR+n
                                                                                                MD5:45AA8BDBC6F5576977C83315D2BF720F
                                                                                                SHA1:09987D3C1E0C7A886B36AA514C63255C6F18BE33
                                                                                                SHA-256:D3630A23CEF696E3ED9C0BAE4AB59CAC0FAC9643722AAE1EF73BC2575C8DCA47
                                                                                                SHA-512:5DBA4852D1F7BC03C42D9BC508531AA2A19409261FC1BCD03DC27D750132A7F73EBAD6B8B7130CB28C1A458778A3FD94D20D79CA9B78F59697A212A7D41E5280
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .0....................0.....5K.y......".......Q.....S.e./..:6a.OWx..>..A;.U...E..Z.............P...P. .`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.95862347711418
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM+l/ut6E7lGlVsw:SvZl/ut6gGlp
                                                                                                MD5:8AA325294C2FD5DEEC01CA244B93AA58
                                                                                                SHA1:011734465C1C1150472A55B1ACDFEF43C7B06B33
                                                                                                SHA-256:15C66467F6C3C3A65CADF4350F3237733FC5F7FD4107E45F967929C2CFB01B49
                                                                                                SHA-512:D3ECBDADA97C0504726E191964B4AA041F257E794B9C7B40AE589DED5016125C48599CC30A2152FE3B401B0525C9FB190354D6E9F840DF97800CA333EA927F84
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..6....................6....5K.y.......6
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9159246284584364
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMwt6E7l9tQksAQn:Svbt6gfo
                                                                                                MD5:5C56677A0822B6F922124F4E4AE5A625
                                                                                                SHA1:D1A78F3F6F949CA8C8593DFD24A8C248642BBF38
                                                                                                SHA-256:7D0E61F3CA3DAE5BB75AAF6318BDE4F128DA9662FE1D75FC245F5D4B5E4188CE
                                                                                                SHA-512:0090C31C35AF1B6718F4DB3FE7AA2E6F06240B7895DF417FF9500E08C66A9F9D98095378558131C2D96EA129FDC7DF30BE876F4B18B887872B0ADDFA9C3A59A8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..5....................5....5K.y.......5
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):4088
                                                                                                Entropy (8bit):4.9424596896562925
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:M59Bgw27HPqAKMUw09nChvvMDqTxx462sN6nyWglONjPRtk5dR2BlNnqpZXXZJ8E:twqHPqFutxHS5x1qppH8nzbtfuvv
                                                                                                MD5:19A9BE91745F74598CE1F90F209D6FBC
                                                                                                SHA1:630727BB3E032E4A3C8AE95B6FDE963BDEA5E350
                                                                                                SHA-256:C8DAFBFEAB89E53C9521B8FFD5ACCF85477A22048CE1251138332D5A9EAC0D69
                                                                                                SHA-512:DC50610B3A03E628C918B10746C329E340B9D94D184D57F655236F685EEFA0A7AF1C8029ED34D4E7B351FB347330FD9A6F8133373A099CB78FC267F1C9CE375D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .[..............$.....[.....5K.y..E.Z...S.a.u.d.i.a...U.c.h.i.n.a...C.h.e.c.h.i.a...A.n.t.a.k.t.i.k.i...A.z.e.r.b.a.i.j.a.n.i...K.o.n.g.o. .(.D.R.C.)...A.s.i.a. .y.a. .K.a.t.i...S.u.d.a.n. .K.u.s.i.n.i...U.m.o.j.a. .w.a. .U.l.a.y.a...A.m.e.r.i.k.a. .K.u.s.i.n.i...A.s.i.a. .y.a. .K.u.s.i.n.i...K.i.s.i.w.a. .c.h.a. .M.a.n...M.j.i. .w.a. .V.a.t.i.c.a.n...O.c.e.a.n.i.a. .y.a. .N.j.e...A.m.e.r.i.k.a. .y.a. .K.a.t.i...U.l.a.y.a. .y.a. .K.u.s.i.n.i...U.m.o.j.a. .w.a. .M.a.t.a.i.f.a...A.f.r.i.k.a. .y.a. .K.u.s.i.n.i...C.e.u.t.a. .n.a. .M.e.l.i.l.l.a...G.u.i.n.e.a. .y.a. .I.k.w.e.t.a...J.a.m.h.u.r.i. .y.a. .K.o.n.g.o...S.a.h.a.r.a. .M.a.g.h.a.r.i.b.i...V.i.s.i.w.a. .v.y.a. .A.l.a.n.d...V.i.s.i.w.a. .v.y.a. .F.a.r.o.e...W.a.l.l.i.s. .n.a. .F.u.t.u.n.a...A.m.e.r.i.k.a. .K.a.s.k.a.z.i.n.i...A.s.i.a. .y.a. .M.a.g.h.a.r.i.b.i...A.s.i.a. .y.a. .M.a.s.h.a.r.i.k.i...K.i.s.i.w.a. .c.h.a. .B.o.u.v.e.t...V.i.s.i.w.a. .v.y.a. .C.a.y.m.a.n...V.i.s.i.w.a. .v.y.a. .K.a.n.a.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.00791013918967
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtldelFal9lYuBFQlj/Ohc7H1:SBtkJUlY4KwEyH1
                                                                                                MD5:5B0B7B55B3DDAC3A9199B9DBB8F0A86F
                                                                                                SHA1:DB9B7612D73CCB089B83F9D8A6D2124201173911
                                                                                                SHA-256:7BEA1755CCCB0764FD7EFE6453176624CEE438B0F2C2DC5FC5806F96FFB8C0B3
                                                                                                SHA-512:2307C00F4F155694E7868E8670B75072428BE29D906ADCA2F526C31ACBC25D72EAD08C903ECACB64070CA34F7889AE46FD6E516BEBD16B4EE9A9F4CCB0810BC7
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................5K.y..b.u.d.d.h.i.s.t..................P
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9223749573488704
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMJ06E7lRlldsdn:Sv/6gy
                                                                                                MD5:BA8F4166B092D8AD816001D2BCBBB85E
                                                                                                SHA1:621D56098BCB62B4DCFD93B7AEBA908D370CA4EF
                                                                                                SHA-256:54853C8D23B15997DE0DC56918289149F5DD7588B198CEEDB1B615AE0AE7A234
                                                                                                SHA-512:C5B4FBC148BB5BB2DC5012BBD4BEC68E5720B1E53F3B09B56E040432EA4E623384A608262B17EDD7D68F9A6502058270AF2EE4072578C7931F2053FB39C2863C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.sb...................sb....5K.y......rb
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):92
                                                                                                Entropy (8bit):2.8199785675133215
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlF112lYlillq85f91DP:SBtkJclIilLf9tP
                                                                                                MD5:A3693BCEFC128E317A8A84A488BDFB57
                                                                                                SHA1:8E39330E6424CADCF3307DF868CC200D0817FD5A
                                                                                                SHA-256:E12BBD6A876437281EBD1D21E1BB7185BF8B74B2A2DF71F33E81D35EA9ACB4FA
                                                                                                SHA-512:03AB84FFC913A6259FB292DD52DD54603349D9606FA84FB759C69246FA37FDDB8A4E956D9ECC8FFB483596809A5B919961ABD82202F73AE57FFD27D2CA956018
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................5K.y..f.i.l._.P.H...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):8200
                                                                                                Entropy (8bit):4.188608669078113
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:yLM/lG6UmhU82ziUBhPG4QocO1NE8ajCqEH3qpJ8/NVL:y6QU129gOPXajCLXq8FVL
                                                                                                MD5:E32CC09902CA3333C74C6E9EBA80CC9E
                                                                                                SHA1:F4E671C3FCB1ED8FA37842869A71074BC62C4375
                                                                                                SHA-256:C2E226113288A9CBF7E91826E59AC580E245DCB43470D7E25A31CF54BD65965E
                                                                                                SHA-512:D7CC8C3A17FF0AFDCA57564F477A0B2837A95B19FB30CE286A098FC099A8385AEBFB09F0B7A2505FF5C0C3833878DB9793BF7E9AE05B55969A86F10842F4A125
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .;..............#.....;.....5K.y..L.a.u...F.i.s.i...K.a.n.a...K.a.t.....M...l.i...N.i.u.....P.e.l.k...S...t.i...T.o.k.o...K.e.n.i.....K.i.u.p.a...K.u.a.m.u...L.+.p.i.a...N.i.s.i.a...N.o.a.u.....S...k.i.a...S...p.i.a...S.+.l.i.a...T.o.a.k.e.......s.i.a...H.M.l.a.n.i...I.e.m.e.n.i...K.a.l.i.s.i...K.a.p.o.n.i...K.u.e.i.t.i...K.u.i.a.n.a...K...n.a.t.a...K.M.s.o.v.o...M...m.a.n.i...P.a.h.a.m.a...P.a.n.a.m.....P.e.l.i.s.e...P.e.n.i.n.i...P.o.l.a.n.i...P...m.u.t.a...P.k.t.a.n.i...S.e.l.u.s.+...S.e.M.s.i.a...S.i.p.u.t.i...S.k.t.e.n.i...T.k.v.a.l.u.....A.l.u.p.a.....*.t.a.l.i...H.a...a.m.o.a...K.a.m.i.p.i.a...K.u.e.n.i.s.+...K.u.l.a.s.a.o...L.o.m...n.i.a...L.u.a.n.i.t.....M.a.l...s.i.a...N.a.m.i.p.i.a...P.a.l.e.i.n.i...P.o.l.+.v.i.a...P.u.l.u.n.e.i...S.a.m.a.i.k.a...S.e.m.i.p.i.a...S.i.a.m.a.n.e...S.i.a.p.a.n.i...S.i.p.e.i.n.i...S.o.a.t.a.n.e...S.u...t.e.n.i...S.M.m.a.l.i.a...T.a.i.l.a.n.i...T.a.i.u.a.n.i...T.u.n.+.s.i.a.....E.u.l.o.p.e.....I.l.a.a.k.i.....I.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):5712
                                                                                                Entropy (8bit):4.653528254810595
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:11lbKGCrJj3azVrvUiLOH4fxSiqh/rQSoetMMLSyxc8ND6//eg50DqppH8nzbfQh:11irJTaN5LOsxSiI/rQSoeaMLSOc8NGN
                                                                                                MD5:A22C8797E62A97E39371826659F8B222
                                                                                                SHA1:CDC095E9C0DA848D20E1852850C5DDC1A8B5DA34
                                                                                                SHA-256:076A2751183CB9ECCB360F3248F40A42AD32B3D1138EBC7230F192A64D4273F9
                                                                                                SHA-512:524EDB17C284FAA049862F2F556ACD20615E9F282CDF2393130CBF731F5FDF14C34AFB776B59DDC1CE034E0082DC1EF4D9315F89512D1A09CB1E2B59C47D6787
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................$...........5K.y..B.K...B.M...A.B.D...F.a.s.....i.n...K...b.a...0.r.a.n...^.i.l.i...D...n.y.a...M.1.s.1.r...R.u.s.y.a...T.u.n.u.s...U.m.m.a.n.....e.k.y.a.....r.d...n...0.s.v.e.....C.i.b.u.t.i...K.o.s.o.v.a...K.u.v.e.y.t...K.1.b.r.1.s...L...b.n.a.n...N.o.r.v.e.....S.u.r.i.y.e...0.s.r.a.i.l...0.t.a.l.y.a...B.a.h.r.e.y.n...B.e.l...i.k.a...B.o.l.i.v.y.a...C.e.z.a.y.i.r...E.s.t.o.n.y.a...J.a.p.o.n.y.a...K.a.r.a.d.a.....L.e.t.o.n.y.a...N.i.j.e.r.y.a...P.o.l.o.n.y.a...R.o.m.a.n.y.a...T.a.y.l.a.n.d...T...r.k.i.y.e...U.k.r.a.y.n.a...0.r.l.a.n.d.a...0.s.p.a.n.y.a...0.s.v.i...r.e...0.z.l.a.n.d.a...A.r.j.a.n.t.i.n...B.r.e.z.i.l.y.a...E.t.i.y.o.p.y.a...F.i.l.i.s.t.i.n...H.o.l.l.a.n.d.a...K.a.m.b.o...y.a...K.o.m.o.r.l.a.r...L.i.t.v.a.n.y.a...P.o.r.t.e.k.i.z...S.l.o.v.a.k.y.a...S.l.o.v.e.n.y.a...T.a.n.z.a.n.y.a...B.a.t.1. .A.s.y.a...A.v.u.s.t.u.r.y.a...B.a.h.a.m.a.l.a.r...D.o...u. .A.s.y.a...E.n.d.o.n.e.z.y.a...G...r.c.i.s.t.a.n...M.a.l.d.i.v.l.e.r.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):4912
                                                                                                Entropy (8bit):4.4248206727410295
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:eIe8ZPFcykYhd4+gk0kStLGl/E782qiNhXXf0m208EmkU0kXF9D5+lm+6LrPj:O+PFcyksdMk0kStLA/n2qiNhXXf0xmx+
                                                                                                MD5:6032FAE8B1E0526E2D7EF9DEF5E7DCA0
                                                                                                SHA1:FE8CD9B123898A4B74B4A5480C1B5DADFEF04D43
                                                                                                SHA-256:6BE93B4EA4F2090C99699A60248936B38C6041A146D4BAD25FA856EA9352596A
                                                                                                SHA-512:35B6BD0B7231A788BE7FB51D45B0A79BCB79CDEFB2A725C7F5B1B277948E748C053B672C2E0DB67E8D3A9152EBEABD57200A17FD8111A138069140C603B3E295
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................5K.y..H.i.n.d...L.a.w.s...M.i.c.r...N.i.w.i...P.i.r.u...T.c.a.d.....a.n.a...b.c.i.n...B.i.l.i.z...B.u.m.a.n...C.c.i.l.i...H.a.y.t.i...K.i.n.y.a...M.a.l.m.a...M.a.y.u.m...M.u.r.i.s...N.a.w.r.u...Q.a.m.a.r...Q.u.m.u.r...R.u.s.y.a...S.a.m.w.a...S.u.r.y.a...T.u.k.l.u...T.u.n.e.s...U.r...u.n...Y.u.n.a.n.....i.r.a.q.....i.n.y.a...l.u.n.g.a...l.m.u.g.u...A.n.g.u.l.a...B.r.u.n.a.y...B.[.a.z.i.l...D.z.a.y.e.r...F.[.a.n.s.a...I.m.a.l.y.a...L.i.s.u.m.u...M.a.l.d.i.v...M.e.[.[.u.k...M.i.k.s.i.k...M.u.n.a.k.u...N.i.p.p.a.l...N.n.i.j.e.r...Q.u.b.r.u.s...S.b.a.n.y.a...S.s.i.c.i.l...S.s.u.d.a.n...S.w.i.s.r.a...T.u.r.k.y.a...U.c.a.n.d.a...V.i.m.n.a.m.....u.m.m.a.n.....i.b.u.t.i...b.c.u.m.a.l...l.a.y.w.a.n...l.u.v.a.l.u...A.l.b.a.n.y.a...A.n...u.r.r.a...A.r.m.i.n.y.a...B.a.%.r.a.y.n...B.e.l.j.i.k.a...B.i.r.m.u.d.a...B.u.l.i.v.y.a...G.r.i.n.a.d.a...H.u.l.a.n...a...I.k.w.a...u.r...I.r.i.t.r.y.a...I.r.l.a.n...a...I.s.l.a.n...a...I.s.r.a.e.i.l.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):4916
                                                                                                Entropy (8bit):5.022526314614901
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:pEnEdx+Rl2NYo9y4W/86jkBddmCO2XOqpPH8nWYAG91Mj2Prv:pEKx+RE9xtldMCEqpv8rJPL
                                                                                                MD5:1731FF68868390BBEDF798EC2A13215A
                                                                                                SHA1:52B37FD031B2B76A98AADCA8E20A9626BBD30AA0
                                                                                                SHA-256:17B782ED0B9C5B1C318F1F7399BD97DBB4C5468156613406F528AB8C72AAF034
                                                                                                SHA-512:ECC9CFF8005D9D059DF9018A3CACFFBE56E96BACA20D6ACEB160CDA27C94FE37A166131388D7A75B90822C392B2F2FB0115627D576541CDB1172D64B97F4ADE8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .U..............!.....U.....5K.y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
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.8246240823663435
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlgelU8gl8l/dp+zl3MlyVEap:SBtkJZlU8g8l/D+ClsEap
                                                                                                MD5:41D7A1C58CD8A0A1A989415463905F45
                                                                                                SHA1:8913AD4B76125ED938B06CC7A34C53F06360FA5A
                                                                                                SHA-256:2FA4F61D1AA33F632A99991D0784FE341F9FCB4469103B0A5277C797050AF2C5
                                                                                                SHA-512:0F3E7EB3CA11B32D5AD8A29E24BCBF4CBA7D8443A31CAC1C50C9BD994D5E54D2A5A0E1E6B067579F5F2631EF9348044CDBCE08AFB0F92B60C46FE15933121492
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................5K.y..v.a.i._.V.a.i.i._.L.R.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):5152
                                                                                                Entropy (8bit):4.476373714928377
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:mlEhvV/y1dxNRgs9rY9nmIauhrO057HiMhPmq46eEKGnVb4KXiE6M40f5wsBRpk2:mkUdbacrMrr1qenVUMbH40f6JFRGRWWp
                                                                                                MD5:85F8AD6E7E0F7AECDED5C2D6B77FC9FF
                                                                                                SHA1:A38276921E0D5D5A3B1DC9BDB334EE71E1EE739D
                                                                                                SHA-256:31B0F5518E3A11BB007A174DDDD9110F3AEF72C20E721AF3B343CEADA5B26010
                                                                                                SHA-512:1492DC59D0A84B2B405AE21510962A79141B08990ADAA85FBF36F59458DB973CCD8D95BF59369AB75E9E6C36F42ED359344F55AAFFEA56B117E73950D4584303
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .Lo...................Lo....5K.y..P.o.o...F...j.i...N.e.p.a...N.i.w.e...N.o.r.u...P.a.l.o...P.[.r.u...B.h.[.n.i...C.h...d.i...C.h...l.i...F.[.K.s.i...H...i.t.i...H.[.l.[.K...J.a.m...)...J.a.p.a.K...K...n.y.a...K...n.g.o...N.a.).j.a...N.T.T.w.e...P...l.[.K...S.u.d.[.K...S...y.a.K...T.T.n.g.a.....t.a.l.i...A.K.d...r.a...A.K.g...l.a...A.K.g...l.a...B.h.a.r.[.K...B.h.e.l.i.z...B.h.u.t.a.K...C.h.....n.a...F.i.K.l.[.K...G.a.b.h.T.K...G.u.w.a.m.i...J.T.T.d.a.K...K.a.t.a.h.a...K...n...d.a...L.a.h.a.b.u...L.i.s...t.o...M.a.v.o.t.e...M...s...l.a...M.T.n.a.k.o...M.T.r.o.k.o...M.[.s...k.o...P.a.n.y.[.)...S.e.s.h.[.[...T.a.i.w.a.K...T.u.v...l.u...W.a.l...s.i...Y.e.m.[.n.i.....n.d.i.y.a...A.g.i.r.i.y.a...A.m...n.i.y.a...B.h.[.m.u.d.a...F...l.e.p.i.K...H.T.n.d.u.r.a...J.i.b.h.u.t.i...J.T.T.j.i.y.a...K.a.m.e.r.u.K...K.i.y.u.b.h.a...L.e.b.h.a.n.T...L.e.b.h.i.y.a...L.u.s.i.m.b.T...M.T.r.e.s.h.T...N.i.d.T.l.[.K...P.a.r.a.g.T.e...P.i.t.i.k.[.K...P.o.t.o.k...i...R.a.w.u.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):4712
                                                                                                Entropy (8bit):5.124600475152206
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:rl+Vu38cUfpZrr1FjxlsqppH8nzOjm7EHE:rl+VVH/IqpJ8ES
                                                                                                MD5:E9AEB0AE15539E723009F72D594197CE
                                                                                                SHA1:BAAA2B5F5271B8448E34D25783F538AFCBD68098
                                                                                                SHA-256:10BFF4B83DC15A8CD820352E5DBC48659F2B56C4FEF36128FEC70BD6D09B7E39
                                                                                                SHA-512:5D962958CD7D68B460393BDC797FD3FE9E06EC2053FCBFF747731CBD3260DB0BEB22B6150AA7F0121E0E1A3E8B2762A1150EC14F8E746BCFE25436044D664998
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................&...........5K.y..B.......o...L...o...N.g.a...S...p.......c...N.a. .U.y...T...y. .......n. .......A.i. .C...p...B.a. .L.a.n...B...c. .M.....B...c. ...u...C.h...u. .....G.r.u.z.i.a...H.y. .L...p...M.a.-.r...c...N.a.m. .M.....N.a.m. ...u...T...y. ...u.......n.g. .....B...c. .P.h.i...L.i.-.b...n.g...M...n.g. .C.....N.a.m. .C...c...N.a.m. .P.h.i...T.h...y. .S.)...T.r.u.n.g. .....T...y. .P.h.i.......n.g. ...u.......o. .M.a.n...C.a.-.r.i.-.b.....H...n. .Q.u...c...N.h...t. .B...n...P.h...n. .L.a.n...T.h...i. .L.a.n...T.h... .g.i...i...T.r.u.n.g. .M.....V.i...t. .N.a.m.....a.n. .M...c.h.......i. .L.o.a.n.......n.g. .P.h.i...C.a.m.p.u.c.h.i.a...H...n.g. .K...n.g...N.a.m. .S.u.d.a.n...T.h...y. ...i...n.......n.g. .N.a.m. .....B... .....o. .N.h.a...T.h... .N.h.). .K.....T.r.i...u. .T.i...n...T...y. .S.a.h.a.r.a.......n.g. .T.i.m.o.r.......o. .B.o.u.v.e.t...B... .B.i...n. .N.g.....T...y. .B.a.n. .N.h.a.......o. .N.o.r.f.o.l.k..... .R...p. .X...-.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):984
                                                                                                Entropy (8bit):6.664654262645045
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:xmrJVJ7OkJBvWa9D2h1i/veBQ+7TTKO542Kc2hdl/QZ:xMmkXWa9D5HeXTb42SqZ
                                                                                                MD5:2DC65410ADD51F24840BE253B3DE1E6A
                                                                                                SHA1:555D4E6EB7C777E657DC6FA511950B6A31426BA1
                                                                                                SHA-256:E8647FD90A97C6C221DEABE0E4E4F833E3B726C9424091695E2419045D7F2B60
                                                                                                SHA-512:01BEC81C93895A11FDB507BCFE01386D0D590E20827AAD4AB59CE50E25DE3074801996FD2B3AC9D8231AF80049DC5ECAAB8E3AD38AE8FD9B4135706CDC53F60F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..........................5K.y..............................................................................................".+...1.7.:.=.@.C.I.L.O.U.X.[.d.g.j.m.s.v.y.|...............................................................................................!.$.'.*.-.0.3.6.?.B.E.H.K.N.T.W.Z.].`.c.f.i.l.o.r.u.x.{.~............................................................................................... .&.).,./.2.5.8.;.>.A.D.G.J.M.P.Y.\._.b.e.h.k.n.q.t.w.z..............h.J.v.2.!.!..u.wo.".?..."....b@M..3E3...2..-!B!i!G...... ...!$!..k./......`......6./"......{h.#.....~.}.....!..U!2........}.v.}.....!...}.._..#....W"."g.%J..M".I2~.......?~.W...Z..`3.)...Ko?..h..XRQ..2.w.}.`pJ...o.@.`Dw.3.3a"7!.!..u".....hAh;3..'w."l....3...".".@..,...x......_!<J..eo_..I..}.....j..3... q.G..w...".o...".".........."."..~!.A.w.3.h....z@[3q3.@..Z.s!D......"%...w...Ww.@.2.}.`.!q.o..v...o$3....O.'..~.R...?..9..". v`dh... .R... ...........P. .`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2644
                                                                                                Entropy (8bit):5.091703059176713
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:CiwA19vs11DmsHoCKVDqoFbQKx9eX0mkXWa9D5HefedKDD5G0FwKDXE:h99vOhH1K5bQ08kXF9D5+fbA0FRXE
                                                                                                MD5:00AA27ED0CE3BDFCE88D6CF6E8CEED99
                                                                                                SHA1:1E585D284392D7571D764C70EC0A9B49047B5ABE
                                                                                                SHA-256:9D047105EA91AD8C57E97667B577F47D5C2AD0AFE33A25C63483D6D3B4AFBA5B
                                                                                                SHA-512:1084D8FDE1911579DDEB2F53CC19ADA97FCDA2B6A646B8E353AF6C12A56BC1E333B14DE53300C833EB956E383E5A79E03E26F7524A7BE97275A915B889327417
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .0....................0.....5K.y..L.a.s.a...N.i.j.e...N.o.w.e...C.a.a.d.i...T.t.a.k.e...C.a.y.i.n.a...G.y.o.g.y.a...L.e.s.o.s.o...S.e.s.e.r.e...T.i.m.o.w.a...Y.i.t.a.l.e...B.u.d.a.a.k.i...B.u.t.a.a.n.i...B.u.y.i.n.d.i...E.s.y.o.p.y.a...J.j.i.b.u.t.i...L.a.t.i.v.y.a...S.u.d.a.a.n.i...T.u.n.i.s.y.a...Y.i.r.a.a.k.a...Y.i.r.a.a.n.i...A.l.i.g.e.r.y.a...B.a.a.r.e.e.n.i...B.e.r.e.m.u.d.a...B.u.r.u.n.a.y.i...E.m.i.r.e.e.t.i...K.a.m.b.o.d.y.a...K.o.l.o.m.b.y.a...M.o.l.o.d.o.v.a...P.o.t.o.r.i.k.o...S.i.p.u.r.i.y.a...V.e.n.z.w.e.r.a...Y.o.r.o.d.a.n.i...S.a.w.u.d.a.r.e.b.y.a...E.b.i.z.i.n.g.a. .b.y.a. .C.a.g.o...E.b.i.z.i.n.g.a. .b.y.a. .K.k.u.k.i...G.a.y.a.n.a. .y.a.k.u. .e.k.w.e.t.a...A.n.t.i.g.w.a. .n.i. .B.a.r.a.b.u.d.a...E.b.i.z.i.n.g.a. .b.y.a. .K.o.m.o.r.o...L.i.p.a.b.u.l.i.k.a. .y.a. .C.e.e.k.a...K.o.r.e.y.a. .e.y.a. .m.u.m.a.m.b.u.k.a...P.a.l.e.s.i.t.a.y.i.n.i. .n.i. .G.a.z.a...T.u.r.i.n.d.a.a.d.i. .n.i. .T.o.b.a.g.o...E.b.i.z.i.n.g.a. .b.y.a. .M.a.l.i.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.852172957387978
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlgelU8gl8l/dU1l6lazlI/ko:SBtkJZlU8g8l/Wl6leGko
                                                                                                MD5:F028732250A08A36422C2C0F130C7D02
                                                                                                SHA1:089E81793292485075C360CB7206B35ABE44A19D
                                                                                                SHA-256:B9CE9F21DC60A7CC91FA31EACFE76C21FA35E53565FC70674E78F58E8E44211C
                                                                                                SHA-512:E1CE98EAD1257CB2A83FA1452AAE96A5C1A7BF4D4242C0C73FF84C405EADF18F98A6CE49ED4ACE9020AABF543F1F02005DA2AFA0E015287D8A320D1C863B25D8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................5K.y..y.u.e._.H.a.n.s._.C.N.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/dsp:SBtkJ1li6gml/8
                                                                                                MD5:3F209B3AA35603DCBB208A74CAA36C86
                                                                                                SHA1:249DE057005BE697205333ABA0433C5B04653BBB
                                                                                                SHA-256:F3965E339C622C96879DEE316DE42F9E9F693DDEB7A52FDCEBBA027171F2C86A
                                                                                                SHA-512:02411AE5728814057E0CA78D850EEA85B3ACA16DFDBEE97A7C01860DA3B82640EEBE60960938C7F64B05D9E9FE8BAE0B826D242E24B33C40024836F716F17E31
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................5K.y........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):3880
                                                                                                Entropy (8bit):6.5522206645256516
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:iT+OFxAMsgbJveCkC+Bi0qppH8nzO/5WMlKqH:iT+ufbJvcCgi0qpJ8yWMf
                                                                                                MD5:DFBC65905ADE0CB29F2B59189AC3BECF
                                                                                                SHA1:9E53E80F93A050F81B4C3D1179BF543061851317
                                                                                                SHA-256:36CB99D4EDAB58B15D74D716882F50C1602B72B84B30C34811DF4F104D31E6BA
                                                                                                SHA-512:15380E93E7D4B0A51E3FC945B778989E798C159ABC136689D8203ECD9F31510AD60C236D88C8631312E8E718CC90B7189BFEAE97E304CE650FE2FCA928596929
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..2.............&......2....5K.y.....V....V...N9N...N.N...N'k...N^...-N.N..-N.V..-N^...9N....MN._.._N....N2m...O.g..sQ.\...Q.\...R.~...R....S'k...S^...WS'k..WS^...pS.^...S.]...S~n...W.S...Y.T...].g...].....^J....^.R..._.V..*c.Z..wcKQ...e.....eNm..zf)R...g....'k2m..'k.v..dl.R...l.V...lpQ...l.V..wm0W...o...Yt....^txQ..^t.X...y.....~.e...~.W....8u.....c....pQ..w.pQ.....S....'k....^......[....WS..?..f....V...q\..T..T.V...NWS.N..WS.9N.."}l.....N.^vl..-N..2m..LNKQpQ..LNr^....LN.b-W..*O0W:S../O)RyQ..[O._....Q.k.N..)R.k.N..WS.g2m..aSTX.\..bS.e....bS.h!X...S)R.N...T.^.c...U.......V.tbS..#W..\..^X...\..eY0W)R...[-W.b...[S..\..<\.e.\..<\.l.\...].Tl....].bl....^......^.\...^.b"}...a'Y)R..XbKQ.R..id.~.T...e..pQ..9h...\..<hu.pQ...h...Q..'kCQ:S...k)R.e...l...\..1r.\pQ..YrpN.R..Yu<\jl..~vUa'Y...yidW....z<\.e....<\.N....WS...."}Xb..._.[..^..k.N..?....]..l.i`.\..l..b.~..l..~yr..l.3..N..}v.OW..e..WS.^.2m..l.eg...N...N..<\.N...O.R)R.N..KQW.0W.N..)R.k.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):3400
                                                                                                Entropy (8bit):5.791705989472858
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:hzh55C8gXlYi8+qZGDanf+ilCAx6wEmzKYW3F:nr/ianWi4+sAKYW3F
                                                                                                MD5:2E5F67F78288205A57C9D007678F91E4
                                                                                                SHA1:58F076D147C9401C74E48CFDC222D0857C0D3D22
                                                                                                SHA-256:7F7B201F51FE1228F46B4CDEBC228F838C4B3D746D64C37C43FB76CACE3A9273
                                                                                                SHA-512:BCEB142E37C9EEB752D233CF8EFA7E403BB0547F30C30230EBEBE1C2D04ECE512E07185C5D8F7D63071E921B6982641449EBF4B5A76B7411E885EF6C7FC034A3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................:.. .%......J...J.../.....%.........v.e...o.z...g.i.e...g.l.i...o.n.n...u.r.a...m.a.t.g...f.a.n.....m.a.i.s...a.v.u.s.t...s.e.t.t.....s.o.n.d.a...e.p.o.c.a...a.v.r.i.g.l...f.a.v.r.e.r...s.c.h.a.n.....z.e.r.c.l.....d.a.m.a.u.n...s... .C.r.....f.a.n.a.d.u.r...g.i.e.v.g.i.a...m.e.s.e.m.n.a...o.c.t.o.b.e.r...s.c.h.a.n.e.r...a.v... .C.r.....e.n.g.l.a.i.s...s.e.c.u.n.d.a...s.t.e.r.s.a.s...d.u.m.e.n.g.i.a...v.e.n.d.e.r.d.i...g.l.i.n.d.e.s.d.i...s.e.t.t.e.m.b.e.r...z.e.r.c.l.a.d.u.r...p.u.s.c.h.m.a.u.n...d.i. .d.a. .l.. e.m.n.a...z.o.n.a. .d.. u.r.a.r.i...a.v.a.n.t. .C.r.i.s.t.u.s...m.e.s.a.d.a.d. .d.a.l. .d.i...s.u.e.n.t.e.r. .C.r.i.s.t.u.s...E.E.E.E.,. .'.i.l.s.'. .d. .'.d.a.'. .M.M.M.M. .y...E.E.E.E.,. .'.i.l.s.'. .d. .'.d.a.'. .M.M.M.M. .y. .G...?.[... ... ... ... ... ... ... ... ... ... ... ... ... .-. ... ... .+. ... ... .O. ... ... ... .M. .S. ... .m. ... ... .k. ...]...A.[.A. ... .B. .C. .D. .E. ... ... .F. .G. .H. .I. ... .J. .K. .L. .M. .N. .O. ... .
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2060
                                                                                                Entropy (8bit):4.934466690789509
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:m+SqFfc7SnplEwD3Pt/SNOofqP5pQKVNdQKoQKAQVPgGGhiRP+g/3hutuVdzK:z5u7MpewD39/iqRuKaKdK1VP9x+g/3wD
                                                                                                MD5:9E079C4A48B157D36285090C71188F8F
                                                                                                SHA1:14A8149C73B70011BA44D7AAFBB7483170D0B052
                                                                                                SHA-256:02068A32035EEC4FE65408983B67961657254819FFE879EBA9F5E6CC6FBE2377
                                                                                                SHA-512:2F68DA198A90A408CD29ECB503D909E782F3C4B8C0611B09991E244782F9A482D22FF5D0F98B0E146DF18069EEFE3D1811721239DA59A3FC1397C412E45CA5E1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .m....................m.........I.1...I.2...I.3...I.4...c.u.....G.a.s.....G.i.c.....K.a.m.....K.a.n.....M.a.t.....M.u.t.....N.y...Y...N.y.a.....N.z.e.....U.g.u.....U.k.u.....U.k.w.....W.e.r.....g.n.d.....g.n.u.....g.t.u.....k.a.b.....k.a.n.....m.b.e.....Z...M.U.....Z...M.W.....I.g.i.h.e...I.s.a.h.a...M.b...Y.....N.z.e.r.o...U.m.u.s.i...R.u.s.a.m.a...U.k.w.e.z.i...U.m.w.a.k.a...M...s./.N...s...R.u.h.e.s.h.i...U.m.u.n.o.t.a...G.i.t.u.g.u.t.u...I.s.e.g.o.n.d.a...K.i.g.a.r.a.m.a...M.u.k.a.k.a.r.o...M.u.n.y.o.n.y.o...N.y.a.k.a.n.g.a...R.u.h.u.h.u.m.a...U.y.u. .m.u.s.i...N.d.a.m.u.k.i.z.a...N.t.w.a.r.a.n.t.e...K.u. .w.a. .k.a.n.e...K.u. .w.. i.n.d.w.i...N.y.a.n.d.a.g.a.r.o...K.u. .w.a. .m.b.e.r.e...E.j.o. .(.h.a.h.e.z.e.)...E.j.o. .(.h.a.z.o.z.a.)...K.u. .w.a. .g.a.t.a.n.u...K.u. .w.a. .g.a.t.a.t.u...K.u. .w.a. .k.a.b.i.r.i...I.n.d.w.i.,. .I.y.i.n.g.a...M.b.e.r.e. .y.a. .Y.e.z.u...N.y.u.m.a. .y.a. .Y.e.z.u...I.m.i.n.s.i. .y.. i.y.i.n.g.a...K.u. .w.a. .g.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1012
                                                                                                Entropy (8bit):4.635795293435391
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:kOTC7wOLMZ4i5PVW/gvV2ffaA/aAAXP7hUqp9Zf+jnW:kp7tLo4i5PVW/gvV2ffn/nIaW
                                                                                                MD5:D4145C815EFC76FA1CC41C861616F59D
                                                                                                SHA1:3D2FF1AE6BAD328F91AA92FD8FC82766DB3890A9
                                                                                                SHA-256:9AA0975F68F60A25E7082D0034B9B35285BA94B252D13DCF2FD819D754B79E95
                                                                                                SHA-512:1B0A36DBABD7BE6C247F40C34F65FBA0CDFC9CD8AE92191F69A6E896F88E7B0296781CC03F471598160A5EDD4696A487DEC7363DA9E3BC745EC5325EFDEFD351
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...............................J.o...S.....V.i...D.u.m...J.o.i...M.i.e...S...m...V.i.n...s.e.a.r.....s.e.a.r.a...n.o.a.p.t.e.......e...n.....T.r.i.m... .1...T.r.i.m... .2...T.r.i.m... .3...T.r.i.m... .4...n.o.a.p.t.e.a...t.r.i.m... .1...t.r.i.m... .2...t.r.i.m... .3...t.r.i.m... .4...d.i.m.i.n.e.a.......d.u.p...-.a.m.i.a.z.....T.r.i.m.e.s.t.r.u.l. .1...T.r.i.m.e.s.t.r.u.l. .2...T.r.i.m.e.s.t.r.u.l. .3...T.r.i.m.e.s.t.r.u.l. .4...t.r.i.m.e.s.t.r.u.l. .1...t.r.i.m.e.s.t.r.u.l. .2...t.r.i.m.e.s.t.r.u.l. .3...t.r.i.m.e.s.t.r.u.l. .4.......`5......./...mT.TG...>......TmT.T.......`5......./...mT.TG...>......TmT.T.............../.Z...P..._............./..=..d&(._...........Z..P......./.._.........0.8.@.H................... ...f.s.............!...................!.........&.............. ... ...........P;..P........H..PQ..P........... ... ..'.V...........Y...^...........c...h.............. ... ......".S...... ... ... ... ..`.... ..o.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1916
                                                                                                Entropy (8bit):5.056398847671726
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:0ZdehNrA7Lr5mr81Va61/eBGeDrayBTSGUH+BV0Ui2K0:0ZdA27Zy61/9iayBTJUeB7i50
                                                                                                MD5:93947EAB0BFCDF0693987E9681499882
                                                                                                SHA1:FAE6A29211ECE1B3C79D9877D2676AE0A97B5C57
                                                                                                SHA-256:21E38B84AAC991D2CA14467962F5E861AE5DCCAF1CBEF4D251D0BE8525C7888A
                                                                                                SHA-512:1428F3F517A100CCCA1AD60B02A04239CA5C88EE8BDE6849B9E0D68B8D0EBA717A72EACC3F8C8CAE838A84EE5B94407B8E159CA4DAD4F7CCBE3ACB1D6F0F75C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .................................A.K...P.K...M.a.g...M.o.k...M.p.g...M.s.h...M.s.p...M.u.h...M.u.j...M.u.l...M.u.n...M.u.p...M.u.s...M.w.i...M.y.e...I.m.e.h.e...M.o.k.h.u...M.u.n.y.i...M.w.e.s.i...L.u.s.i.k.u...M.w.a.k.h.a...I.l.i.j.u.m.a...I.l.i.s.a.l.a...M.u.h.a.a.n.o...M.u.j.i.m.b.i...M.u.l.u.n.g.u...M.w.i.t.o.p.e...I.s.e.k.u.n.d.e...M.u.n.y.e.n.s.e...M.u.p.u.g.u.t.o...M.u.s.h.e.n.d.e...L.w.a.m.i.l.a.w.u...P.a.s.h.a.m.i.h.e...A.l.a.h.a.m.i.s.i...I.n.e.n.g.. u.n.i...M.u.s.h.i.p.e.p.o...P.a.m.u.l.a.a.w.u...[.q. .r. .x. .z.]...M.u.p.a.l.a.n.g.u.l.w.a...U.l.u.h.a.a.v.i. .l.w.a...M.u.s.o.n.g.a.n.d.e.m.b.w.e...M.u.s.h.e.n.d.e. .M.a.g.a.l.i...A.s.h.a.n.a.l.i. .u.K.i.l.i.s.i.t.o...U.l.u.h.a.a.v.i. .l.w.a. .l.i.s.a.a...U.l.u.s.i.k.u. .l.w.a. .L.i.j.u.m.a...P.a.m.w.a.n.d.i. .y.a. .K.i.l.i.s.t.o...U.l.u.h.a.a.v.i. .l.w.a. .l.u.s.i.k.u...-.[.A. .B. .C. .D. .E. .F. .G. .H. .I. .J. .K. .L. .M. .N. .O. .P. .S. .T. .U. .V. .W. .Y.]...-.[.a. .b. .c. .d. .e. .f. .
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2112
                                                                                                Entropy (8bit):5.138122058230904
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:Rrrmz7Nh9fnIeLgwQbuMCk4blFvHizLWr53dVa+:Az7D9fIe0wXlFvdrj4+
                                                                                                MD5:8BF7D34AFA0DA29A5569C59AFB4D79ED
                                                                                                SHA1:D49FE367C24FB92F3218664416D79202EF456A91
                                                                                                SHA-256:86924720A1FE45BD00C69D3039977D574CCBA4B41514A353C7A251FD0DA04CFF
                                                                                                SHA-512:0DC95D73E8D04C145FD7DA02B664005E65476ECB92A526ED683A743B0B96B583234C2925FD45FDC767F5CC7F824FDA469117A0048395328C965CF6BA649934D8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................................L.K...N.D...L.....B.k.1...B.k.2...B.k.3...B.k.4...B.k.5...B...l...F.u.l...F...n...K.a.k...K.n.K...K...k...L.e.n...L...p...L...y...M.b.....M.v.u...N.a.b...N.g.b...N.g.u...N.g.....N.p.K...N.y.e...N.z.e...B...r.....L...s.....B...k.u.a...F...n.d.o...M.v.u.k.a...N.a. .l.....B...l...w.....D.i.m...s.i...K...k...r.....L.e.n.g.u.a...L...p...s.....M.b...n.g.....N.g.u.b...e...N.y.e.n.y.e...K.a.k.a.u.k.a...L...y.e.n.g.a...N.g.b.o.n.g.a...[.c. .q. .x.]...K...k.e.r...k.e...K...o.t...n.g.o...N.g.b.e.r.e.r.e...B.i.k.u.a.-...k.o...B...k.u.a.-.o.k.....B...k.u.a.-.p.t.....B...k.u.a.-...s.e...F.u.l.u.n.d...g.i...N.a.b...n.d...r.u...B...k.u.a.-.u.s.......Z.u.k.a.n.g.b.o.n.g.a...F...n.g.b.i.s..... .o.t.....F...n.g.b.i.s..... ...k.o...F...n.g.b.i.s..... ...s.e...N.d.u.r... .n.g.b.o.n.g.a...N.z...n.a. .n.g.b.o.n.g.a...F...n.g.b.i.s..... .u.s.......K...z.o. .n.a. .K.r...s.t.u...N.a. .p.e.k... .t... .K.r...s.t.u.../.[.A. .B. .D. .E. .F. .G. .
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1552
                                                                                                Entropy (8bit):5.562679160282238
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:ta9q+l9FijMLmnaxXdvf6yojy11W25i6U2dMuVs0YJ+o1Es5vGBZmO3Juz26BV5a:ta9TlN1tvgwzigMEsMoEsoBPcPV5oV
                                                                                                MD5:369E29AED455406489C35EDD0EC292C0
                                                                                                SHA1:D235E1593F5ED711F521EB51F39A50D56B55B587
                                                                                                SHA-256:490B22DE9747E24E8484CE8365EF12D8ACFFEE0541074FEBA5A058180FF69633
                                                                                                SHA-512:B18525336F9A39215984395523DD904391584E3F3EA3B16414C9590EF0FA1AB95EC80F191968DA73644736079C488616F81DDC88E3603E0BAD7AC192BD3B9D64
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................o.. .5......|...|.........5.$........1-..7-..=-..V-..0-Y-I-..N-0-b-..0-b-O-..V-S-[-..0-=-U-..0-=-a-..0-Y-0-..1-U-0-..7-0-D-..7-<-D-..7-S-J-..=-\-S-..I-1-T-..I-O-O-..N-0-U-..O-S-a-..[-S-\-..b-S-M-..b-S-O-..0-Y-I-N-..0-=- .1...0-=- .2...0-=- .3...0-=- .4...0-Y-I-9-..0-Y-Y-0-..N-0-U-Z-..V-S-[-\-..0-=-U-0-Y-..0-=-a-0-Y-..0-Y-=-=-0-..0-b-O-0-Y-..0-b-b-S-T-..1-U-0-b-U-..=-\-S-1-T-..I-1-T-I-T-..I-9-M-M-I-..N-0-b-b-S-..\-0-Y-S-\-..b-S-O-b-S-..\-I-<-0-a-\-..0-Y-0-N-0-Y-..0-Y-I-O-0-Y-..I-O-O-0-b-T-..Y-I-N-a-0-Y-..\-0-Y-I-O-\-..b-S-M-b-S-c-..0-Y-3-3-o-0-Y-..0-Y-I-9-b-0-Y-..\-0-Y-T-0-3-\-..\-S-Y-7-I-7-\-..7-S-J-0-O-1-I-T-..O-S-a-0-O-1-I-T-..[-S-\-0-O-1-I-T-.......C......NN....k..)...4mhEy.C............................W.!.0.............'./..4K,c.\.C..4.4.4....].N.'..P/..N..................k..)...4.MW*.).4......................0............\.....\.\.\.\.\...\..................W.!.0.............'./..4K,c.\.C..4.4.4....].N.'..P/..N......V.F.>.N.R...............8...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.8246240823663435
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlgelU8gl8l/66NPDelOpWn:SBtkJZlU8g8l/3YleW
                                                                                                MD5:BF9476BA2EE2652492A3C93F90DBD11F
                                                                                                SHA1:3A739DF1E67CA5ED347E751208765B2ED7226358
                                                                                                SHA-256:5FED9386CED762843B518BC2C859E899C4B1616D7B6A1B29F86CEF89B7D2A74E
                                                                                                SHA-512:B37937F77CEA2378AB23CD3435DFFF96C7C271E8EBD4C0ADE3272BAAC1D52B0119E26FCCF762354587D3F00E2FABD51D6D5A4C2D785BAFF00D6A4A5B7744F4F8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.................................s.h.i._.T.f.n.g._.M.A.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):20592
                                                                                                Entropy (8bit):5.567056141429851
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:0/V5/luxv6JBmatRuaM+rrqcccoDT5UfUP72zMt2UOVjgC:yD/Eh6JB++rrnMFOKC
                                                                                                MD5:839D5BDEEAAED1C24E312907C4F4F3C7
                                                                                                SHA1:9E9568CB145D194A27B06B9C5BFD6F63FBD6BDD2
                                                                                                SHA-256:F130D2930495255A2A439EA770F259DA24E8E7F0CE0763B46833F988A23385C4
                                                                                                SHA-512:A6D4A0A5D8C90DBA16B0F264ABB02512986886BCB089641658D8F1B9E0B2E28C573045129BC6799B424C2D4ECF55B82C7A9B36DC4BD351B40AE9ABA6CFC9C652
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................V................d.e.i...t...r...j...l...j...n...m...j...a.a.....m.u.~...r...n.o...p.a.u.a...i.j.a.r...m...g.h.....b...n.....z.a.r...d.n.e.s...`.a.k.a...r.a.d.....a.a.u.....j...l.a...j...n.a...m...j.a...n.a.p.....v. .n.....~.e.n.a...h.i.d.a.r.....a...d.h...a.e.v.a.t...v...e.r.a...h.a.n...a...m.a.r.c.a...m.a.r.e.c...r...z.n.e...s.r.d.c.e...t.e.r.a.z.......s.l.a...a.p.o.r.t...a...p.k.y...g.i.n.b.o.t...k...r.t.i.k...m.i.y.a.z.a...m.o.r.d...d...p.a.g.u.m.e.....a.i.t.r.a...p.o.p.o.l.....p.o.l.n.o.c...d.e.H. .r.....d.o.p.o.l.....l.e.t.o.p.....n.e.d.e.>.a...r.a.d.~.a.b...s.t.r.e.d.a...v. .n.o.c.i...a.a.u.v...l...a.p.r...l.a...b.u.d.o.v.a...f.o.r.m...t...h.o.d.i.n.a...j.a.n.u...r...k.l...v.e.s...m.i.e.s.t.o...m.i.n...t.a...n.a.p.o.l.....p...r.o.v.....t.e.l.e.s.o...v.l.a.j.k.y...z.v.i.e.r.a.....l.o.v.e.k...o. .{.0.}. .h...o. .{.0.}. .s...b.a.. o.u.n.a...c.h.e.a.v.a.n...c.h.o.r.d...d...d.~.j...a.t.h...p.h...l.g.u.n...t.i.k.e.m.e.t...v.a.i.a...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):4992
                                                                                                Entropy (8bit):5.3077770645051645
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:d3j4DdFqHMQryhp7DpRtHutN/bUl9JFZ0HLCdIsjIvNsNKkmG:d3+f717HKN/bUnJF3dI0SoLB
                                                                                                MD5:9915786772AE79B55A58EDA6004DBF83
                                                                                                SHA1:122F2C481E87852FB0AF2D87B81A5BB5FD6016C1
                                                                                                SHA-256:30AB12B4710F7AB7B7FFB3D0D4389B953078F2A6BCDB1758C5C8DFFEE8BC90DF
                                                                                                SHA-512:6E1C7EFA33D81D9861D0D6F4990493D0E9A50AB88E9342F2FAA3CC891F75A5159A2FECA54D938AEB8F6691994C0764D565E8CBA3DEE777759047375E112D332A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................)................l.....p.a...v.u...v.....i.p.....k.o.s...l...v...p.a.s...t.u.o...v.u.o...v...s...L...y...k.e.s.i...u...i.v...m.K.r.....m.........o.K.r.....o.........k.u.o.v.....p.o.r.g.e...v.y.e.s.i.....o.h.......L...y. .G...m...s.s.....c.u...K.u.i...j.u.o.v.l.....n.j.u.h.......s.k.a.m.m.....s.y.e.i.n.i...r.o.o.v.v...d...e.p.i.l.o.h.o...k.o.s.k.o.h.o...k.o.s.k.o.k.k.o...l...v.u.r.d.u.v...l...v.u.r.d...h...m.e.t.r.i.s...a...1... .n.i...l.j.....2... .n.i...l.j.....3... .n.i...l.j.....4... .n.i...l.j.....k.e.s.i.m.....n.u...E.,. .M.M.M. .d.....a.m.e.r.i.k.l...a...b.r.i.t.t.i.l...a...m.a.j.e.b.a.r.g.....p.a.s.e.p.e.i.v.i...t.u.o.r...s.t.u.v...t.u.o.r...s.t...h...v.u.o.s.s.a.r.g.....k.u.o.v...m.....n.u...p.o.r.g.e.m.....n.u...v.y.e.s.i.m.....n.u.....o.h.....m.....n.u...c.c.c. .M.M.M. .d.....d... .. .d...M...y...m.a.j.e.b.a.a.r.g.....p.a.s.e.p.e.e.i.v.i...v.u.o.s.s.a.a.r.g.....0.0.0. .b.i.l.j.o.v.n...0.0.0. .m.i.l.j.o.v.n...0.0.0. .t.u.h.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):132
                                                                                                Entropy (8bit):3.92328511820183
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tl0qUmlvlllK6gOZMH292ni2Pc3nslulflFpLbN:SvEqtPCJOyW92ni2Pc3nVTFX
                                                                                                MD5:05AAE6AD646FC609E972F1AC310EB11F
                                                                                                SHA1:FDD4C78C7A9EF570E3F328A37FA38B73BD518065
                                                                                                SHA-256:02D8BE65FF5BD34FA9DF351C4F32F958C16EE1BA4D082B99AAF20795BAC10E4F
                                                                                                SHA-512:F0A24C8E0256284F6B3C5C6BC065A801BCD2132E40168A5229DFE30C8CBDAA440E2E449D6080110EFA1FF283EEF05289D967FF074E29B00572E9271243FF372B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .l....................l............k..)...4.|.yn.8.......................`.... ..o.w......`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMnut6E7l//YEnG:SvVt6gXrG
                                                                                                MD5:03B4C2777B2AB020F0301B1F57B4486C
                                                                                                SHA1:1A8FE984F91940E6A8B86F9433BC64CE5D875B87
                                                                                                SHA-256:2001732718D567EDDB29306E39FE186BE95CD30BEA89A14A5CFFDA73C6E95539
                                                                                                SHA-512:D7FF5C4032BB90E9123B3054783DED9ABAC3B1413DA8E01F80BFCF0A07169CE7992B89454C839B3F5D1D4633B5ADE2AB093A68E9FF09AA825E9303C371929859
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.H+...................H+.............G+
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):524
                                                                                                Entropy (8bit):5.2552622387790615
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:3zAT6qiv6LdAuAzTE7WYsXWWYsTyyWqSIvxA1h2t2TqW64a:jAT86LdBVWY7WYaLi1hULWu
                                                                                                MD5:D989D18C09E8FE8402CE1B8421486ACE
                                                                                                SHA1:CCA30A2644CFB352E452AB76DC6FEB47B3873403
                                                                                                SHA-256:381B5C5ABE5FC34C609ACD7A5BD124E8A975D18BCA58306C3873D8540C50ED91
                                                                                                SHA-512:1D8775D32594E928702723363BA4BBABE76C0AA9B74010F8CE246E4F50DC7006121506E3C2340B43B4C299FBF857CF42D90C9623401DC1E07964D96EBC755061
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................w.. ........{...{...........A............$.5.5....A6....A6.......J.............J.........j..;.....,...^..j..;.....,...^............/.z.<.5.g................./.z.<.5.g.7..........A6.......l&.........A6...3`9`..!.e.......e.`........`a...!.e.......e.`........`a........P..5.A.. ...........P...P............"...........I.. K.. ........*..P7..P........D..PI..PN..P........Q.. U.. ....S.......V.......c...........`.. b.. ..j.v.......".H.........E.. M.. Z.. ^.. d.. ....`...C.. h.. ..o.w......`s..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMnut6E7l//YEnG:SvVt6gXrG
                                                                                                MD5:03B4C2777B2AB020F0301B1F57B4486C
                                                                                                SHA1:1A8FE984F91940E6A8B86F9433BC64CE5D875B87
                                                                                                SHA-256:2001732718D567EDDB29306E39FE186BE95CD30BEA89A14A5CFFDA73C6E95539
                                                                                                SHA-512:D7FF5C4032BB90E9123B3054783DED9ABAC3B1413DA8E01F80BFCF0A07169CE7992B89454C839B3F5D1D4633B5ADE2AB093A68E9FF09AA825E9303C371929859
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.H+...................H+.............G+
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):588
                                                                                                Entropy (8bit):5.505236769719622
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:sQWyu11b9J39VX39SA1dALRs/m++e/lxW4t2Pa1:sHy6hD9F9SYGtqSa1
                                                                                                MD5:BC70D18A9840F784A59545073343CBA0
                                                                                                SHA1:784143D29C0136CD09E75371EF8D06664844BD32
                                                                                                SHA-256:C444F5069E2186A1BE726A493B3D207A8AC62FA1FC1EFA6A6DD1DF56C87B6836
                                                                                                SHA-512:9C3905D4F9BC773DF5AB2E3002DDFF019374DB39941CC35BED431A0DC285465D1B4F1A3EBFF77B131011B9777E9B840C58563E90C56CFED7EDEEFCC57B2DF2B8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................M........s.r.....u.t.........$.5.5...t?....t?........J...........J.........cBrG...M.MyT..b. .5|].u..n.g..cBrG...M.MyT..b. .5|].u..n.g............/...0...%.<.l............./...0...%...l.......t?........l&........t?.....^.^....z.L....z46..Y.{C..........z.L....z46..Y.{C.............P..5.M.. ...........P...P........"...*...........2...:...........U.. Y.. ........B..PO..P........\..Pa..Pf..P........a.. e.. ....k.......n.......{...........p.. r.. ..j.v.......".H.........Q.. ].. j.. n.. t.. ....`...O.. x.. ..o.w......`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.870450165586334
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/66XglLMA+973:SBtkJYlU8g8l/3wJAt
                                                                                                MD5:DE637ACC0444DFF5B10B24757FD5D01A
                                                                                                SHA1:66D26A6934A109E7A74C26A9E5EB2877F0898DB5
                                                                                                SHA-256:3BDE340A4FA05DDC957B603CEE413A59B4A3A4955D981CDA2AC34D4FA4DE8A6E
                                                                                                SHA-512:88765889E5297825F3D0F7576E838D95F4AE9651D079AB3719A36D234FC91D6F18A84FB92522D18EA059A3CFF7672BF746D7352A81DA94A42C8308175DC8DDD1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.................................s.r._.L.a.t.n._.M.E...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):20648
                                                                                                Entropy (8bit):5.629431761876921
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:vf//o2NVm1fy4j6S/KCbbfCg6vu6GcxPJRGMP6lBL+2yrwa/k+ad6N28cu3bsrJl:/bNVm1fy4j6S/KCbbfCg6vu6GcxPJRGR
                                                                                                MD5:8A569834D57201D193F06C17936B9999
                                                                                                SHA1:A45223738B57704B080100A407810465FF780274
                                                                                                SHA-256:B09BA04CDF3E300380846E48882D78AD9B070E85B4D5879A1FDB753240136D0B
                                                                                                SHA-512:78CB8942F0D8AA7255620B574DBA8ECC7238BB597E50A92DB95220D506B64B454CFA636427203F05819CB771AECFD84E765CD519E4982657B642C6F60B7A8BD5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........"..."...V.......5........................................................................................................................................................................................1.......2.......3.......4.......5.......6.......7.......8.......9.......................................................0.......................................................................................0...........................................................................................................................................................................................................................................................................................................................................1.0.......1.1.......1.2.........................................................................t.a.m.l........................................................................................... .1......... .2.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):116
                                                                                                Entropy (8bit):3.6003005537073154
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlEF1qbl7MPqM3kglFsvMKbWcf:Sv81qSSMncMK
                                                                                                MD5:CF910C94198F1D415E241CB7644A9830
                                                                                                SHA1:5BBCD10A7F464A5E5ECC47F94DE71EB3A4844D3D
                                                                                                SHA-256:CB701F199A91520E73B21A7674402446A7E6A5F462D30ED088F40365BCB1A4DA
                                                                                                SHA-512:331B0451F7DD00BCD4A861738216B0AF7D0E45B101039A9FB2368669B5E5A74D987C6E97BD2C9513A5C54FB8E57953D5BD1D89ADE1638E5B583AF87C0E66778E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..B....................B.............7...Y4.B.........P....... ....o...... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):116
                                                                                                Entropy (8bit):3.6003005537073154
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlEF1qbl7MPqM3kglFsvMKbWcf:Sv81qSSMncMK
                                                                                                MD5:CF910C94198F1D415E241CB7644A9830
                                                                                                SHA1:5BBCD10A7F464A5E5ECC47F94DE71EB3A4844D3D
                                                                                                SHA-256:CB701F199A91520E73B21A7674402446A7E6A5F462D30ED088F40365BCB1A4DA
                                                                                                SHA-512:331B0451F7DD00BCD4A861738216B0AF7D0E45B101039A9FB2368669B5E5A74D987C6E97BD2C9513A5C54FB8E57953D5BD1D89ADE1638E5B583AF87C0E66778E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..B....................B.............7...Y4.B.........P....... ....o...... ...`
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):19020
                                                                                                Entropy (8bit):5.652113221179184
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:5JgVYyOgOeq60sK9d2T9PHIKx+mnMvWxrkm9r//4033N9ZVJqWnnn8jOa9YYtJzN:f3yOgO1sKHsLxH9TA033jMYYtJzfbKm
                                                                                                MD5:030F7037F860C1347398686C0AE1D2A6
                                                                                                SHA1:88280661BC0BE66A3F7F3D50A713D2F52F89D884
                                                                                                SHA-256:F89258A352C8CCA1B78027B969DFC693C9229D5FD899276281BA0FB510A931C4
                                                                                                SHA-512:A1329A0E048CF6555F183B29D2228E7E50F50CD3D2207A6CD1972923D55447DCCEBD92B38CBAF26F35C3AEC0B552548FCE30471850045F64FD33F898B81AA3F2
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................r.. ................V.....................................G.....5...!.G...6.............A.....(.....B...+.?...,.A...........>...5.>...6.A...8.K...8.>...8.K.....6.(.?.....&.?...,.A.'...(.5.....0.......8.......8.+...............&./.....8.F.(.F.......0.M.....&.0.M.....,.(.M...../.0.M.....A.0.A.....A.2.H.....B.(.M.....?.0.M.....L...M...$.K.,.>...(.H.8.G...*...(.>...,.>.,.>.....>.........0.,.?.....0...?.....0.5.G.../.A.......0.G.*.A.........3.....A.9.....0... .I...7.,.>.....8.F.......t.e.l.u.........F.....$.0.....-.5.(.......9.?.3.../.A...F...0...,.M...8.+.0.M...9.>...0.M.....7.>.".......*.F.*.M.....2.A.2.M.....?.9...M...$...A...M.....F.9.0.M...6.A...M.0...9...M.2.F...9.F.&.0.M.....0.0.,.?.....0.0...?.....0.0.5.G.....J.(.M.(..... .(.F.2...(.?.(.M.(.......M...K.....*.M.0.?.....(.5.0.?...!.?.8.F.....$.M.0.H.....$.M.0.H.1...$.M.0.H.2...$.M.0.H.3...$.M.0.H.4...+.?.,.M.0...0... .I.I...0.....>....... ...........M.0.@.6.......$.0.........C.$.?.......K...?.....>...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1832
                                                                                                Entropy (8bit):5.124424743232553
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:kji72PUoUuEt+VW4GD9yjrqmJlPNjMVrjMFWC4Zbe8NKm6EorV:Wi72P4Dz9yjrqqPFMmB8NLwrV
                                                                                                MD5:83BE3546B7B6922953E90D9726486719
                                                                                                SHA1:758394823919004EB8AC4DF221A3714FA6891323
                                                                                                SHA-256:3E3D6A9E34AFECEFF81EF394A00791B1331378CBC2F510C1A63235F374EFBBE7
                                                                                                SHA-512:7FEA8D4613E56CBB2CF395D46DC55AA85D9E6F9DDC2C7937EDE5B75C7FFEA7665E0CA4ED85967E2B970A5D400AF9F93B35C6A76A77FE5430D82A5164AF2630D7
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................j........A.a.r...B.a.r...D.u.n...J.o.l...K.w.a...L.a.b...M.o.d...M.o.i...M.u.k...P.e.d...P.o.o...R.a.r...S.o.k...T.i.b...U.n.g...U.n.i...E.k.a.n...E.l.a.p...E.n.z.i...E.s.a.a...J.a.a.n...L.o.l.o...O.m.u.k...O.p.o.o...E.w.i.k.i...O.j.o.l.a...O.r.a.r.a...T.A./.E.B...E.b.o.n.g.i...A.p.a.r.a.n...O.l.a.b.o.r...O.m.a.r.u.k...O.p.e.d.e.l...O.t.i.b.a.r...N.a.k.a.a.r.e...N.a.k.a.u.n.i...O.k.w.a.m.g.. ..[.f. .q. .z.]...I.s.e.k.o.n.d.e...N.a.k.a.k.a.n.y...O.d.u.n.g.. e.l...T.a.p.a.r.a.c.h.u...N.a.k.a.e.j.u.m.a...A.k.w.o.t.a. .a.b.e...N.a.k.a.s.a.b.i.t.i...N.a.k.a.u.n.g.. o.n...A.k.w.o.t.a. .A.a.n.e...A.k.w.o.t.a. .a.u.n.i...N.a.k.a.e.b.a.r.a.s.a...O.s.o.k.o.s.o.k.o.m.a...A.k.w.o.t.a. .A.u.n.g.. o.n...O.m.o.d.o.k.. k.i.n.g.. o.l.../.[.A. .B. .C. .D. .E. .G. .H. .I. .J. .K. .L. .M. .N. .O. .P. .R. .S. .T. .U. .V. .W. .X. .Y.].../.[.a. .b. .c. .d. .e. .g. .h. .i. .j. .k. .l. .m. .n. .o. .p. .r. .s. .t. .u. .v. .w. .x. .y.]...........)..k.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):2.935700764148065
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtldelFal9lzs9dwj/awPkaV:SBtkJUlYgQBkc
                                                                                                MD5:BD3F2E18B27EFB04FD9CBEE94DEA3189
                                                                                                SHA1:36710D9106EF3A860AEA28C12D206EEF478050FF
                                                                                                SHA-256:10B7EF58A9B44409AD9138088424A0501C2A37F7B8C5444DF04772901B05EC3D
                                                                                                SHA-512:F2D14C41E5B64064C2A36BB03E49B433B0E85DF7BA0A4DD7D7A39BEEA54330A77F4ADDF72038F57B93AB78181B71AC9BEE214AC8E1AA858B557282795508B865
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .................................b.u.d.d.h.i.s.t.....t.......w....P
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):20052
                                                                                                Entropy (8bit):5.040657283644707
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:wE3xOg0ZgZ4x5TBmZOP+/kFK58jf/iQcsUmpq86yYBZkosAn3/OPt4tk:wE3xvQgm5TBZPtFK58j3iQclmg9yYBCj
                                                                                                MD5:2812397EB44D2339F89F597975AD7EDB
                                                                                                SHA1:8CC44BB6C7B0EC4036015E39E56A4A157CC21063
                                                                                                SHA-256:6647C6B9901E8A621B8A1A0E7CACB20B30A1200D84C8F5028B2FDC56C9996F6D
                                                                                                SHA-512:B71DB9CD26C1BDF6EB0484E7A0D62CA10CF673E4D8C99FF4EDEC4B5D8360BA33707FA2264854EF1E4C1D3AFA0E4064EEAB9004A720E458D31E91D2E978978088
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................bcpTypeAlias.tz.aqams.cnckg.cnhrb.cnkhg.usnavajo.typeAlias.timezone.Africa:Asmara.Africa:Timbuktu.America:Argentina:Buenos_Aires.America:Argentina:Catamarca.America:Argentina:ComodRivadavia.America:Argentina:Cordoba.America:Argentina:Jujuy.America:Argentina:Mendoza.America:Atikokan.America:Atka.America:Ensenada.America:Fort_Wayne.America:Indiana:Indianapolis.America:Kentucky:Louisville.America:Knox_IN.America:Porto_Acre.America:Rosario.America:Shiprock.America:Virgin.Antarctica:South_Pole.Asia:Ashkhabad.Asia:Chongqing.Asia:Chungking.Asia:Dacca.Asia:Harbin.Asia:Ho_Chi_Minh.Asia:Istanbul.Asia:Kashgar.Asia:Kathmandu.Asia:Kolkata.Asia:Macao.Asia:Tel_Aviv.Asia:Thimbu.Asia:Ujung_Pandang.Asia:Ulan_Bator.Asia:Yangon.Atlantic:Faroe.Atlantic:Jan_Mayen.Australia:ACT.Australia:Canberra.Australia:LHI.Australia:NSW.Australia:North.Australia:Queensland.Australia:South.Australia:Tasmania.Australia:Victoria.Australia:West.Australia:Yancowi
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):14848
                                                                                                Entropy (8bit):5.437589029987393
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:F8S4sPb63nKWkUqqpe5+lfzgdPY0J2Yj+zhz9Pjlg+UkfO8+rCvb/JOafvvMw0tS:h4sPuFC6r9kTJ2Yj+zyNkAuz/rwDw
                                                                                                MD5:5EF76781775A06F24A210157FB54FD2A
                                                                                                SHA1:380EF9F25581CF1E5E151217A5BA062E0D38C11C
                                                                                                SHA-256:6FF666BBAAB5ADCAE0603940B20257F469E9A99D0251BF27943C9EB0282C1A09
                                                                                                SHA-512:7B1695DB6C60881450804310111FF2E94D36DBA5F72D6129DAB839A3631B6534EE15044836ED2D1CED5EDFB7F2F841A7AA63C51C3606124D1D0990BFEE086EEB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................^.. ........x...x...V....................4.....1.....2.....3...........A.n...D.b...P.b...S.b.....b.....b...^.b...m.a.....A.B.^...M.a.....A.n.n...A.w.g...D.e.k...D.u._...F.e.w...N.o.....P.e.n...S.i._...a.n.n...a.w.g...d.u._...f.e.w...n.o.....p.e.n...s.i._.....a.r.....a.n.....e.k.....a.r.....a.n...^.e.n..._.e.n...I...u.l...I...u.n...h.e.p.....i...u.l...i...u.n...s.a.g.........r.....A.n.n.a...B...e.....b...e.....d.....n...g.....H...h.o.w.a..._.a.h.s...G.../.G.S...g.o.....H..._.u. .d.b..._.u. .p.b..._.u. .s.b..._.u. ...b..._.u. ...b..._.u. ._.b...B.r.a...l...b.a._.g.a...d.y.n.g.y...d...r.l.i...e.r.k.e.k...e.r.t.i.r...g...s.o.H...g...w.r.e...h...z.i.r...z.e.n.a.n.......r.e.k...^.e.n.b.e..._.u. .a.n..._.u. .a.....g.o...s.o.H..._.u. ...y.l...A.w.g.u.s.t...B...e.....H...F.e.w.r.a.l...N.o...a.b.r...b...e.....H...b.a...d.a.k...f.e.w.r.a.l...h.a...w.a.n...k.a.n.d.z.i...n.o...a.b.r...o.b...e.k.t...s.a.n.l.a.r...s.e.k.u.n.t.....a.n.w.a.r.....a.n.w.a.r..._.u. .a.n...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):84
                                                                                                Entropy (8bit):2.5687727460466143
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlw10lgylslplglzstPRAen:SBtkJQ0ltWpglI1
                                                                                                MD5:DCCA8D89C11300C1AD5DC8B9DBF2E0EA
                                                                                                SHA1:6D3661C44EE2A839AC14594D496A159153098F93
                                                                                                SHA-256:B99B6B16340A21C13EA42CCAC8A1CBFD6A8704CB403EB3DAD80DD1909832DDA6
                                                                                                SHA-512:5EEC5AB96057FB76CF86974AF05D3CE63088D4ACB998B237B7D499E8EAAA1E12CE296302D04F0D67788D8FEF5F10863BBEF4806F29D9A4A2987E3344279D5E80
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.................................f.i.l.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):16304
                                                                                                Entropy (8bit):5.59428953383426
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:gJ/vHvyv/3UwC/Hh/x77j4nFFyNJr3qUyqJjy0ghX/gvGlynwwXvsHjyNcC946/F:g6XUw0/siwUyqJW0agvBnwwG+mw
                                                                                                MD5:D898E7A4C45E2305CFF411791C5CABBB
                                                                                                SHA1:58600E3EE23ED5DAD881881A85B6590D1C8316CF
                                                                                                SHA-256:EF7950C979256FC6A537F82523C85AC0A29A72B42C809A5FAC3DC9192855DDF1
                                                                                                SHA-512:703C8FD32DF60B6BC8B74AD29D043E37606CDEEF23C0631906D28188F267EFEF6C800909F90794379F8F3A9D0ED3EC948FD8694448BA555CD2D2D508229C8CFB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................V....................^.........C.t...C.u...P.a...P.e...P.t.....1.....2.....3.....4.....a.........M.S...M.......s...0.....T...t...d...n.....a.....A.r.a...A...u...C.m.t...C.u.m...E.k.i...E.y.l...H.a.z...K.a.s...N.i.s...O.c.a...P.a.z...P.e.r...P.z.t...S.a.l...T.e.m...d.k.....h.f.....s.a.....s.n.......a.r...^.u.b...t.u._...g.e.c.e.......l.e...B.u.n.e...B...b.e...E.b.i.p...N.e.s.....T...b.e...0.y.a.r...C.u.m.a...E.k.i.m...O.c.a.k...S.a.l.1.....y.r.....A.z.e.r...e._.l.i...k.a.l.p...s.p.o.r...a.k._.a.m...s.a.b.a.h......./...S...b.u.g...n...I.m._.i.r...M.1.s.r.....R.e.c.e.p...S.a.f.e.r...T.i._.r.i...^.a.b.a.n...^.e.v.a.t...H.i.c.r.i...b.u. .a.y...y.a.r.1.n...E.y.l...l...H.i.d.a.r...K.a.s.1.m...M.a.y.1.s...P.a.z.a.r...d.i.l.i.m...^.u.b.a.t...b.e.d.e.n...b.i.t.k.i...b.i...i.m...d.i...e.r...e.r.k.e.k...k.a.d.1.n...n.e.s.n.e...r.a.k.a.m..._.i.m.d.i...0.0.0...M.n...0.0.0...M.r...0.0.0...T.n...b.u. .y.1.l...H.e._.v.a.n...K.e.y.h.e.k...V.e.a.d.a.r.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):320
                                                                                                Entropy (8bit):3.9067583285500707
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SBtkJOtoKRBKXC+mpRIzARhHf0jRhH7PaFYl6laz1E3GmglSUjrNDUN8Al:WZtnnMtmp/D0jnP1klaz1iGWr80
                                                                                                MD5:B567B384A3F3EAA1CE37047152D3B7B3
                                                                                                SHA1:6BE9731C3791AA0B1B8F4C2AD306AABF7C6C0DE4
                                                                                                SHA-256:7CD2B3630AF371A8BC5ADBA3269E48F4BE1FF9566AD000B04D5E9229D0C6761E
                                                                                                SHA-512:46E68087935D0EBC5DBE0D2B1EA0DF3BB8E58D57827DDA6640EC1E27BA7AEF05B6523885E6D94354B3FF008FD0EEE132305E41630AF7B4F35CFA6F7C10E949BE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................L..P........H...H...........H...TransliteratorNamePattern.%Translit%Hex.%Translit%UnicodeName.%Translit%UnicodeChar...H.e.x. .E.s.c.a.p.e...U.n.i.c.o.d.e. .N.a.m.e...U.n.i.c.o.d.e. .C.h.a.r.a.c.t.e.r...{.0.,.c.h.o.i.c.e.,.0.#.|.1.#.{.1.}.|.2.#.{.1.}. .t.o. .{.2.}.}.....:.^.H. .......+...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):7836
                                                                                                Entropy (8bit):5.638847482730833
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:SNc9y7wRGv2s3tLrZsRrm1rEDwmIy4+657stvMgCq+bKD11mwyppGcgH4wb0bGAo:2y4V57stEhq911mw2GcTkv
                                                                                                MD5:3D4CEC32C7E2A3E04885FDB27986578B
                                                                                                SHA1:A684187A82895BFC7EB0934F40C2FEF6D025FA68
                                                                                                SHA-256:7AEFB450AD768C6AC410BAD64FF28BBC8448E66E6CA08688F48D9770672180D9
                                                                                                SHA-512:FFAA2CFE560D4B034AA9AA7B7DB3B8009ADFF72863F83A0CA73918A125EA85F6DEB176F37D5D385068A8618DAE5FD292E7436452F18D9BCDDA619EAC91BC7320
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................)................~...,...../.....3.....4.....~.......'.......(.......C...B.H.J...M.o.1...M.o.2...M.o.3...M.o.4...M.o.5...M.o.6...M.o.7...M.o.8...M.o.9...&.'.*...&.I.*...C...F...d./.. M...&...*.....*.H.......C.'.D.'...&.I.J...D...&.I.J...F...1...,...(...3...~...1...E.I.F...H...y.-.d.-.M...(.......F...E.I.F...*...E...*.I.1...J.I.D.'.F.....H.4.B.'...0.0.0.E.I.....&.'.~.1...D...A.....1.'.D...J.'.F...'.1...4...&.(.'.F...4.......'.D...(... .&.'.J...(... .J.I.D...M.o.n.t.h.1...M.o.n.t.h.2...M.o.n.t.h.3...M.o.n.t.h.4...M.o.n.t.h.5...M.o.n.t.h.6...M.o.n.t.h.7...M.o.n.t.h.8...M.o.n.t.h.9...[.. . .&.]...*.H.4.B.'.F...3...C...F.*...E.'.J.E...F.....'.4.B.'.F...0.0.0. .E.I.....&.'...:...3.*.../...C.'.(.I.1...F.H.J.'.(.I.1...(... .,...E.....1.-.~...3.I.D...2.-.~...3.I.D...3.-.~...3.I.D...4.-.~...3.I.D...1.'.E.I.2.'.F.....I.,.1.I.J.....M.o.n.t.h.1.0...M.o.n.t.h.1.1...M.o.n.t.h.1.2...y. .M.M.M. .G...y. .d.-.M.M.M...&...,./.I...'...*...F.......F...{.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
                                                                                                MD5:C34486D88A5544F3392A4FB031ECA28C
                                                                                                SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
                                                                                                SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
                                                                                                SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):88
                                                                                                Entropy (8bit):2.7376269297851303
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlKelBjlgljl/Fi6l2lkWa:SBtkJTl4m6s+Wa
                                                                                                MD5:8ED16C31FC6340DF909D01B9C16F4F94
                                                                                                SHA1:8EC9A4CAC56FFFF46F6206D83AC9A47EBB74D19A
                                                                                                SHA-256:99DBE615C6B418ABAC0EBFA6446AFEA74887CA6D7E980D5D37951E136812B615
                                                                                                SHA-512:74DBEE84D173A931310EE3883581436C4A7D8F722FF3F88E6FCDEEFA56D36DE0C3BB5D5C6FC933655687911084FA4962568CAAE84F8466B72102AFB8191BE637
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci..a.r._.S.A.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.8041805894387437
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
                                                                                                MD5:6134F4CD4D6C15CE86537D2613927036
                                                                                                SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
                                                                                                SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
                                                                                                SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.h....................h.....91ci......g.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):2.9794524468707886
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXE/flflcUTNZlgY/:SvV/cMEY/
                                                                                                MD5:6A9273AF56E5D1F6F2D24203334DDF9B
                                                                                                SHA1:BD7CA1CB1BA90B6036803043B8E351E6EC499DA5
                                                                                                SHA-256:F1D94FCB430E36370FA030C9D9892214DCB624289BC5282D432BF2A49378A08C
                                                                                                SHA-512:066CC289321C632CA0657AAC15F9F0E121C506B3EBD752E19277A5087417430E3C40525E0B410B930EF3A238328906AA64BF2A53B0FEBB26724918333C500508
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.h....................h.....91ci..........g.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.8041805894387437
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
                                                                                                MD5:6134F4CD4D6C15CE86537D2613927036
                                                                                                SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
                                                                                                SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
                                                                                                SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.h....................h.....91ci......g.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.8041805894387437
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
                                                                                                MD5:6134F4CD4D6C15CE86537D2613927036
                                                                                                SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
                                                                                                SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
                                                                                                SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.h....................h.....91ci......g.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):14140
                                                                                                Entropy (8bit):5.520887247421295
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:h5JxPZT5Q1Lcd052yMu/o3k5EBjW2QZ3bevHZODEaJi7CvG8empbN:zHQg07/cNW1ieiGvG8empp
                                                                                                MD5:5BFE2FF4E8FEE4AE11BCD015066B4A6D
                                                                                                SHA1:B3D468624152331D1C6E57FA506C89F39507C351
                                                                                                SHA-256:CFC47816762D32DBE6345585028F0B790C9E1748081A960C8D3AB8FF7EC42081
                                                                                                SHA-512:90E3BA5C492DBAECA33DB751A5B8A3021853899D0C27B93060EC9A74BD74A42803239BDCF2DCEAD0B93AC775AA9F9736823070425187A57BEDA8B1CF3487C549
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .'....................'.....91ci..p.t.s...{.0.}.....{.0.}.....{.0.}.....{.0.}.......{.0.}. .....{.0.}. .....{.0.}. .....{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}./...:...{.0.}./.........../.........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}./.........{.0.}./.........{.0.}./.........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}./.....:...{.0.}./.....:......... ................./...:...{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}.............{.0.}.............{.0.}./...........{.0.}./...........{.0.}./...........{.0.}.............{.0.}. .............{.0.}...............{.0.}. .............{.0.}. .............{.0.}. .............{.0.}./.............{.0.}. .............{.0.}. .............{.0.}. .........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):500
                                                                                                Entropy (8bit):4.672488325058875
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:Sv3lksbgWdojosRoCogGoVDCDkssiUuKDlhAT6mqksH1wLs1OyuJg2my/V/6rgM7:O6WdUTRp3GwcsiURlhATiHEJzF6rrkOD
                                                                                                MD5:D6324925789E0EE9349F5CDF86279622
                                                                                                SHA1:A9A577817F891CC938F15D87942DDEE765ECBB0E
                                                                                                SHA-256:A0594501481E4DB487BEED95F9CEE85A1B8CA421638831D350827CC4FA3E6010
                                                                                                SHA-512:30DBF4B6FD99FFD5D0E0C7B72A531A5B2C15FE653D20109825CEC3C55446B9487E7B34AF1CFCB1B2843ABF140E179F9B7A1C807EC335D13C6F2FD11787E97EE0
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................n.. ..<.....u...u..........<T...91ci..{.0.}. .4.0.=...{.0.}. .A.0.B...{.0.}. .<.5.A...{.0.}. .=.5.4...{.0.}. .4.0.=.0...{.0.}. .A.0.B.0.....x...:."<.<.<..x...:.+<.<.<..x...:.-)......x...:..+......x...:..<.3.3..x...:.A16161..x...:..0.).)..x...:."<.<.<..x...:.+<.<.<..x...:.k.k.k...x...:..<.<.<..x...:.........x...:..<.<.<..x...:...........[...c.w.d...c.3..P:..PA..PH..PO..PV..P]..P..J.T.. ..[...c.w.d...c.d..Pk..Pr..Py..P...P...P...P..J.a.. ........m......`...`_.. l..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):3.368272640304357
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQvlU8WNlUUT+l2iAllfPl6vn:SvIC8wNCl2iA/lan
                                                                                                MD5:4DF34AF3EA33B8989DDA28796A2F88A5
                                                                                                SHA1:7D688E8CB94E79D75E9AB3AC6A0F11B0A2BEB468
                                                                                                SHA-256:955F10221EA49D76E8996338EFB1834F7A0F8B825111159C90FE74C3104DF464
                                                                                                SHA-512:1E6354D1C1533421306045B12C2A284F99F4336E0078EBAF2AE7BB2A80BE7B3AE0876DAB4656C4DA10252C25CC4C7273E305CE93C3457CF6082F49FE3A66D903
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .H!...................H!....91ci..........!.............G!.`...P
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):11476
                                                                                                Entropy (8bit):5.433357975981125
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:ODJyuxj1Lik/WIarEU2CEFs7z/GHCe4fE6CeIS:Oz8k/WIarEUMuPGqs6Cel
                                                                                                MD5:8D16BF2551834657F60AE1CD1B789F9D
                                                                                                SHA1:3543C08108FD00F28D81360BA53F87014CAAC25C
                                                                                                SHA-256:FDA6E27F5BADBEA433D99DD75427372AE13A4EFA750EBCC4C97A651A49385705
                                                                                                SHA-512:C025F7C6F5F172AB6401FC583F3759C1E5367C23C128652FCD63CBA5279E97DEB25DC070BB3E7EBF40468226A31004A114AEF4CCC8AB4AAFAEDFB2441C77F5B3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................%.. ........-...-...............91ci..{.0.}.....{.0.}...m...{.0.}. .a.e...{.0.}. ./.t...{.0.}. .f.o.d...{.0.}. .k.t.....{.0.}. .u.g.e...{.0.}./.d.a.g...{.0.}./.u.g.e...b.u.e.m.i.n.....b.u.e.s.e.k.....{.0.}. .s.y.d...{.0.}. .t.d.....{.0.}. ...s.t...{.0.}. .k.n.o.b...{.0.}. .#. .H.g...{.0.}. .d.a.g.e...{.0.}. .u.g.e.r...{.0.}. .p.k.t.....{.0.}. .p.c.t.....{.0.}. .t.s.k.....{.0.}. .c.u.p.s...{.0.}. .m.d.r.....{.0.}. .t.d.r.....{.0.}. .v.e.s.t...{.0.}. .s...m.i.l...{.0.}. .s.p.s.k.....{.0.}. .k.m./.t.....{.0.}. .t...n.d.e...{.0.}. .t.e.s.k.e...{.0.}.s.v... .m.i.l...{.0.}. .t...n.d.e.r...{.0.}. .p.r... .k.g...{.0.}. .t.e.s.k.e.e.r...{.0.}. .o.m. ...r.e.t...{.0.}. .p.r... .d.a.g...{.0.}. .p.r... .f.o.d...{.0.}. .p.r... .u.g.e...{.0.}. .p.r... .{.1.}...{.0.}. .e.n.g... .g.a.l...{.0.}. .a.c.r.e.-.f.o.d...{.0.}. .k.u.b.i.k.f.o.d...{.0.}. .e.n.g... .m.p.g...m.i.l./.e.n.g... .g.a.l...{.0.}. .b.u.e.m.i.n.u.t...{.0.}. .p.r... .g.r.a.m...{.0.}. .p.r... .m.i.n.....{.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.8041805894387437
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
                                                                                                MD5:6134F4CD4D6C15CE86537D2613927036
                                                                                                SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
                                                                                                SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
                                                                                                SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.h....................h.....91ci......g.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.8041805894387437
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
                                                                                                MD5:6134F4CD4D6C15CE86537D2613927036
                                                                                                SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
                                                                                                SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
                                                                                                SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.h....................h.....91ci......g.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.8041805894387437
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
                                                                                                MD5:6134F4CD4D6C15CE86537D2613927036
                                                                                                SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
                                                                                                SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
                                                                                                SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.h....................h.....91ci......g.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):892
                                                                                                Entropy (8bit):4.395168612626523
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:bmmBuZCucVk1wmnOLU6LTWuZgh96Ved1Xq+8yTdYF96RkuTIrP42fs859JK:Q3cVfmOLUiWfu4dlVbdYyRZANsk9JK
                                                                                                MD5:21017141ED814E503ABBF8B2642B00BF
                                                                                                SHA1:7EFC40C7E8924AC172FC32C1DA610BCC71373BAD
                                                                                                SHA-256:859FC600BFFC411242836CCD551701AB20BD6D28F4C6C1115F844EAE0501943C
                                                                                                SHA-512:BB800BA94FBF0630F558359263F48233F3F8E6DF26420AE81F40170CF00A911B9ABE5D3B1DAB067FE370B0B9E9729B8149D69B9B40520C2219895A74A4020F38
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .h....................h.....91ci....e.....e.w.o...s. .{.0.}...K.k.e.k.e.....e. .{.0.}...g.a...o...o...k.T.s.i.V.a...c.l.e.t.i.w.o...K.k.e.k.e.w.o...g.a...o...o.w.o...k.T.s.i.V.a.w.o...K.k.e.k.e. .{.0.}...c.l.e.t.i. .{.0.}...a.V.a.b.a...o...o...k.T.s.i.V.a. .{.0.}...g.a...o...o. .{.0.}...s.e.k.e.n.d. .{.0.}...a.V.a.b.a...o...o.w.o...a.V.a.b.a...o...o. .{.0.}...s.e.k.e.n.d. .{.0.}. .w.o.....5...:.........5...:.........5...:.........5...:...........:.......5...:.........5...:.l.}.}...5...:.w.......5...:.........5...:.........5...:...........:.q.q...5...:.........5...:.i.}.}...5...:.........5...:.........5...:.........5...:...........:.......5...:.........5...:.l.}.}...[...c.w.d...c....P...P...P...P...P...P...P..J.... ..[...c.w.d...c....P...P...P...P...P...P...P..J.... ..[...c.w.d...c....P...P...P&..P-..P2..P9..P..J.... ......a.m...g..`... ... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):4364
                                                                                                Entropy (8bit):4.681068579360723
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:JoR+9+o9dTZy9SRJEKygkQ+cxD/6uJP2u1:JoR+F9kSHEK+w6yn1
                                                                                                MD5:DC459400AE7D0038180CFE79BBFEE537
                                                                                                SHA1:339920C03428C68F64536287CCCD2976224BBD57
                                                                                                SHA-256:80A224F0790279544693604B8862861EA1E33CAF7F799B50409A8B5F58917927
                                                                                                SHA-512:F879219CFC66023C5EB78448AFFBCF7449FD3F854014E42D05C4396DDF6762DE0E6A79E5EECFF496302D748800B04629FACE0EEA581C7742768D36A9CD410A81
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................4.. ........;...;...........x...91ci..{.0.}.p.h...{.0.}.p.s...U.S. .g.a.l.....m.e.t.r.e.s...m.e.t.r.e.s.....{.0.}. .h.r.s...{.0.}.m.g./.d.l...{.0.}.g.a.l.U.S...{.0.}.m.p.g.U.S...{.0.}. .m.i.n.s...{.0.}. .s.e.c.s...l.i.t.r.e.s./.k.m...{.0.}./.g.a.l.U.S...m.e.t.r.e.s./.s.e.c...m.e.t.r.e.s./.s.e.c.....m.i.l.e.s./.g.a.l. .U.S...{.0.}. .U.S. .g.a.l.l.o.n...{.0.}. .p.i.c.o.m.e.t.r.e...{.0.}. .U.S. .g.a.l.l.o.n.s...{.0.}. .k.i.l.o.m.e.t.r.e.s...{.0.}. .m.i.c.r.o.m.e.t.r.e...{.0.}. .n.a.n.o.m.e.t.r.e.s...{.0.}. .p.i.c.o.m.e.t.r.e.s...m.i.l.l.i.m.o.l./.l.i.t.r.e...{.0.}. .d.e.c.i.m.e.t.r.e.s...{.0.}. .m.i.l.l.i.m.e.t.r.e...{.0.}. .c.e.n.t.i.m.e.t.r.e.s...{.0.}. .m.i.l.l.i.m.e.t.r.e.s...{.0.}. .c.u.b.i.c. .m.e.t.r.e...{.0.}. .c.u.b.i.c. .m.e.t.r.e.s...{.0.}. .s.q.u.a.r.e. .m.e.t.r.e...{.0.}. .s.q.u.a.r.e. .m.e.t.r.e.s...{.0.}. .p.e.r. .U.S. .g.a.l.l.o.n...{.0.}. .p.e.r. .k.i.l.o.m.e.t.r.e...{.0.}. .p.e.r. .c.e.n.t.i.m.e.t.r.e...{.0.}. .c.u.b.i.c. .k.i.l.o.m.e.t.r.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
                                                                                                MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
                                                                                                SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
                                                                                                SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
                                                                                                SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
                                                                                                MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
                                                                                                SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
                                                                                                SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
                                                                                                SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
                                                                                                MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
                                                                                                SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
                                                                                                SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
                                                                                                SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
                                                                                                MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
                                                                                                SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
                                                                                                SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
                                                                                                SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):228
                                                                                                Entropy (8bit):4.044690676324035
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:Sv8pdFjZJSk+ounn+llGp2ldMkalvV5axen:RtJSfoun+lliwMdV5r
                                                                                                MD5:8EA764E277BE89178D6745E843E3F4A2
                                                                                                SHA1:209B98123D8A78B7C8FDF215FC34902A7BAD55BC
                                                                                                SHA-256:8972F48F140626B2A32943A3EF97524255B61ADA88DA3CA541E0755ACC23EC35
                                                                                                SHA-512:5B5EB388FAD554D19B2E79DB5D0D1341A2C81FF38771AB6AF360264EFC11C96C468D18387EFAB3C59A354B2256480B8266E168B0A25A0DC8436D58ABFB0089D9
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................*.. ..T.....1...1..........T....91ci....5...:..C.C.C..5...:..T.T.T..5..C..5..T..:.....:.......X.`......P...P....... ..X.`......P...P.......P..!....P....8.j.... !.. #.. ........m......`C..`... %..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
                                                                                                MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
                                                                                                SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
                                                                                                SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
                                                                                                SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
                                                                                                MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
                                                                                                SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
                                                                                                SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
                                                                                                SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM4MllSTNZlFj+n:SvRlI
                                                                                                MD5:31CB7B76C7956E45E041026558CFA226
                                                                                                SHA1:71216A3E97EBC506AB659D07B0FB60EC678A8F23
                                                                                                SHA-256:BC3D03EA300FBD81784FD96045E026CF8E03D0941EA2A64DFC7A062A7B9391E1
                                                                                                SHA-512:826E86F72D4B2D13ABE368EC598C3121C1822CB87BD3D1060E8194D5DA7E74E5A7F4784DEAD49E1F02FEF9BD36B01FD1202D72B1D2F8532F85791A20C243C07E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.D....................D.....91ci..........C.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):172
                                                                                                Entropy (8bit):3.8643130246325517
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlR9laCJ7lol/FBOlYClgxRtlRXk0bxC91Wh9/Fn3qfblX/F:SvL8CAhOlYpZLg9Ycld
                                                                                                MD5:9849FEE7A1ADA725213BF5491CCCC73C
                                                                                                SHA1:355418F1BA48CABE0DA73B73C5AEBF5D1DBF8014
                                                                                                SHA-256:409A055AB32E826AE7FB50047BCE02447F6F83A46A26AF1CE924F14A2501E7E5
                                                                                                SHA-512:FBD318B46F33736B364B9DC08EB7D171DCBC53311AE4CE74A95038CF84A8D9A1074E3ABCB2860F8E0F1DFF05F25EA94975BE25FCCE61DAD5EAD6B6859FC23744
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .<......#...#.........<.....91ci..2...1...4.9...1.4.......:.........:.;.;..........P....... .......P....... ......a.m......`=..`... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
                                                                                                MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
                                                                                                SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
                                                                                                SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
                                                                                                SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
                                                                                                MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
                                                                                                SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
                                                                                                SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
                                                                                                SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
                                                                                                MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
                                                                                                SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
                                                                                                SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
                                                                                                SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
                                                                                                MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
                                                                                                SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
                                                                                                SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
                                                                                                SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
                                                                                                MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
                                                                                                SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
                                                                                                SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
                                                                                                SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
                                                                                                MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
                                                                                                SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
                                                                                                SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
                                                                                                SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMmlfbTNZlFn:SvNt
                                                                                                MD5:4D8B9ED918A6A21826CF6ACDA10D7B8B
                                                                                                SHA1:DEC9BB0C1333322C691B9318A9FAD5E0987319E7
                                                                                                SHA-256:E26840BBAC4F0ED8E3601F62ABB775FCC16BF38B70785540025D1818F7057881
                                                                                                SHA-512:7AE98D692352C530AE50AB24C00C7F0AEB6C2F74C6B77EBBBDDF4BDD04B21E48816BF3F2698EE2B014D703F56F9E14958E28F298CD56027492C3A300FC4B619F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):88
                                                                                                Entropy (8bit):2.7148996570578574
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlKelBjlgljl/Fu2Okl8:SBtkJTl46xka
                                                                                                MD5:B2A17B52F311F0F8BD19EEC1D270AA5D
                                                                                                SHA1:5597D0EB202F218C9B027A9F27B8C6187D996508
                                                                                                SHA-256:B60B69A397846AED406CCE1662AE4D08F41B5D1F1191D402CA1DD562822CC0E0
                                                                                                SHA-512:4A1ECA4483406AF775AD1C05C4C249378A499E0BFB09BA3D56FE4A685D9AA4681006B1EBA0CC614382F864A0D776B1A6ACF8F441424B21CE135DB41CCBB7318D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci..e.n._.V.U.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMg9lZNTNZlFb:SvbZh
                                                                                                MD5:5C178E2FA9F7BFAFD04671973597DA85
                                                                                                SHA1:77BEEB262833524FF0CB993F282ABEFC05B49323
                                                                                                SHA-256:DFECD526162A19ED0E877A733782593D1CF496E5D1435248C06BDF5386F36BBD
                                                                                                SHA-512:D4FAD5F465B41FA87DF52FB0BAE6A5C4CDD48C3C43BE1DAAE1DE9B55B962F217CB666F47F7980599CAAF0101AAD46895F2A3F07E872A1B44146EBC64CFF860B9
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.|....................|.....91ci..........{.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):136
                                                                                                Entropy (8bit):3.6674873990389525
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlb7XlBlTYL8uO1kMPUUcj/DgqNkZlEah/F:SvN39a7Pg3EahN
                                                                                                MD5:C624339EDAAF7564C53616BB31B0F7C5
                                                                                                SHA1:4207CC218B0682BF267FB1B2F1C2977F5BA5DA75
                                                                                                SHA-256:96A731D1EFA3FEABD62B024FB17E5C52CE6E67468893AD7B56320D43D0EB0C98
                                                                                                SHA-512:0CD605C7CC408CA9DBBE400875C9273A14855D9A92D0DC6961D88BC6461B5835396192DBD58176BE508DF9AFDF8449F4FAB209B857EE4A7559392ADFB68FA4AE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..'....................'....91ci......:.P.P.....:..'.'....).1......P...P....... ......a....`{..`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.040932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMg9lZNTNZl+e:SvbZae
                                                                                                MD5:A3CD4CFB2A1BA42247C9686225807918
                                                                                                SHA1:4DB66651D6DE29451CEB1B9ED9E188D6D6EADEA0
                                                                                                SHA-256:C8CA7FA12F4F74D2B7C10823015519765426403B9535B57A08D7BAF694AE7521
                                                                                                SHA-512:EB7F4C10D3B593FC6B4D436291E5E990001C5BC74B1DA545C69898CCEB5D126F9CD9A589945672E3D0380392F949B62256FF954BCE19DC19502CD8BC5EA8611C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.|....................|.....91ci..........{.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMg9lZNTNZlFb:SvbZh
                                                                                                MD5:5C178E2FA9F7BFAFD04671973597DA85
                                                                                                SHA1:77BEEB262833524FF0CB993F282ABEFC05B49323
                                                                                                SHA-256:DFECD526162A19ED0E877A733782593D1CF496E5D1435248C06BDF5386F36BBD
                                                                                                SHA-512:D4FAD5F465B41FA87DF52FB0BAE6A5C4CDD48C3C43BE1DAAE1DE9B55B962F217CB666F47F7980599CAAF0101AAD46895F2A3F07E872A1B44146EBC64CFF860B9
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.|....................|.....91ci..........{.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMg9lZNTNZlFb:SvbZh
                                                                                                MD5:5C178E2FA9F7BFAFD04671973597DA85
                                                                                                SHA1:77BEEB262833524FF0CB993F282ABEFC05B49323
                                                                                                SHA-256:DFECD526162A19ED0E877A733782593D1CF496E5D1435248C06BDF5386F36BBD
                                                                                                SHA-512:D4FAD5F465B41FA87DF52FB0BAE6A5C4CDD48C3C43BE1DAAE1DE9B55B962F217CB666F47F7980599CAAF0101AAD46895F2A3F07E872A1B44146EBC64CFF860B9
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.|....................|.....91ci..........{.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMg9lZNTNZlFb:SvbZh
                                                                                                MD5:5C178E2FA9F7BFAFD04671973597DA85
                                                                                                SHA1:77BEEB262833524FF0CB993F282ABEFC05B49323
                                                                                                SHA-256:DFECD526162A19ED0E877A733782593D1CF496E5D1435248C06BDF5386F36BBD
                                                                                                SHA-512:D4FAD5F465B41FA87DF52FB0BAE6A5C4CDD48C3C43BE1DAAE1DE9B55B962F217CB666F47F7980599CAAF0101AAD46895F2A3F07E872A1B44146EBC64CFF860B9
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.|....................|.....91ci..........{.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMg9lZNTNZlFb:SvbZh
                                                                                                MD5:5C178E2FA9F7BFAFD04671973597DA85
                                                                                                SHA1:77BEEB262833524FF0CB993F282ABEFC05B49323
                                                                                                SHA-256:DFECD526162A19ED0E877A733782593D1CF496E5D1435248C06BDF5386F36BBD
                                                                                                SHA-512:D4FAD5F465B41FA87DF52FB0BAE6A5C4CDD48C3C43BE1DAAE1DE9B55B962F217CB666F47F7980599CAAF0101AAD46895F2A3F07E872A1B44146EBC64CFF860B9
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.|....................|.....91ci..........{.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMg9lZNTNZl7d:SvbZF
                                                                                                MD5:9E46895540FD75BA1C21CC8BCA9446B4
                                                                                                SHA1:09C5D01771B26A3F003757FD9788D13C0F10AE26
                                                                                                SHA-256:56B0002469F572CFD0CB8C8BECEA7A1005EA8F7ED1D3DD308E0C4AD28A88F0C6
                                                                                                SHA-512:B7B792042ABA5729EB852ECDA456087F05E459641F62C1BC6E951F3BD72A81B8C6D55A995FC07BFFD2CE342CF87618010A4AD63271CA4518950C9B93B9B6DF85
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.|....................|.....91ci..........{.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):576
                                                                                                Entropy (8bit):4.578386550300064
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:JyicxElUBM9IlAax+U+i/2mMneG0PAnqIYmak+n399Z+E:JFcxVBM9IlLYUnanZ0fhxVH
                                                                                                MD5:58C20A26E67A5E433C49DC9A273F4E50
                                                                                                SHA1:2A895CCAE49F44C9257B127F33304C987057E3DE
                                                                                                SHA-256:6890E7C42409C74B2E65DC51D4D28AED0C6C70F5A11A7221D7432E0935180D59
                                                                                                SHA-512:4604EA7EBC8705CD422E748079DC735534F0F244E2F6E789B2121DDBB008F73E3CBC14C62B7CF926DC03485259B288FF938AD472016A8B6D18232A737E644434
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ......................N...91ci..a.c.r.e. .p.i.e...{.0.}. .a.l. .a...o...{.0.}. .a.l. .d...a...{.0.}. .a.l. .m.e.s...{.0.}. .p.o.r. .p.i.e. .c...b.i.c.o......................5...:..xT3.>..5...:..x8o.x....:....'....:..(<3..5...:..d{..+..5...:..d.R.d....:...........5.......:.......5.@3..5..B..5..q..5.....[.w.c.>..PA..PD..P............G..PN..PU..PZ..P........_..Pf..P..F.m..P....r..P..J.....K.j.N.. S.. Z.. ^.. `.. ....u..P..J.j.. ....x..P....}..P..v....P..U....P..q....P......:.K.j.n.. p.. r.. t.. v.. ........a.m....`{..`b.. l.. x..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMKl/pxlBlllcENZl7r:Svll/aMj
                                                                                                MD5:F616941B9E4A6D0FFA96433EFC906C6D
                                                                                                SHA1:622E12F3D922AE8887FD13DAAE6C1302358F019E
                                                                                                SHA-256:E4FC1C6EAC3A76A7EFBC3C4B106882377EE5B0BA51B2D99E5817C4F01501EC0D
                                                                                                SHA-512:E10DF0439CD189B1DA769E3F21CF676456B42189A54B01957371A2A8087CC65E369AC1F1983566FC884A85812DFD14201E1B5ACD886D5300B57B6E8FC05995AE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):116
                                                                                                Entropy (8bit):3.5029288909356517
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tld1NlTYZkOgsl8pNkZlEHG2DNn:SvBPOgsl8pN6Em2B
                                                                                                MD5:4DC5B0A5A3AE19CF4902147939532DC8
                                                                                                SHA1:D55CD66155C72609071E12A017F7FB0089B1312A
                                                                                                SHA-256:9EEA81C3EFD3E97E23E6E6990626FEFAAD297343E3957AC5C1394FAB58625215
                                                                                                SHA-512:4DFB13CEC1072E60DE0EB278BA490004B828808FFF87FF6EB027E31E7F36EE972D2B7ABC481B3883A2F147B423CB8BDAFB176C550F4B0A06AD1DA96871D3E638
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..'....................'....91ci......:..'.'..1....P....... ......a....`{..`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMg9lZNTNZl7d:SvbZF
                                                                                                MD5:9E46895540FD75BA1C21CC8BCA9446B4
                                                                                                SHA1:09C5D01771B26A3F003757FD9788D13C0F10AE26
                                                                                                SHA-256:56B0002469F572CFD0CB8C8BECEA7A1005EA8F7ED1D3DD308E0C4AD28A88F0C6
                                                                                                SHA-512:B7B792042ABA5729EB852ECDA456087F05E459641F62C1BC6E951F3BD72A81B8C6D55A995FC07BFFD2CE342CF87618010A4AD63271CA4518950C9B93B9B6DF85
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.|....................|.....91ci..........{.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):20160
                                                                                                Entropy (8bit):4.748356832411956
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:COCKXHE0Ahg5nm9VnEzH2EujuSUUWqSss7/lE63cyv5+e4jcmk5eX53bxgYW95gY:qGuEzH3Tmk+MXhZ8XbcXfjoX0Aa+M6I7
                                                                                                MD5:017493C71CB00B7CBB897FCD0A38A59E
                                                                                                SHA1:0AE1B830D2C549E4E5978C2C87B6FA045D1F8B4B
                                                                                                SHA-256:07006BFEC02F4A199B2EEFE81879EF37C1C4DF3A0763E1C611ABB49E74BC4EB4
                                                                                                SHA-512:ABEBA452B8EF35FCEEAB554BA1C64BEDD9B92CEF4C6F65C5181152F835145341629F03EA13747D223B51F3749AF64F05FEE3DB489220DAE25904CE5A7A7CB423
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .`....................`.....91ci..k.i.v.i.d...o.o.m.i.d...{.0.}./.k...{.0.}. .a.....{.0.}. .h.j...s...l.l.a.d...a.a.k.r.i.d...m.o.o.l.i.d...{.0.}. .i.p...{.0.}. .l.l...{.0.}. .l.p...{.0.}. .p.l...{.0.}. .s.a.j...{.0.}. .s.p.l...d.u.n.a.m.i.d...p.u.n.k.t.i.d...{.0.}. .k.u.u...{.0.}. .n...d...{.0.}./.n...d...k.W.-.t.u.n.d...k.v.a.r.d.i.d...n...d.a.l.a.d...{.0.}. .o.o.m...{.0.}./.s.e.k...{.0.}./.....p...{.0.}. .k.u.u.d...p.a.r.s.e.k.i.d...b.u.a.a.e.l.i.d...d.a.l.t.o.n.i.d...h.e.k.t.a.r.i.d...k.a.r.a.a.d.i.d...{.0.}. .b.a.i.t...{.0.}. .j.a.l.g...{.0.}. .k.i.v.i...{.0.}. .m.i.i.l...{.0.}. .t.o.l.l.......p...e.v.a.d...{.0.}. .m.o.o.l...{.0.}. .s...l.m...{.0.}. .t.a.s.s...b.a.r.r.e.l.i.d...k.e.l.v.i.n.i.d...s.a.j.a.n.d.i.d...{.0.}. .b.i.t.t...{.0.}. .k.u.u.s...{.0.}. .n.a.e.l...{.0.}. .o.o.m.i...{.0.}. .p...e.v...{.0.}. .s...l.d...{.0.}. .t.u.n.d...{.0.}. .u.n.t.s...{.0.}. .l...h. .t...j...u.n.a.e.l.a.d...f.u.r.l.o.n.g.i.d...r.u.u.t.j.a.l.a.d...k.i.l.o.v.a.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.8041805894387437
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
                                                                                                MD5:6134F4CD4D6C15CE86537D2613927036
                                                                                                SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
                                                                                                SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
                                                                                                SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.h....................h.....91ci......g.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.945547915629603
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/csyMmllZn:SBtkJYlU8g8l/knlzn
                                                                                                MD5:6531B41F94F0C023EA9A39B05C6FB84B
                                                                                                SHA1:64BDFFF943DD28467054EDE432FA0403169A6334
                                                                                                SHA-256:B1CC805BA88346F9FAD694C30084B1959F9E786D862EE4458DC395BA021823D3
                                                                                                SHA-512:2CD388003FB69FA7EB82DFB6D44A3E06B68A78B9B44902024BBE99ECB5387C2A7A04529267AE7BE52CADD372B02837E786D4BD6E8A69E021BA7E4F80F8A565F4
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci..f.f._.L.a.t.n._.C.M...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.945547915629603
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/csyMdZn:SBtkJYlU8g8l/kon
                                                                                                MD5:0CEF3ECF95918F9D55B7E33A1A913CAB
                                                                                                SHA1:6AC685DF4E065388CD09A6E6EFFDF6D2DB98669B
                                                                                                SHA-256:63DCB2AEA982B720D1C96BF7113AE4F934C4A41467871DB5EF076CF6A32BFB9E
                                                                                                SHA-512:1DE954E153E428802B04317FD5ACCF61CCB827611F18144C4326973454F4C51A85FFC3FBEABE8E78E11CD8F6F3D82817241A5B0F90134899AD26E3D5BD4036F3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci..f.f._.L.a.t.n._.S.N...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):15044
                                                                                                Entropy (8bit):5.081373986205722
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:eglvm9xEoqtVIzFDKiiRp+5jL+SUm8Wjn:HWxqtVIzQv+N+SUmDn
                                                                                                MD5:A75E87DA1FB2541F6973C3DA1615C649
                                                                                                SHA1:D456C2288906A660AD5F683A8EDCD29D39217E82
                                                                                                SHA-256:2E1786D2BCA98C7239FF3C373DEE7789217285672D6ADD315D8BE68B7838011D
                                                                                                SHA-512:98E262F3D6ADE188D4741E93BE09AC78D18A4C2E770CE0535676244B4E241E9ED5D25703352EA1EDA376C1A7916ADC1D30760DAB85796FE950EEFDF853B5BFC5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................91ci..p C...p.t.s...{.0.}.H.....s.e.g...m.s.e.g...m.i./.h.r...{.0.}. .K.D.....m.e.t.r.o...d.e.g... .K...m.e.t.r.o.....y.a.r.d.a.....y.a.r.d.a.....{.0.}.t.a.o.n...n.a.n.o.s.e.g...m.i.l.i.s.e.g...s.q. .m.i.l.e...{.0.}. .a.r.a.w...{.0.}. .o.r.a.s...{.0.}. .t.a.o.n...{.0.}./.a.r.a.w...{.0.}. .k.i.l.o...{.0.}.b.u.w.a.n...{.0.}. .t.a.s.a...{.0.}./.t.a.o.n...{.0.}. .o.n.s.a...l.i.t.r.o./.k.m...m.g.a. .o.r.a.s...m.g.a. .t.a.o.n...p.u.l.g.a.d.a.....p.u.l.g.a.d.a.....{.0.}. .b.u.w.a.n...{.0.}.l.i.n.g.g.o...m.e.t.r.o./.s.e.g...m.g.a. .b.u.w.a.n...m.g.a. .s.i.g.l.o...m.i.l.y.a./.g.a.l...{.0.}. .n.a. .l.y...{.0.}. .n.a. .m.c...{.0.}. .n.a. .p.c...{.0.}. .n.a. .p.m...{.0.}. .n.a. .y.d...{.0.}./.b.u.w.a.n...{.0.}. .l.i.n.g.g.o...{.0.}. .n.a. .m.p.t...{.0.}./.l.i.n.g.g.o...m.g.a. .l.i.n.g.g.o...m.g.a. .m.i.n.u.t.o...m.i.l.y.a./.o.r.a.s...{.0.}. .n.a. .b.i.t...{.0.}. .n.a. .d.e.g...{.0.}. .n.a. .g.a.l...{.0.}. .n.a. .l.u.x...{.0.}. .n.a. .
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):13300
                                                                                                Entropy (8bit):5.062980967084747
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:WFBU8GLBJHxKQFvTnkcmEVoE4p4RI4J4fW0BWS3fcwHiYPzL4n+:SBUJJ5znm1iZC+SWS3vp4+
                                                                                                MD5:3DABB114B27AEAD5A07BF429DE29A4F3
                                                                                                SHA1:348C56AD959BDC7B2E02FD688BBE3244101416A4
                                                                                                SHA-256:9769E6AB898659935A5B8CC4EAD3CA4A3C86BDC68C6FFDC8BEBA449B0B93D6F4
                                                                                                SHA-512:E4CACF5BB56A5F0EB808B488619477B91BB51A33C1E8EC8786E1F941C91CF54EB51C04D49044701045377A70E2B8738DD97707132269A7CAF37398664A9DA1B5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .w....................w.....91ci..{.0.}...r...{.0.}.t.....{.0.}.v.....{.0.}. ...r...{.0.}.m.s.....{.0.}. .......{.0.}./...r...{.0.}. .b...t...{.0.}. .m...l...{.0.}. .p.k.t...{.0.}. ...s.....{.0.}. .m.s.....{.0.}. .v.i.....{.0.}./.f...t...{.0.}. ...l.d...{.0.}./.v.i.....{.0.}. .s.t.i.g...{.0.}. .m...n.....{.0.}. .m...l.....{.0.}. .e.k.r.a...{.0.}. .m...l.....{.0.}. .s.n.......{.0.}. .t.u.m.....{.0.}. .u.n.s.a...{.0.}./.m...l.....{.0.}./.t.u.m.....2...1...4.8...9...{.0.}. .f...t.....{.0.}. .t...m.i...{.0.}. .v.i.k.a...{.0.}./.u.n.s.u...{.0.}. .m...l./.t...{.0.}. .u.n.s.u.r...{.0.}. .t.e.s.k.....{.0.}. .t.u.m.......{.0.}. .f...t.u.r...{.0.}. .f...t.u.r...{.0.}. .t.u.m.......{.0.}. ...l.d.i.r...{.0.}./.t.u.m.......m.i.k.r.o.s.e.k.....{.0.}. .l.i.t.u.r...{.0.}. .m.e.t.u.r...{.0.}. .t.u.m.m.i...{.0.}. .t...m.a.r...{.0.}. .s.j...m...l...{.0.}. .s.m...l./.t...{.0.}. .f.e.r.m...l...{.0.}. .k.o.p.p.u.r...{.0.}. .f...t.u.r.....{.0.}. .f...t.u.r.....{.0.}. .e.y.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):20012
                                                                                                Entropy (8bit):4.889244556728978
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:3v616sK0ClHiNnF6mw0CVmP8mGY0PM1dFjlGqaY:f4C0F6mw0X0PMDPVaY
                                                                                                MD5:9D5764E76638394E0485835CE73F84E0
                                                                                                SHA1:7851AF4721AB80356A042918BB320733C2917068
                                                                                                SHA-256:43C70995F7005BE5203FB96EC0878F4B96D4C557673A1C77EE1A697E95ECE524
                                                                                                SHA-512:8FEFC22DD116A116802B5AFE955F08684EF7450043E3F0C1A4592D9F473A4C071C78E1BD941B4329EC51F14FD570D7F2B46B2A2641D9184C5C8B762FD4073545
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................{.. .X....................X.....91ci..3 H.g...{.0.}./ N...{.0.}./ g...{.0.}./ h...{.0.}./ j...{.0.}./ l...{.0.}./ s...{.0.}./ A...{.0.}./ J...{.0.}./ K...{.0.}./ V...{.0.}./ W...{.0.}./ t...{.0.}./ ....{.0.}./ 0 ..{.0.}./ 1 ..{.0.}.c.h...{.0.}.u.a...{.0.}./ m...{.0.}./ o...{.0.}./ E...{.0.}./ O...{.0.}./ S...{.0.}./ c.t...{.0.}./ M.l...{.0.}./ a.l...{.0.}./ c.m...{.0.}./ h.l...{.0.}./ k.g...{.0.}./ k.m...{.0.}./ l.x...{.0.}./ m.....{.0.}./ m.m...{.0.}./ m.s...{.0.}./ m.....{.0.}./ n.d...{.0.}./ p.i...{.0.}./ p.o...{.0.}./ u.a...{.0.}./ ..C...{.0.}...s.....{.0.}./ D.a...{.0.}./ G.W...{.0.}./ G.o...{.0.}./ H.z...{.0.}./ L..&..{.0.}./ M.W...{.0.}./ M.o...{.0.}./ M.."..{.0.}./ M..&..{.0.}./ P.o...{.0.}./ R..&..{.0.}./ T.o...{.0.}./ a.c...{.0.}./ c.h...{.0.}./ d.m...{.0.}./ e.V...{.0.}./ h.a...{.0.}./ k.J...{.0.}./ k.W...{.0.}./ k.o...{.0.}./ l.b...{.0.}./ m.A...{.0.}./ m.W...{.0.}./ m.g...{.0.}./ m.i...{.0.}./ m.....{.0.}./ n.m...{.0.}./ n.s...{.0.}./ o.z...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):10868
                                                                                                Entropy (8bit):4.868626587414015
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:7iQalBBLRP0memzcKbJb2fRsNw/SK3XkeVsNKMxB7gA8enK6CMX42541gSY:5al32memzcEw/mNfr94hY
                                                                                                MD5:DF4CA241DF2B2CB331C23579CDEE3EFE
                                                                                                SHA1:055046C8F97EBC6ECD99F286CAC37EA418B6C9F6
                                                                                                SHA-256:61DC72F03AE6CE930899CB5D02C36E033183330E2D173A1328D87FA25C70E713
                                                                                                SHA-512:1C6D528C6376EF4A49F93D4D39EA037397ED733DC388CFDDE11DBA8092FCF4491BAE35AF34D0A978E28EDF67F9181D809B63B3CF741FCC2F553EE836D566D85F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..}....................}....91ci..{.0.}.t.c...{.0.}.N.M...{.0.}.a.l...{.0.}.n.d...{.0.}.p.i...{.0.}.p.o...{.0.}.v.g...{.0.}...s...{.0.}. .G.o...{.0.}. .M.o...{.0.}. .T.o...{.0.}. .c.h...{.0.}. .k.o...{.0.}. .p.o...{.0.}. .t.c...{.0.}...N.M...{.0.}...v.g...{.0.}. .p.i...{.0.}. .v.g...{.0.}...p.i...{.0.}...u.a...{.0.}.....C...{.0.}. .v.g.....{.0.}. .a.n.s...{.0.}. .p.o.....{.0.}. .p.o.....{.0.}...p.i.....{.0.}...p.s.i...{.0.}...p.t.e...{.0.}...v.g.....f.o.r.c.e. .G...{.0.}. .p.i.....{.0.}. .p.t.e...{.0.}. .v.g.....{.0.}./.s.e.m...{.0.}...p.i.....{.0.}. .c.h.o.p...{.0.}. .m.o.i.s...{.0.}. .j.o.u.r...{.0.}. .o.n.c.e...{.0.}. .p.i.e.d...{.0.}. .o.c.t.e.t...{.0.}. .l.b.-.p.i...{.0.}...p.o. .H.g...{.0.}. .d.e.g.r.....{.0.}. .h.e.u.r.e...{.0.}. .j.o.u.r.s...{.0.}. .m.i.l.l.e...{.0.}. .m...t.r.e...{.0.}. .o.u.e.s.t...{.0.}. .p.o.u.c.e...{.0.}...v.e.r.g.e...{.0.}. .v.e.r.g.e.s...{.0.}. .d.e.g.r...s...{.0.}. .g.r.a.m.m.e...{.0.}. .h.e.u.r.e.s...{.0.}. .l.i.v.r.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):452
                                                                                                Entropy (8bit):3.9471071501604382
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:i3ALEPoq0wq0wYDGdOY3H0Gdos6yFGfTHhxVP:iwLyo1w1FDEX0Fs1F8LhxV
                                                                                                MD5:243D1302D7C328418F1E9A6E2B73CDF1
                                                                                                SHA1:7045BAE90A58F0ADF05B6A64CC709D7EE39D255E
                                                                                                SHA-256:7B0F28AA6E2066CBBDA528B1A38471CBA87205826A77CD098A6254224BA41F3E
                                                                                                SHA-512:0F1A9BB383F371151DF7FEF9D28085A48A30C1211E91D66A30A61765D44962C782D511EFA988C345A1125272AFF3CCF9A4EAC727889122F78693EA576FBB4917
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................b.. ..0.....i...i..........0J...91ci..g.r.....{.0.}.k.r...{.0.}.g.r...{.0.}.c.a.r.r.e.a.u...{.0.}.c.a.r.r.e.a.u.x...{.0.}. .p.o.u.r. .c.h.a.q.u.e. .m.e.t.r.e. .c.u.b.e...{.0.}. .p.o.u.r. .c.h.a.q.u.e. .c.e.n.t.i.m.e.t.r.e. .c.u.b.e.....5...:.)0&010....X0....=0..5..0..5..0..5...:..0.0.0....:. 0 0....c..P........j..Pm..P....j...J.. L.. ....p..P..8.T.. ..S.s..P........v..P}..P..J.8...X.. Z.. ......a.m...{..`P.. V.. ^..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):3936
                                                                                                Entropy (8bit):5.218369961499987
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:F2/kSmh1rjfPEYjB8FfMsOfDkknCZIpKacZP4L:P1djCFfslNpik
                                                                                                MD5:5BDF3315281153E636EBD136A8845E73
                                                                                                SHA1:676ED0061FC25F98780F73A38813C08A6D63E42A
                                                                                                SHA-256:3D6CBF05380EAD90AE3FA495F68F5F911A1A4B3479FAD2889F264F4D9F47646B
                                                                                                SHA-512:EE27967062D81545258633878613C5B0F6C59B0BE0F329CA3355126F0CB671BFD83F67FE878B8ADE52F37F5EC96EFF7E5362F1D6605BFD3471B7A6B4B77E6838
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................91ci..{.0.}. .j.r...{.0.}. .m.y.l...{.0.}. .a.r.e...{.0.}. .d.e.i...{.0.}. .w.k.n...{.0.}. .o.e.r.e...{.0.}. .f.o.e.t...{.0.}. .a.r.e.s...{.0.}. .j.i.e.r...{.0.}. .w.i.k.e...{.0.}. .d.e.i.e.n...{.0.}. .w.i.k.e.n...{.0.}. .t.o.m.m.e.n...{.0.}. .m.o.a.n.n.e...{.0.}. .h.e.k.t.a.r.e...{.0.}. .m.o.a.n.n.e.e.n...{.0.}. .s.e.k.o.n.d.e.n...{.0.}. .b.o.o.g.m.i.n...t...{.0.}. .l.j.o.c.h.t.j.i.e.r...{.0.}. .k.u.b.i.k.e. .m.y.l...{.0.}. .m.y.l. .d.e. .o.e.r.e...{.0.}. .h.y.n.s.t.e.k.r...f.t...{.0.}. .b.o.o.g.s.e.k.o.n.d.e.n...{.0.}. .m.i.l.l.i.s.e.k.o.n.d.e.n...{.0.}. .h.y.n.s.t.e.k.r...f.t.e.n...{.0.}. .f.j.o.u.w.e.r.k.a.n.t.e. .m.y.l...{.0.}. .k.u.b.i.k.e. .k.i.l.o.m.e.t.e.r...{.0.}. .m.e.t.e.r. .d.e. .s.e.k.o.n.d.e...{.0.}. .f.j.o.u.w.e.r.k.a.n.t.e. .f.o.e.t...{.0.}. .k.i.l.o.m.e.t.e.r. .d.e. .o.e.r.e...{.0.}. .f.j.o.u.w.e.r.k.a.n.t.e. .m.e.t.e.r...{.0.}. .f.j.o.u.w.e.r.k.a.n.t.e. .k.i.l.o.m.e.t.e.r...........!.......5...:.LgMEHg..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):15020
                                                                                                Entropy (8bit):5.438754249792362
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:jlNk6C0xU+CIV3whCBhvqdgFgImX84SkhTQUeVqx/PRvkeiIW4vgZDx8d8R:jPkkO4fRqnVQFCHRv6oA18+R
                                                                                                MD5:F57075E98EDEA1CA8EE2ADCE95DE727A
                                                                                                SHA1:78192E7525106F75225FA9E6ACA7673D98EADADF
                                                                                                SHA-256:F0D60C43FCD628071777D0ADD6523ECDC489C18BA2C39F1B17E620C53958A4C6
                                                                                                SHA-512:14663E1BEEF54BF19D24E394E7AD720F2B845623CF8982DFF670857899009BB2D18C3F9078AD2346EC56BC0199E1754CD357EEE49FACD51CC204FDF0FFD7FF52
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..=....................=....91ci..{.0.}.....{.0.}.....{.0.}.....{.0.}. ."...{.0.}. .'...{.0.}. .....{.0.}. .....{.0.}. .....{.0.}.......{.0.}./.....{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}./.......{.0.}./.......{.0.}./.......{.0.}./.....................{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}./.........{.0.}./.........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. .........{.0.}./.........{.0.}./. .......{.0.}./.........{.0.}./.........................{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}. ...........{.0.}./.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):3.4007237652827222
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQwl8t8WolUE+l2iAllfPAkll1:SvXl8t8FlUrl2iA/Ak9
                                                                                                MD5:C177B7AA90760FB221186EBCB1EFDD58
                                                                                                SHA1:3DCA7953EE83E5AA19331259E3CDBA45FE64DECD
                                                                                                SHA-256:B4C6C502D250FF8DD61D2867C70F1C7719C15390561075A4FEA0E47304950244
                                                                                                SHA-512:6E133FD97246DEB378888AF541353ABFF1ADCADA02E2F915099EA1D08F77956CA95284D83F7300440BA93C991C58AD574579F58424B47EF45B59D88EC625B1E0
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................91ci..........!................`...P
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):13408
                                                                                                Entropy (8bit):5.390599142540395
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:Vl8llSg7xEIIflnlFidJJJGHkBtY1y1tvUyl0ju:3mL8r1y1lUylp
                                                                                                MD5:48F871CB77A03A83BF1FEF28E820A4AC
                                                                                                SHA1:8B99F6804736372BCA2F635DEF63DDD32909A6FA
                                                                                                SHA-256:F0E0908070F44D09F063A3F401D8E24493108CB1BC2B867BE029D937E2F2B43E
                                                                                                SHA-512:4BAE6ADA2A352A9AE738C1593FB2B6429F0E0D1D2225CC3BD4A110E6FB911DA36A04026BEF79528C8A9C9CF2A14325EB57A01AAA8B2CECA35463D0ACFB9F7586
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................91ci..{.0.}.......{.0.}...@...{.0.}.5.I...{.0.}. ...*...{.0.}.&.?.(...{.0.}...>.9...{.0.}...@.2...{.0.}. .......{.0.}. ...p...{.0.}. ...@...{.0.}.....p...{.0.}...A.p...{.0.}.....p...{.0.}...?.p...{.0.}.2.@.p...{.0.}.8.G.p...{.0.}.9.G.p...{.0.}./...@.......M.*.@.p...{.0.}. .....6...{.0.}. .(.I.....{.0.}...8.G.p...{.0.}. .........{.0.}. .....8...{.0.}. .&.?.(...{.0.}. .,.?.....{.0.}. ...>.9...{.0.}. ...@.2...{.0.}.5.0.M.7...{.0.}.....!.<...{.0.}./.........{.0.}./.....8...{.0.}. ...H.p...{.0.}. .6.$.>...{.0.}. .....p...{.0.}. ...B.2...{.0.}. ...?.p...{.0.}. .2.@.p...{.0.}. .5.I.....{.0.}. .8.G.p...{.0.}. .9.G.p...{.0.}.....*.@...{.0.}./.....p...{.0.}./.&.?.(...{.0.}./...>.9...{.0.}./.2.@.p...{.0.}./.8.G.p...{.0.}. .!.K.(.....{.0.}. .,.H.0.2...{.0.}. .....!.<...{.0.}. ...H.2.(...{.0.}. .*.?.......{.0.}. .*.L...!...{.0.}. .,.>.......{.0.}. ...H.0.....{.0.}. .2...M.8...{.0.}./.*.L...!...{.0.}. .+.<.@.....{.0.}./...?.(.......@.2.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):14884
                                                                                                Entropy (8bit):5.311890721101611
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:kbbxETvMSqU6dzpEcsq5AZqQJFNZ52lyy+nG5elTrHNu5xVptSYeY:5tj2Ey+n3RM5xVj
                                                                                                MD5:883FCA1C6A6B724D39F88C1D90B96AA3
                                                                                                SHA1:1410A7A0F4B820E4C440393C65EB7847D0EA38DF
                                                                                                SHA-256:8843EB32F3601B27420FA30F753A8945F7EFCA0E173E73977FEFA704BF7E3D33
                                                                                                SHA-512:5366BD5D7A3F8F27022500253D4FF6DA0BDBCAA29F157AB9252F07235002317F7B7D48EB9D15CA673209395DD9642461B36F7442EB3F964301BA0C030DEB79E1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................y.. ......................g...91ci..{.0.}. .a.....{.0.}. .B.~.....a.m...t.o.n.y...{.0.}. .c...l...{.0.}. .d.z.....{.0.}. .l...t...{.0.}. .m...s.....{.0.}. .B.~.k.....{.0.}. .u.n.c.y...{.0.}. .a.c.r.y...{.0.}. .c...l.e...{.0.}. .d.z.e.D...{.0.}. .l...t.a...{.0.}. .l...t.o...{.0.}. .l.....e...{.0.}. .h.o.d.z.....{.0.}. .t.y.d.z.....{.0.}. .B.~.i.c.y...{.0.}. .a.a.l.k.i...{.0.}. .a.c.r.a.j...{.0.}. .a.c.r.o.w...{.0.}. .b.i.t.a.j...{.0.}. .c...l.e.j...{.0.}. .c...l.o.w...{.0.}. .d.n.j.e.j...{.0.}. .m...s.a.c...{.0.}. .o.h.m.a.j...{.0.}. .B.~.i.c.a...{.0.}. .a.a.l.c.e...{.0.}. .a.a.l.k.a...{.0.}. .m.i.n.u...e...{.0.}. .m...s.a.c.y...{.0.}. .B.~.i...k.i...{.0.}. .b.y.t.e.a.j...{.0.}. .g.r.a.m.a.j...{.0.}. .j.o.u.l.e.j...{.0.}. .l.i.t.r.a.j...{.0.}. .m.e.t.r.a.j...{.0.}. .p.i.n.t.a.j...{.0.}. .p.u.n.t.a.j...{.0.}. .s.t.o.p.j.e...{.0.}. .s.t.o.p.o.w...{.0.}. .t.y.d.z.e.D...{.0.}. .v.o.l.t.a.j...{.0.}. .w.a.t.t.a.j...{.0.}. .y.a.r.d.a.j...{.0.}. .B.~.i.c.o.w...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):17340
                                                                                                Entropy (8bit):5.050776509041609
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:mREwBdbJsHmcmlJpA2nBCtlu9Vr9deFsF:qxnBCfsr9dHF
                                                                                                MD5:AC858DA404C2D1DDD4F55792178D943D
                                                                                                SHA1:ACDF2F8F537A7B061C4B6F88DB489A7EA32B2604
                                                                                                SHA-256:AB8D8F8323D47054142CB79190D51CA2844BA83FDDE38FBA4192F2895BAEB7E2
                                                                                                SHA-512:C956624A54DC3886EEE62E5AB5D0BE65B70E3927B9E307477390B6AE80E6776CE21D5B2326CB2FF17752267482BEE41A315087AFFA438E5C2569E0EA6EC38DDD
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .w....................w.....91ci..{.0.}.....P.b...t...m.....l.....s.e.k.....{.0.}. .m.....{.0.}. .s.e...{.0.}. ...r...{.0.}...r.h...{.0.}. .h.....{.0.}. .e.k...{.0.}. .p.....{.0.}. .t.....{.0.}. .t.....{.0.}. .v.....{.0.}.m.......m./.s.e.k.....{.0.}./.t.....{.0.}./...r...{.0.}. .f.e.t...{.0.}. .s.m.l...{.0.}. .e.k.....{.0.}. .k.t.....{.0.}. .l...x...{.0.}. .m.s.k...{.0.}. .m.......{.0.}. .s.n.....{.0.}. .t.s.k...{.0.}. .j...l...{.0.}. .l.j.....{.0.}. ...r.h...{.0.}./.f.e.t.....m.e.t.r.a.r...t.o.m.m.u.r.....t.o.m.m.u.r.....y.a.r.d.a.r.....y.a.r.d.a.r.....{.0.}. ...l.d...{.0.}./.t.o.m...{.0.}./...r.i...{.0.}. .s.t.i.g...{.0.}. .b...t.i...{.0.}. .m...n.....{.0.}. .m...n.....{.0.}. .f.e.t.....{.0.}. .v.i.k.a...B.N.A. .t.o.n.n...g.-.h.r.....u.n...n.a.n...s.e.k.....{.0.}. .L.s...l...{.0.}. .M.s...l...{.0.}. .R.s...l...{.0.}. .b.i.t.i...{.0.}. .m.b...r...{.0.}. ...n.s.a...h...f.u.....t.t...t.r.o.y.e.s.o.z...{.0.}. .e.k.r.a...{.0.}. .m...l.a...{.0.}. .v...t.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.8041805894387437
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
                                                                                                MD5:6134F4CD4D6C15CE86537D2613927036
                                                                                                SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
                                                                                                SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
                                                                                                SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.h....................h.....91ci......g.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.8041805894387437
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
                                                                                                MD5:6134F4CD4D6C15CE86537D2613927036
                                                                                                SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
                                                                                                SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
                                                                                                SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.h....................h.....91ci......g.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):9156
                                                                                                Entropy (8bit):5.545391513355349
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:BpZWVBvLdJk6Q99qtlQ0eO+koRL7Bz3ylgr:BpZWVBjdJPQ9O29Kopdz3yWr
                                                                                                MD5:B135AA99FF00AC0A9A1C3CB98633898F
                                                                                                SHA1:05A0D200915B96FD99B0B25633960E0BBA7C7E2B
                                                                                                SHA-256:F27CD269E2365F699A9343C92F97726F0B2A40AC6C60EB201000BF2449FBD03E
                                                                                                SHA-512:7963A17BE946F2FC0C6EE49095DA9C74B2A6C3B8ABB1621B35F126DC0F49939F49F96E4A3D04374E354B291F6887AF7B7B918ED7A94EA5FACCE4E02D3C26B352
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .._...................._-...91ci......).....-.(...T.(...{.0.}.....{.0.}.....{.0.}.D...{.0.}.|...{.0.}.....{.0.}.....{.0.}.C...{.0.}.....{.0.}..!..{.0.}.4...{.0.}.....{.0.}.....{.0.}.......{.0.}.......{.0.}.P.....{.0.}.......{.0.}...D...{.0.}./.D...{.0.}./.....{.0.}./.|...{.0.}./.....{.0.}.|....{.0.}......{.0.}.......{.0.}.$....{.0.}.x.....{.0.}.t.4...{.0.}..4...{.0.}.....{.0.}..%...{.0.}.0.....{.0.}.......{.0.}.8.0...{.0.}.(....{.0.}...H...{.0.}......{.0.}...9...{.0.}.(.d...{.0.}...q...{.0.}.t....{.0.}.......{.0.}./.....{.0.}./.....{.0.}.H.P...{.0.}.......{.0.}.......{.0.}.D.....{.0.}.@....{.0.}.x.X...{.0.}.<....{.0.}.........{.0.}.N.."m...{.0.}...\.....{.0.}.|.\.....{.0.}.B.t.u...{.0.}.b.b.l...{.0.}.l.b.f...{.0.}...x.....{.0.}.|...H...{.0.}.........{.0.}...t.....{.0.}....|...{.0.}.......{.0.}...x....{.0.}...x....{.0.}.....t...{.0.}.".H.g...{.0.}./.......{.0.}...t....{.0.}.T.....{.0.}...t. ....... .{.0.}...... .{.0.}....... .{.0.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):3.368272640304357
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQ5Ell88W2lT+l2iAllfPn9n:Svf/88hlCl2iA/n9n
                                                                                                MD5:4EB54990F712FE7E3F2DA1088393C832
                                                                                                SHA1:2375FB6AA7696FB3019296E2DCD6F885AC52A804
                                                                                                SHA-256:B759FCCFDFA0644D5EC14A30A3DEE6C2A008DE94C804DF1EE7F0F1AAC84567C0
                                                                                                SHA-512:BDB640894EDCCBCC3A03B805DDF27074D70EB137C90EC8DF73D4D2CCD66D9B3BD68645FBCA891D9CCF5C188661068BE0FC16885177FDB060D541B4111D50DB49
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................91ci..........!................`...P
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):29800
                                                                                                Entropy (8bit):4.84026116737284
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:LAq61BTfImbTzBfYOGpnuXLWuTe1dWBM8oBQKEO87ykRsG:sN/fUpniTe1dWG8CQKEO4y0
                                                                                                MD5:46C050C3658896E74B8A60461C6438B0
                                                                                                SHA1:6773A3A0D860BACEC66E3E1C22007EAAC2C439FC
                                                                                                SHA-256:D02996547794E680462092430169F15B8B83E4DCB00A17734581F39048A872C9
                                                                                                SHA-512:F6690044DCA30353C784C0B778F1E00D4855911AF0473555C3D6BE0354177E7A8490A3F88862C68564E6433325B79CF0FE9699E278B1A096B9E24B6468664274
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..x....................xM...91ci..{.0.}. .P...{.0.}. .R...{.0.}. .`...{.0.}. .I.M...{.0.}. .A.G...{.0.}. .K.N...{.0.}. .A.V...{.0.}. .a.m.....{.0.}. .N.-.m...{.0.}. .o.m.o...{.0.}. .o.m.s...{.0.}./.m.y.....{.0.}. .m...n.....{.0.}. .s.a.v.....{.0.}. .a.k.r.....{.0.}. .v.a.l.....n.a.n.o.s.e.k.....{.0.}./.s.a.v.....{.0.}. .m.e.t.s...{.0.}./.m...n.....{.0.}. .a.k.r.o...{.0.}. .a.k.r.s...{.0.}. .b.i.t.o...{.0.}. .b.i.t.s...{.0.}. .o.m.a.i...{.0.}. .o.m.a.s...{.0.}. .p...d.a...{.0.}. .p...d.s...{.0.}. .r.y.t.s...{.0.}. .t.o.n.s...{.0.}. .v.a.t.o...{.0.}. .v.a.t.s...{.0.}. .a... .a.....{.0.}. .k.v... .m...{.0.}. .v... .a.....{.0.}. .m.e.t.a.i...{.0.}. .t.o.n.o.s...{.0.}. .a.k.r.a.i...{.0.}. .p...d.o.s...{.0.}. .m...n.u.o...{.0.}. .a.k.r.a.s...{.0.}. .a.m.~.i.s...{.0.}. .b.a.i.t.o...{.0.}. .b.a.i.t.s...{.0.}. .b.i.t.a.i...{.0.}. .b.i.t.a.s...{.0.}. .c.o.l.i.o...{.0.}. .c.o.l.i.s...{.0.}. .c.o.l.i.s...{.0.}. .d.i.e.n.s...{.0.}. .g.r.a.m.s...{.0.}. .h.e.r.c.o.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.8041805894387437
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
                                                                                                MD5:6134F4CD4D6C15CE86537D2613927036
                                                                                                SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
                                                                                                SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
                                                                                                SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.h....................h.....91ci......g.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.7614817407829997
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM5Ell66E7lwMixn:SvL/66g7ix
                                                                                                MD5:73C69C57B33AEF2C0727DFDA891B26D5
                                                                                                SHA1:FCBB492532E487DAF4DE8D4F8884925FF3B1412F
                                                                                                SHA-256:13AFEF8EFD97579CFB7C479EA1B5B71DCF90FE527F4F9E7EE78F5F7EF97ECAA9
                                                                                                SHA-512:DDB84814465EA9CD26C061E49D03779C7FC4B11C4E6B3466D8EA24614D7C838CA84E2D2B14312A4ABCB24C78AC973F1D589B4579099D55150C9A2989BF665020
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.8041805894387437
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
                                                                                                MD5:6134F4CD4D6C15CE86537D2613927036
                                                                                                SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
                                                                                                SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
                                                                                                SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.h....................h.....91ci......g.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):18364
                                                                                                Entropy (8bit):5.295725885924158
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:IuxDceZIl7vU8jWYgyL+pL/BVeg1KcVzx0g9Tw2HFRTMwV8hyLrQG4H3LGjH+R2E:Iuxp/YgS0xfeV7qDPb4
                                                                                                MD5:095C02A340E27E028CF7A2ADDACF10B7
                                                                                                SHA1:E55181D9E0F75B6DDAD050E03E5838CE2D0EE391
                                                                                                SHA-256:ED1F67B22587A8083061BE79BABEDFE6E54F515189D8E80852D62AAA83F936F9
                                                                                                SHA-512:E556A4790F3AB02FCFA89839F6A507EDB84314148507D87FE652B9588044199D9262664DB8275BB919A63B44E8A2A2A8955F829B9C67FB1E3BB804AD0E6C6077
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .._...................._....91ci..5.>.0.....5.>.0.....{.0.}. .....{.0.}. .....{.0.}. .5...{.0.}...z...{.0.}.......{.0.}. .....{.0.}. .....{.0.}.*.....{.0.}.5.....{.0.}...8.F...{.0.}. .*.W...{.0.}. ...?...{.0.}. ...z...{.0.}...+.>...{.0.}. .......{.0.}./.......{.0.}.*.K.....{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .&.?...{.0.}. ...>...{.0.}. ...H...{.0.}. ./.>...{.0.}. .5.>...{.0.}. .9.F...{.0.}./.......{.0.}./.......{.0.}./.5.....{.0.}.+.>.....{.0.}.+.|.....{.0.}. .K.. ..{.0.}. .*.....{.0.}. .5.....{.0.}...?.....{.0.}.$.F.......H.}./.......{.0.}. .(.B.....{.0.}. ...H.....{.0.}. .....?...{.0.}. ...?.....{.0.}. ...@.....{.0.}. ...H.}...{.0.}. .2.?.....{.0.}. .5.>.0...{.0.}. .8.F.....{.0.}./.....?...{.0.}.....@.....{.0.}./...?.....{.0.}. .*.H.......$.A.....H.}...{.0.}. ...>.....{.0.}. ...B.....{.0.}. ...B.~...{.0.}. .*.K.....{.0.}. .+.>.....{.0.}. .+.|.....{.0.}. ...@.....{.0.}. ...@.....{.0.}. .5.>.....{.0.}. .5.>.....{.0.}. .5.>.....{.0.}. .9.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):11676
                                                                                                Entropy (8bit):5.557641880818722
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:SX1L61ITu9d8cO9fS0BdtvL+WaqraNbVK7au7xfbNbVMtIY5shF0MN3xMBQCrFO3:nnqZSXWxBwujlDOnXM41O4TmjLvHB
                                                                                                MD5:2758071178FF41F92D9245465A596645
                                                                                                SHA1:2321E5635A8C64C2F170306BEF489C03EE8319C8
                                                                                                SHA-256:DBB8BA891FCDCE92442F918140F986E6B6A7D97087BEDBB50778EF1A43A9E6A0
                                                                                                SHA-512:B448B399A1453359027577CE082C8EBB0F0CEDA1730363A8549D3158E50FD72D984A356C0DF46225C9568A824522BBEF0CC504E949A09B1F2A0CB00A95B3CF6F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................W.. .x......_..._.........x.....91ci....*.<...{.0.}. .0...{.0.}. .F...{.0.}./.F...{.0.}.......C. .E.M.<...F. .E.M.<.....<.5.B.@.......0.9.B...{.0.}. .3.@...{.0.}. ...3...{.0.}. .......{.0.}. ...8...{.0.}. .......{.0.}. .<.....{.0.}. .<.E...{.0.}. .A.=...{.0.}. .E.....{.0.}. .F.....{.0.}. .4.....{.0.}. .6.>...{.0.}. .:.6...{.0.}. .<.8...{.0.}. .D.B...{.0.}./.3.@...G.8.3.;.M.;...:...-.F.0.3...:.<./.F.0.3...{.0.}. .A.0.@...{.0.}. .6.8.;...{.0.}. .C.=.F...{.0.}.7.C.C.=...{.0.}. .<.8.....{.0.}. .c.<.....{.0.}. .E.M.<...{.0.}. .F.0.3...{.0.}./.8.=.G...{.0.}.......=...{.0.}. .:.@.F...{.0.}. .4./.E...{.0.}. .:...F...{.0.}. .:.@.B...{.0.}. .<.C.1...{.0.}. .?.=.B...{.0.}. .D.B.....{.0.}./.A.5.:...<.8.;.8.0.<.?...:.2...<.8.;.L...;.8.B.@./.:.<...<.8.;.8.A.5.:...{.0.}. ...4...@...{.0.}. .>.=.>.>...{.0.}. .:.<./.F...{.0.}. .E.C.2.L...{.0.}.#.<.0.@.4...{.0.}...<.=...4...{.0.}...@.=...4...{.0.}. ...A.5.:...{.0.}. .8.=.G.....{.0.}. .0.O.3.0...{.0.}. .8.=.G.....{.0.}. .<.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
                                                                                                MD5:C34486D88A5544F3392A4FB031ECA28C
                                                                                                SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
                                                                                                SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
                                                                                                SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):13936
                                                                                                Entropy (8bit):5.215968864855855
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:Veg0oCCGGnmAI7Tl4/1/U61hNPT2X7ruy40XM4dwhvE9HUZnuy/P2MG1Q64nbv8e:ZYyhqUsy/OmRCfvg
                                                                                                MD5:22FFA30D7C22584CC9EF87670F302457
                                                                                                SHA1:201C2E426FBD5F7259BFF23C6F09AB1BC485D5D5
                                                                                                SHA-256:25EE16CBB54BA20C61B132152CA8A7018C13B898B04C46E2746E8AA150F06AB3
                                                                                                SHA-512:29B56747AD32B55F61B57E1CFA37A17E57838409587C4EDC92C3E18EF54FA0BEE6A870BCACED2946801217743641E4FBA70EFDAAB90997B01CB97B84E97ABBFE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................@...91ci..y.r...{.0.}.....{.0.}.3...{.0.}.4...{.0.}.D...{.0.}. .....{.0.}. .3...{.0.}. .4...{.0.}. .D...(.J.1.D.2...1.'./...'.F...{.0.}. .(.|...{.0.}. .A.|...{.0.}. .|.F...{.0.}. ...2...".1.....3.....{.0.}. .H.1.....{.0.}. .A.|.G...{.0.}. ...2.G...i.n.c.h.e.s.....i.n.c.h.e.s.....k.m./.h.o.u.r...m.e.t.e.r.s.....{.0.}. .w.k.s...{.0.}. .(.|.3...{.0.}. .F.'.|...{.0.}. .H.'.|...{.0.}. .|.F.2...{.0.}. ...'.D...3.'.9.*.H.F.G...E.1.(.9. ...1...{.0.}. .3.D.F.G...{.0.}. .'.H.F.....{.0.}. ./.1.,.....{.0.}. .2.1.E.G...{.0.}. .H.1.......{.0.}. ./.H.F.E...{.0.}. .G.1.|.2...{.0.}. .(...1.D...{.0.}. .F.'.|.3...{.0.}. .m.t.h.s...{.0.}. .'.F.......{.0.}. .'.H.G.E...{.0.}. .'.J.......{.0.}. .(.'.J.|...{.0.}. .,.H.D.2...{.0.}. ...*.J.....{.0.}. .3.H.J.D...{.0.}. .D.J.|.1...{.0.}. .E.*.1.G...{.0.}. .H.'.|.3...{.0.}. .H.H.D.|...{.0.}. ...1.'.E...{.0.}. ...J.D.F...{.0.}.G.1. .A.|...{.0.}. .'.H.G.E.2...{.0.}. .'.J.....2...{.0.}. ./.H.F.E.2...{.0.}. .
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):2.9909324233057175
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMI9lx/lTNZlR4:SvjB2
                                                                                                MD5:5E3E0A089D7BACD2F1AC2684EE9BEF02
                                                                                                SHA1:4BD888AE18FA11258D13F8FA615D8915777CA4EE
                                                                                                SHA-256:F963A5003BFC4BCF7A310C34BDADED866BFE24561FEF032E89FECAB13BC3FFBB
                                                                                                SHA-512:A65C63ADD4DB82803F2ACA5D2CA2EBDADD12FAFF258472D36B0F735617104C352FF28B49AFC19446FCAB396E1FEBDC9A08BD91D2EF43F96EE25658D3A216C4BF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):2.9909324233057175
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMI9lx/lTNZlR4:SvjB2
                                                                                                MD5:5E3E0A089D7BACD2F1AC2684EE9BEF02
                                                                                                SHA1:4BD888AE18FA11258D13F8FA615D8915777CA4EE
                                                                                                SHA-256:F963A5003BFC4BCF7A310C34BDADED866BFE24561FEF032E89FECAB13BC3FFBB
                                                                                                SHA-512:A65C63ADD4DB82803F2ACA5D2CA2EBDADD12FAFF258472D36B0F735617104C352FF28B49AFC19446FCAB396E1FEBDC9A08BD91D2EF43F96EE25658D3A216C4BF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):2.9909324233057175
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMI9lx/lTNZlR4:SvjB2
                                                                                                MD5:5E3E0A089D7BACD2F1AC2684EE9BEF02
                                                                                                SHA1:4BD888AE18FA11258D13F8FA615D8915777CA4EE
                                                                                                SHA-256:F963A5003BFC4BCF7A310C34BDADED866BFE24561FEF032E89FECAB13BC3FFBB
                                                                                                SHA-512:A65C63ADD4DB82803F2ACA5D2CA2EBDADD12FAFF258472D36B0F735617104C352FF28B49AFC19446FCAB396E1FEBDC9A08BD91D2EF43F96EE25658D3A216C4BF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci............
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):4396
                                                                                                Entropy (8bit):5.349190956533119
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:d4M01bDvkzmlMwWADyqoAzrYavLcapS88NVyyecUvWr:dkbDvQvw9RYazcCbIr
                                                                                                MD5:E4219AF836A36899BFBA8B1631813406
                                                                                                SHA1:F075D64302327FC2BD662958761CEA35DF2C9D69
                                                                                                SHA-256:6FA1F6835FD4F23FC763CECB7CC857A2E1DBF84C1A0D03C6B7B89E2E48C18B9B
                                                                                                SHA-512:B86AA2133B72A72F7920198C5B0D6D2C65F28C271AF77785A38F1405444EECCA1922622C3B9E6C440B7016C0993B3B6FA86DD8367CDDE358288980C8D2345240
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................<.. ........C...C...............91ci..{.0.}. .c.s...{.0.}. .s.u.l...{.0.}. .c.h...m...{.0.}. .e.s.t.e...{.0.}. .c.h...v.....2...1...4.7...8.9...{.0.}. .O.e.s.t.e...{.0.}. .n.o.r.t.e...{.0.}. .c.h...v.e.n.a...{.0.}. .c.h...v.e.n.a.s...m.i.l.h.a.s./.g.a.l...o...m.i.l.h.a.s./.g.a.l. .i.m.p.....{.0.}. .e.l.e.t.r...o.-.v.o.l.t...{.0.}. .e.l.e.t.r...e.s.-.v.o.l.t.s...{.0.}. .c.h...v.e.n.a. .m...t.r.i.c.a...{.0.}. .o.n...a. .f.l.u.i.d.a. .i.m.p.....{.0.}. .c.h...v.e.n.a.s. .m...t.r.i.c.a.s...{.0.}. .o.n...a.s. .f.l.u.i.d.a.s. .i.m.p.....{.0.}. .m.i.l.i.m.o.l.e. .p.o.r. .l.i.t.r.o...{.0.}. .q.u.i.l...m.e.t.r.o. .q.u.a.d.r.a.d.o...{.0.}. .q.u.i.l...m.e.t.r.o.s. .q.u.a.d.r.a.d.o.s...{.0.}. .p.o.r. .q.u.i.l...m.e.t.r.o. .q.u.a.d.r.a.d.o...{.0.}. .m.e.t.r.o. .p.o.r. .s.e.g.u.n.d.o. .q.u.a.d.r.a.d.o...{.0.}. .m.e.t.r.o.s. .p.o.r. .s.e.g.u.n.d.o. .q.u.a.d.r.a.d.o.....5...:..8.8.8..5...:.,...(...5...:..........5...:..@.4.@..5...:.-...)...5...:...+.....5...:...|.}...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):3560
                                                                                                Entropy (8bit):5.072081775060199
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:xT7S+Nkq+gm1gN0fMqkOomB/P0siDO8+9QDrcFQevWdiJPrdTUEdxpR/ajHVLGVX:p7S+NkqLm1gN0fMqkOomBnFiDO86QDrW
                                                                                                MD5:E8DF44D39650D3C4CE831FC53BD059F1
                                                                                                SHA1:20487F16071939861E7C2D88A09B3E7F06C61E5F
                                                                                                SHA-256:CC61D9B22630DADBE6299A43D8B23778175E60AFF1EF6066050EC656FFA51251
                                                                                                SHA-512:CD982FB6D96ACE087CDB1B7C8AE492826D32B187486475F92B1A214BDF324C5FECA54BBFA6220A484300F9382D9AD69A79616646A52656B424DDF41C0B270125
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................j.. .......r...r..........y...91ci..{.0.}.;...:...0.9.B...{.0.}. .K.9...{.0.}./.K.9...{.0.}. .......{.0.}. .4.6...{.0.}. .=....."...0.0.9.B...:.K.@... .!.....9.M.;.M.@...{.0.}. .<...=...{.0.}. .A.K.;...{.0.}./.:...=...{.0.}. .:.4.6...{.0.}. .3.0.0...{.0.}. .A...:...{.0.}. ...9.M...{.0.}./.<...=...{.0.}./.=.M.4...{.0.}./.A...:...{.0.}. .1.8.8.B...{.0.}. .=.M.4.....{.0.}. .G.0.0.A...K.9.3.0. .{.0.}...{.0.}. .<.8.8.;.M...{.0.}. .:.8.8.;.M...{.0.}. .1.0.0.9.B...{.0.}. .:...B./.G...A.K.;.3.0. .{.0.}...{.0.}. .:.0.@.0.0.B...{.0.}. .:.K.@.0.0.<...{.0.}. .....0.0.9.B...G.0.0.A.:.0. .{.0.}...{.0.}. .;.8.8.B.8.@.M...{.0.}. .<.8.M.B.M.@.M...{.0.}. .<...=.....B.M...{.0.}. .=.M.4.8.M.;.M...{.0.}. ...0.;.>.@.8.9...{.0.}. .3.5.:.B.0.0.@...{.0.}. .:.K.@.0.0.4.K.A...{.0.}. .:.8.;.>.1.8.8.B...{.0.}. .3.8.3.0.1.8.8.B...{.0.}. .<.5.3.0.1.8.8.B...{.0.}. .A...:.....=.4.M...{.0.}. .:.8.;.>.1.0.0.9.B...{.0.}. .<.5.3.0.1.0.0.9.B...{.0.}. .B.5.@.0.1.0.0.9.B...<...=.....B.M...M.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.8041805894387437
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
                                                                                                MD5:6134F4CD4D6C15CE86537D2613927036
                                                                                                SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
                                                                                                SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
                                                                                                SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.h....................h.....91ci......g.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):92
                                                                                                Entropy (8bit):2.763053661085392
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMl2lYlillDTc6lLMGa:SBtkJcklIilNI6Jfa
                                                                                                MD5:5F7A1ACDBA8273876C06946D52D7EF6A
                                                                                                SHA1:6838F6556B7CB39A28F2D6D10B227D3511089B1D
                                                                                                SHA-256:4968812F54EEB455A6F0BAA9FAA9A68B5B5F94860FE4766506D8D265E2DB6B9B
                                                                                                SHA-512:DAEEF53AD06B57CC089E2CC5E1B053183CABFFC3D90215BFE84BB610A0A39D2E64CF55277CA7D4933430C33807D893079A82D1795C0BC204B673A7B7C6BEBFDE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci..s.r._.L.a.t.n.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.8041805894387437
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXE/66E7lyMC/n:SvV/66gdC/
                                                                                                MD5:6134F4CD4D6C15CE86537D2613927036
                                                                                                SHA1:59D53B482F70551D8DEA499A310E7DA230219A18
                                                                                                SHA-256:68F743AEC976A4117DCA15A76760CAC2F8580CEDFA64B9C7D523A8F7BC0FE081
                                                                                                SHA-512:AAB3C6A451737433D25E38D86D21F865D944541D8C3A1EA23D937AFB33C3A06C56A436AFA997D42343AAE8395607819A1A79F0FCB60A8017EE4C6E4C9A140172
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.h....................h.....91ci......g.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):2.9794524468707886
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMXE/flflcUTNZlgY/:SvV/cMEY/
                                                                                                MD5:6A9273AF56E5D1F6F2D24203334DDF9B
                                                                                                SHA1:BD7CA1CB1BA90B6036803043B8E351E6EC499DA5
                                                                                                SHA-256:F1D94FCB430E36370FA030C9D9892214DCB624289BC5282D432BF2A49378A08C
                                                                                                SHA-512:066CC289321C632CA0657AAC15F9F0E121C506B3EBD752E19277A5087417430E3C40525E0B410B930EF3A238328906AA64BF2A53B0FEBB26724918333C500508
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.h....................h.....91ci..........g.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.872172957387978
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlgelU8gl8l/csqtDelOph:SBtkJZlU8g8l/soleh
                                                                                                MD5:F1FD5E8EDA008BB8F7B9C82734D8B0BE
                                                                                                SHA1:44D4EBA762F1BF83C2EF92EDD8A91163CF6EAB37
                                                                                                SHA-256:8777C3E45987B50B72F43DA1331824D298934CF97877E1789E376A65A9C6FDAD
                                                                                                SHA-512:30530B5DE13DA12DE36ABC9376494F90F1C3FB7926B5A65DA2CD65DD865822043CB5E52844DDF1B022A4C6D3EF630D1CFB35D90672BC6292ACC25EF8ACB654A4
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci..s.h.i._.T.f.n.g._.M.A.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):16752
                                                                                                Entropy (8bit):4.833541903803518
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:+GkljLQTCV7qfR8/bvIWWz/TIK9HrxD0fId2M4WQ3LTEFQMs9DbIfJekqkZMI2:YcR8zIBz/nHrxofIdJdOTHshrqkSH
                                                                                                MD5:9B8FD3379E3E120A72E01EFECF1643AC
                                                                                                SHA1:8FA10FC67BBF756984F98EAD2594A6F4004F933B
                                                                                                SHA-256:19ECB3C299829F1CD34E0D202B877C4D208B72531FD5A72D70A4D7FC09C5F484
                                                                                                SHA-512:70157A00B353248F0E615C7D489D738A1CC92031E595A8245B7B53747A71E3FB14D589C9BA0CAAD83CF84AD7D4C02702CB72933183B61DDE52A92B640EAE54AF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................L.. ..t.....T...T..........t....91ci..B.i.l...H.K.B...k.t.s...s.n.o...j.i.h.o...B.i.l.o...M.e.y.l...m.k.o.b...{.0.}. .q...I.n.j.i.s...o.h.m.i.s...{.0.}. .C...{.0.}.i.l...B.B.e.y.t...F.u.u.d.h...G.B.e.y.t...M.B.e.y.t...T.B.e.y.t...f.i.i.t.....i.n.j.i.....k.B.e.y.t...m.l.s.e.k...{.0.}. .h.b...{.0.}. .B.B...{.0.}. .C.Q...{.0.}. .K.T...{.0.}. .b.m...{.0.}. .b.s...{.0.}. .b.t...{.0.}. .b.w...{.0.}. .k.r...{.0.}. .m.y...{.0.}. .n.t...{.0.}. .o.w...{.0.}. .u.x.....m.i.t.i.r...{.0.}. .m.k...J.u.u.l.e.s...M.a.a.l.m.o...Y.a.a.r.d.i...i.n.j.i.s.....{.0.}./.b.w...{.0.}./.m.t...{.0.}./.o.w...{.0.}./.s.k...{.0.}.M./.K...{.0.}. .b.i.l...{.0.}. .s.c.d...{.0.}. .m.l.n...{.0.}. .t.a.n...{.0.}. .M.b.a...{.0.}. .b.i.j...{.0.}. .h.B.a...{.0.}. .k.B.a...{.0.}. .m.b.t...{.0.}. .m.y.....{.0.}. .n.m.y...{.0.}. .s.m.y...{.0.}. .b.b.m...{.0.}. .C.D.h...{.0.}. .H.k.b...{.0.}. .K.W.s...{.0.}. .d.i.g...{.0.}. .m./.i...{.0.}. .m.y.....{.0.}. .s.n.d...B.a.r.s.e.k.s...a.m.b.e.r.e.s...m.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.905547915629603
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/csc6lSU5YMLn:SBtkJYlU8g8l/a6/5YMLn
                                                                                                MD5:331666E059510303EA5E9BD22324ACBC
                                                                                                SHA1:8CC2ECEEB94BFD3EF2F5B6DB21FE0CA71B06987B
                                                                                                SHA-256:38E6A6432D4E199AEDE8FA04AC7A448F95749F0E8EC3889E8BFA8D7D470D25CE
                                                                                                SHA-512:A99330F7DA649970C46F7A93F53D2FECA2D8C4EE9427E59058C4F02B591A84C6D1A3BCBF56BB0625145C38C7BC8FC390F766414F1DD38C30BFBB9A3DF77390AA
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci..s.r._.C.y.r.l._.B.A...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9849392665878645
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMWlut6E7l+/DT4aN:Sv/ut6g+bUaN
                                                                                                MD5:88CA5D2B5F3BAA53F32D1A17AFFB3CC4
                                                                                                SHA1:B603EF247D2E23125E79C34F3695B44853A2024E
                                                                                                SHA-256:413C50EF83D5A3FF6C6F693E50594FF033A0301DCB807C2AD1EFDEB25FCB7642
                                                                                                SHA-512:BE26D85B7EA633275DE857127A7E8891FE0BD1EB66BA33E83EE6B652A76C0618BF052DA6A43FB9E21394941732D9805DC2FB801A5065B7EE8CDA6EA77FF3914D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..(....................(....91ci.......(
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
                                                                                                MD5:C34486D88A5544F3392A4FB031ECA28C
                                                                                                SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
                                                                                                SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
                                                                                                SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
                                                                                                MD5:C34486D88A5544F3392A4FB031ECA28C
                                                                                                SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
                                                                                                SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
                                                                                                SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9849392665878645
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMWlut6E7l+/DT4aN:Sv/ut6g+bUaN
                                                                                                MD5:88CA5D2B5F3BAA53F32D1A17AFFB3CC4
                                                                                                SHA1:B603EF247D2E23125E79C34F3695B44853A2024E
                                                                                                SHA-256:413C50EF83D5A3FF6C6F693E50594FF033A0301DCB807C2AD1EFDEB25FCB7642
                                                                                                SHA-512:BE26D85B7EA633275DE857127A7E8891FE0BD1EB66BA33E83EE6B652A76C0618BF052DA6A43FB9E21394941732D9805DC2FB801A5065B7EE8CDA6EA77FF3914D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..(....................(....91ci.......(
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9849392665878645
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM10t6E7lHbT4d:SvZt6g7Ud
                                                                                                MD5:3A213577811436F09FF24D0DF8D5BB64
                                                                                                SHA1:412A7D31D9BF049CDF57CC29CBBB81B73BC856BD
                                                                                                SHA-256:F290EA9AE14EA99460199281AEE05EDB1532D2C47715999D01C1F6A4B91FE976
                                                                                                SHA-512:1E10DE89F72496207ACAFF7BCB79342E5AC41BE27CAF134EE07C36768D3086C2B8A80B49E3D77F37069F378C9B86EE18511357D61B643C2CFFF631556FA2F2AA
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.Z)...................Z)....91ci......Y)
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
                                                                                                MD5:C34486D88A5544F3392A4FB031ECA28C
                                                                                                SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
                                                                                                SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
                                                                                                SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
                                                                                                MD5:C34486D88A5544F3392A4FB031ECA28C
                                                                                                SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
                                                                                                SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
                                                                                                SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9849392665878645
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMWlut6E7l+/DT4aN:Sv/ut6g+bUaN
                                                                                                MD5:88CA5D2B5F3BAA53F32D1A17AFFB3CC4
                                                                                                SHA1:B603EF247D2E23125E79C34F3695B44853A2024E
                                                                                                SHA-256:413C50EF83D5A3FF6C6F693E50594FF033A0301DCB807C2AD1EFDEB25FCB7642
                                                                                                SHA-512:BE26D85B7EA633275DE857127A7E8891FE0BD1EB66BA33E83EE6B652A76C0618BF052DA6A43FB9E21394941732D9805DC2FB801A5065B7EE8CDA6EA77FF3914D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..(....................(....91ci.......(
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):22536
                                                                                                Entropy (8bit):5.055542219826834
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:5use72HkP0HnjmfIusADne/tdhaQAbyB98qQfig71nl8uLT6qw6RGnEfhHQxE2iP:5WQRm8Bi71nlX6qw6OAZQxE2i3g3N4Jf
                                                                                                MD5:248A72F139BFD13159187A0011FA2B6D
                                                                                                SHA1:E0CE0321DDF5B1794C156B4EDAA797B70B99F455
                                                                                                SHA-256:9AC800439CB6D05264C533353F40993335476FA7CB65BF832EC877009E108E14
                                                                                                SHA-512:38B4A1953ABEEC4DCF7A5CC1E604FAF637B4A0A092F19A95179C90D9D2C9ED2BFEF0A15B8F460D5E69CEA697E9E4D17FC8CC9D125451B8B902CE30B19F78E1EE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .._...................._M...91ci..(.?...?...{.0.}.5.>...{.0.}.8.F...{.0.}. .....{.0.}. .6...{.0.}.......{.0.}.(.?...{.0.}.(.F...{.0.}...@...{.0.}.0.K...{.0.}.2.@...{.0.}.8.....!.?...+.>...{.0.}. ...F...{.0.}. .......{.0.}. .......{.0.}. ...A...{.0.}...+.>...{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .&.....{.0.}. .*.....{.0.}. .,.?...{.0.}. .,.H...{.0.}. ...H...{.0.}. .2.....{.0.}. .5.K...{.0.}./.......{.0.}./.......{.0.}./.0.K...{.0.}./.8.F.......>.2.A.........>.2.A.....(.>...8.F.......?...8.F.......H...8.F.....{.0.}. .5.>.....{.0.}. ...G.....{.0.}. ...H.....{.0.}. .........{.0.}. .*.L.....{.0.}. ...@.....{.0.}. .9.F.....{.0.}. .........{.0.}. .(.>.....{.0.}. .........{.0.}. .........{.0.}. .........{.0.}. ...L.....{.0.}. .!.?.....{.0.}. .$.B.....{.0.}. .(.F.....{.0.}. ...@.....{.0.}. ...@.....{.0.}. ...H.....{.0.}. ...H.....{.0.}. .0.G.....{.0.}. .2.@.....{.0.}. .8.......{.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):3.368272640304357
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQVl/88WDlNT+l2iAllfPtk9n:Sv+C8SNCl2iA/tcn
                                                                                                MD5:F18F6D8DC0E40E96A1B5058D53270004
                                                                                                SHA1:696FE9BD9343B7BBE26041326571C2C99CC485DB
                                                                                                SHA-256:118D6F6CDD6912A4366B5C6478DFD735D606CB7210157AF2A8904B44297CE0D4
                                                                                                SHA-512:8DAEA2D8173E64A903B0CE89672E81F28A34DB824B8A2C07B6AC3DC380187F318E1F49FED00875DF6F41491756E4DEB664529B9D2354E467401D59D9215161E7
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .*!...................*!....91ci..........!.............)!.`...P
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):14192
                                                                                                Entropy (8bit):5.162604351879862
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:JjuBknvo7nMjqA6QMg+UXJcdrPXgnqNX+M1:J2kvo7M7M7UZc5yq51
                                                                                                MD5:C88DF0C69931B5DF6FC00A9C6652917D
                                                                                                SHA1:D2AF577CB36AC0F180C018DD458D9B4918254A6E
                                                                                                SHA-256:9EA2245F37F6DAAF5BBE5BCF4FDEA870CEDFED366A7E0212D3CCEAD7B569F9C8
                                                                                                SHA-512:FE1F0DB9A575FA02FF31E9CB5F1D3DE8DD8036452DC740C2D9F874B072CD4A7A7C6632F7749BC446629CB2BB19C85397AC43D6BDDA0F6F08498AAEDF2DF508F8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .._...................._5...91ci....4.(...{.0.}.....{.0.}. .....{.0.}.'.4...{.0.}. .....{.0.}.......{.0.}...5...{.0.}.!.....{.0.}.%.....{.0.}.........{.0.}...!.....{.0.}...!.....{.0.}.!.!.....{.0.}. .......{.0.}. ...-...{.0.}. ...5...{.0.}. .......{.0.}. .......{.0.}. .......{.0.}. .!.....{.0.}. .%.....{.0.}. .'.4...{.0.}./.......{.0.}./...5...{.0.}./.!.....{.0.}./.%.....{.0.}./.'.4...{.0.}...!.....{.0.}.'.1.....{.0.}.+.%.2...{.0.}.C...I.....5...5.".9...{.0.}. ...8.....{.0.}. ...-.....{.0.}. .#.-.....{.0.}. ...9.%...{.0.}. ...1.....{.0.}. ...4.....{.0.}. ...8.....{.0.}. .'.1.....{.0.}. .+.%.2...{.0.}. .B.!.%...{.0.}...2...5...{.0.}. .........{.0.}. ...'.....{.0.}. .........{.0.}. ...%.....{.0.}. ...!.....{.0.}. .!.......{.0.}. .!.%.....{.0.}. ...%.....{.0.}. .........{.0.}. ...!.....{.0.}. ...!.....{.0.}. ...!.....{.0.}. ...%.....{.0.}. .!.!.....{.0.}./.........{.0.}./...!.....{.0.}./...!.....{.0.}./...!.....{.0.}./...8.....{.0.}./.'.1.....{.0.}.D.!.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):2.9886793699589003
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtldelFal9lUfsqJ/qcs8Vn:SBtkJUlY05Zn
                                                                                                MD5:E72557576FFE1CD5460C3497156F022C
                                                                                                SHA1:AE59392718061FC184F7C4C6FFA937FD08C153D3
                                                                                                SHA-256:4AD5CFD24AB4748C4D5B25F88C66390A41B36BE6BA4932EC6B689A47D4DDEC21
                                                                                                SHA-512:D55B9F4FBF0A289C0133CBA35C6AF52DB40804745FBC9EED2732634B9170055ADE0ACA225FEC8CEA1AFEB4D88CF7E1E01F44D21D8922874B69D885DD2DFE8F49
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................91ci..b.u.d.d.h.i.s.t..................P
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):12244
                                                                                                Entropy (8bit):5.296719609460231
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:s1yk/rQ+mES0sXOIi0lQ3UM7eCCuTOglO28qBbg7m:SzQ+mES1pi063UWhY2ZBbwm
                                                                                                MD5:792BE2B17FBBBCF06D955D98F5F9DC7B
                                                                                                SHA1:B8D002E124B125FEA43A235FDDAC514BD5244830
                                                                                                SHA-256:06A9DD526E56AB9E07D5FE6F284853FADB7BB216577F68A0169AB5848E4CB681
                                                                                                SHA-512:8359FE20A7306ABF4DFBDBD5908FD539E301C5CD9FA4B86A4DE6AC35638284193E7181396F036FB5EC213617DC3CCE28F4E41280FE64A12B39E692D8D6B8F747
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................91ci..{.0.}.....{.0.}.s.m...{.0.}.s.g...{.0.}.s.e...{.0.}./.....{.0.}.d.g...{.0.}.g.b...{.0.}.g.d...{.0.}.g.o...{.0.}. .......{.0.}. .O.m...{.0.}. .a.b...{.0.}. .g.l...{.0.}. .l.k...{.0.}. .s.l...{.0.}. ...d...{.0.}. .W.t...{.0.}. .a.s...{.0.}. .a.....{.0.}. .d.....{.0.}. .e.W...{.0.}. .g.a...{.0.}. .k.....{.0.}. .......{.0.}./.a.....{.0.}./.d.....{.0.}./.......a.k.r.-.f.t...m.o.l.l.a.r...{.0.}. .d.g...{.0.}. .g.b...{.0.}. .g.d...{.0.}. .g.o...{.0.}. .m.W.t...{.0.}. .G.G.s...{.0.}. .G.W.t...{.0.}. .M.G.s...{.0.}. .M.W.t...{.0.}. .d.m.i...{.0.}. .d.......{.0.}. .d.......{.0.}. .g.P.a...{.0.}. .k.G.s...{.0.}. .k.W.t...{.0.}. .k.w.t...{.0.}. .m.k.....{.0.}. ...d.....{.0.}. ...d.....{.0.}. ...y.l...{.0.}. .d.......{.0.}. .h.e.p...{.0.}. .s.a.g...{.0.}./.d.......{.0.}./.f.u.t...{.0.}./.h.e.p...{.0.}./.s.a.g...l.i.t.r./.k.m...{.0.}./.s.e.k...{.0.}. .k...s.e...{.0.}./.f.u.n.t...{.0.}. .a...g.....{.0.}. .a.s.y.r...{.0.}. .a...l...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):92
                                                                                                Entropy (8bit):2.7982394370785384
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlF112lYlillDTh91Zn:SBtkJclIilN99jn
                                                                                                MD5:29D434DFCCA238F4E7B71194CD306D84
                                                                                                SHA1:D485D726A3FEFA62E0A7EB9E6C40421BC1D26740
                                                                                                SHA-256:2A4A3574497EC48D395B4FCAE86D9572984D32DD88D3B44613B66983777EBC79
                                                                                                SHA-512:F9D05DCC5A8B10EA253C9708958A3AA0BAE9BD4979513904C4B7E5694210744BED223937A24EC0BEB9CE6215C2A798470A6DBEFB44ECA82C79C8D0E11557CE3B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci..f.i.l._.P.H...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):30452
                                                                                                Entropy (8bit):5.158024533586776
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:9DuH0mg+Ez8uAJ0f+3Dt8gcC0AP5hJhUNoFFj6tt8PxO3P50NcfsGQgzHttPHIhV:9vzqPIXC83x0NZGtzPHISl8
                                                                                                MD5:D0AB00A38F64576C2236C5EE6A61153C
                                                                                                SHA1:D4D12349E97E235A9B6B3ABC43A6EAFC5A4FB4DE
                                                                                                SHA-256:7E46B5D874788E7CF483A209DADEE21442DBE01717FC2B3C08DE1C93AACB1C2F
                                                                                                SHA-512:76BD20F7ABD0EE04AE783720F5E595D1B4167EFC6D7D8D8405DDA53BCAC1496C9613D8EF31D5A9409FF372CC84030E2E4E9B1F3DCF82EA4FF1EB5680843BDD62
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .x....................x.....91ci..{.0.}.B...{.0.}.......1.V.B.....1.V.B...".1.V.B...:.1.V.B...<.8./.3...{.0.}.4.<...{.0.}.=.<...{.0.}.=.A...{.0.}.?.B...{.0.}...0...{.0.}.5.....{.0.}.<.3...{.0.}. .1...{.0.}.?.:...{.0.}./.@...{.0.}./.B...{.0.}. .@.....{.0.}. .E.2...{.0.}.<.:.<...{.0.}.<.:.3...{.0.}.....<...{.0.}...B.1...{.0.}.A.B.....{.0.}. .>.1...{.0.}. .5.....{.0.}.1.C.H...{.0.}./.E.2...g.-.A.8.;.0...{.0.}. ...E...{.0.}. ...4...{.0.}. ...=...{.0.}. .!.E...{.0.}./.@.....=.0.?.@.O.<...{.0.}. .4.=.....{.0.}.<.>.;.L...{.0.}.1.0.@.....{.0.}.<./.A.....{.0.}.<.<.@.A...{.0.}.D.=.B.A...{.0.}. .....<...{.0.}. ...B.1...{.0.}. .1.C.H...{.0.}. .A.B.....{.0.}.4.C.=.....{.0.}. .4.=.V...{.0.}. .>.<.8...{.0.}./.D.=.B...{.0.}. .1.V.B...{.0.}. .4.=.O...{.0.}. .@.V.:...{.0.}./.3.>.4...{.0.}./.4.=.....<.5.B.@.8./.A...{.0.}. .<.V.A.....{.0.}. .B.8.6.....{.0.}. .<.8.;.V...{.0.}.B.@... .C...{.0.}. ...:.0.;...{.0.}. .1.0.@.....{.0.}. .3.0.;.....{.0.}. .:...A.....{.0.}. .<.V.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
                                                                                                MD5:C34486D88A5544F3392A4FB031ECA28C
                                                                                                SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
                                                                                                SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
                                                                                                SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
                                                                                                MD5:C34486D88A5544F3392A4FB031ECA28C
                                                                                                SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
                                                                                                SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
                                                                                                SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.965547915629603
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/csllwl3l/Ln:SBtkJYlU8g8l/fK/Ln
                                                                                                MD5:92C8207FC061004A9199AEB7B897CA30
                                                                                                SHA1:3057478FFA023C34B6B8F8E32ABA2EB90A685C6A
                                                                                                SHA-256:98E38696C8243B84CAD71E47F1077B1D7B5DC54B9BCF501BFB965CC9CFAA36EF
                                                                                                SHA-512:362FC0A5FF0B6DAECA3A575AAA1908ADF996C66FFA94832C5A30C26E9F7BC69F7772468ECDC580E416087C9B667E7B91B33CB9BE6B90789127207DF0C5D444A7
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci..u.z._.L.a.t.n._.U.Z...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):508
                                                                                                Entropy (8bit):4.127084859354323
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:sG0sNYkc+R+/HtFY89LDKlcLsnPGcjzjd:6sNYkc++vtFY2LNLavh
                                                                                                MD5:592C3FD4F74A53D6D35227FC302C57C3
                                                                                                SHA1:3C3D80ECED0C41EFE1C92F7B947EA2FE48D3B66E
                                                                                                SHA-256:37DC93529EDFDCC38D62AEACDE411F88AA08BF374D1D37EF7B4AD946208F71A1
                                                                                                SHA-512:0BA17B0EDC3E74D2CF0ED5D8C53834AFCD06EECC78CE231F40C9422534A635F2529F04F3E6AFE7786B11940B04C6DC1A162C39025A65883F9480510DE895C6A6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................r.. .F......w...w.........F.X...91ci..{.0.}. .j...r...{.0.}. .t...g...{.0.}. .w.u.......{.0.}. .w.u...a...{.0.}. .m...n.e.t...{.0.}. .s.t.u.n.d...{.0.}. .m.i.n...t.e...{.0.}. .s.t.u.n.d.e...{.0.}. .m.i.n...t.a.....5...:.S.O.O...5...:...s.....5...:.....}...5...:.m.i.i...5...:.E..'.4..5...:.[.`.W...5...:.K.G.G...5.S...5.....5.....5.m...5.E...5.[...5.K...[...c.w.d...c.X..P_..Pf..Pm..Pt..P{..P...P..J.X.. ..[...c.w.d...c....P...P...P...P...P...P...P..J.e.. ......m.g..`c.. p..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):96
                                                                                                Entropy (8bit):2.6065957221707605
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlu112lFvlslpl9lUfsBOlhFc/u+ln:SBtkJK0lslL0AOlg3l
                                                                                                MD5:984B9A1F11CC36ECCE851C57010A572C
                                                                                                SHA1:DDE4651D99AF095C01CE7A1A2F5E5572C32F8A41
                                                                                                SHA-256:BD47EF872F6A9D88B7304311170B8C524C2FB432ECCF8D6A4CEB03AD61AE6A58
                                                                                                SHA-512:236AE3FA7F2150AA020F5D2864147F565894EDC926DCDC0503CA1AA0B5B24A49D3B41E2DC2D2A211261458DC5D5BFD9DAD7BA9BA1D00353A29D646FCDF0FDE9F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci..2...1...4.8...8.9.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
                                                                                                MD5:C34486D88A5544F3392A4FB031ECA28C
                                                                                                SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
                                                                                                SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
                                                                                                SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.945547915629603
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/csfJRzlI/kmn:SBtkJYlU8g8l/FJFGkmn
                                                                                                MD5:AEB320D4912F54EF1312147C4488DBB9
                                                                                                SHA1:1178FE7F00D59FC7F4EB51979DB5E12D6BD0B0B6
                                                                                                SHA-256:84FFA987E78CA5B8CE583956F30ACC050F93D73A9E75695D1DD93C1EEAA7DBEB
                                                                                                SHA-512:F3859842E63CB3D6AA9892898713E343079754C6896FD3738EF62826C7F3AC4D9FC1FA004AD9912F65FEA4587414BDDCDFD86712EC358A0DB76D748D8C1947F7
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci..z.h._.H.a.n.s._.C.N...........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.8041805894387437
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMI06E7lwlfMW/n:Svj06gwiW/
                                                                                                MD5:85A6974221A7807B04C9E016B6C8904C
                                                                                                SHA1:421C17E072A104975C29E5C4A51575C5A9542489
                                                                                                SHA-256:939C1DA1C4ED3E97227CFC94D46BACDFBBB8D2BFF721EC42618B641DB731AD3D
                                                                                                SHA-512:EADBC62801B0D5ABA4B9A2BBDF469F007493FE613E04B640AA511383A4E3D707AC0ADCFF3E5D80F1598090E12CD65C5985DFCDF0CF8D46AF807BAD00204182CC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/FMlln:SBtkJ1li6gml/K/n
                                                                                                MD5:C34486D88A5544F3392A4FB031ECA28C
                                                                                                SHA1:287AE38B9011FD9BF97FAC414B405F1748B748FB
                                                                                                SHA-256:F7835F43B81AF073E115DCDBDD71E6D274C476853FFE6BEFCFF4A6DD26E02CC6
                                                                                                SHA-512:DD334E26082CD5F5B9CF2DD581930DB2DCFC8AE136FEA02B0A7E8376BAA2C0582236086C7D973A84C14EB3F873C6F540E70FE65917D757C6FA630E56CD780C35
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................91ci........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):172
                                                                                                Entropy (8bit):3.7784798679943252
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tl9e8Crlas08lLQHptizlu7giN/+k/Fshgp9kD//UlAjW/lKxfn:Svc8CrqqQJEz8xtNT0//UijWAxf
                                                                                                MD5:9D9B9C544D250F573B187FA20A37FAB6
                                                                                                SHA1:16C2B4227D4A969E336292B2A9C3A23A51BD9505
                                                                                                SHA-256:8423C2E865B10BB622270AB95F80F6F2D34FF4B4F3F828B0EEA928EB8757CE47
                                                                                                SHA-512:2928C40A6F35EE175EADBB4B96DD26965DC7C23243740DD4A96E0679DD4D9586549625405265B4CCF6B80FE575B6DDC46B4ADB53A181B1173C3DBA52F7493F39
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........#...#...............91ci......3...:.....5.:.......:.......d....P..D....P....J......P... ... ..D....P....... ......m....`... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):58416
                                                                                                Entropy (8bit):5.816633436992908
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:+RaWSN/Ixeb7VZNw5/sWK7O+HQe9l3YFFonJ0QhPxjK+Kv2:CMfVZa0Oyl3hnhPxu72
                                                                                                MD5:DEDDFC6884799EFF970AD3809557DCC8
                                                                                                SHA1:E27755C52CD11323FC90AD094428904128B4CC72
                                                                                                SHA-256:75BF5DDADF3423305C40C67E09E8A38F1A10A912F9810D041966D8A86DB29BCB
                                                                                                SHA-512:A6ADFAA68355F35A699A274D155E876D754F57DEB5D3D3EAB31263D44ECC299FECA491C44C85E0D2FB4F756112111BD71563C22F5B1BB24ACA29CDE303BF6067
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........Nrm2................P...............................A...A.......P...vS......`...tJ...R..rS..........3irT.....<..[.....@.......?.......;.i.....".b.....!._.......C.........n.......-.k.......T.......K.......E.......A.~.....5.t.....3.r.....1.n.....,...g.......7.t....... .O.t.............................V.......L...l.......\.........[.......G.........C.......<.|.....<.|.....<.{.....;.{.....+.j.............9.y.............................................-.:...q.............K.g...... 0 ..p . . .!P!.!.!."P".".".#N#.#.#.$N$.$.$.%N%.%.%........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):92
                                                                                                Entropy (8bit):3.3283646412792995
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tluF3lElwqllERnySPikv:Sv6VMwfBySdv
                                                                                                MD5:7501CC41631B81BC6FA175B8963ACD70
                                                                                                SHA1:B04D289CE28F1842249549D378530F49C8765DC6
                                                                                                SHA-256:3B3D70E6FAC4E5CD85444CED64A6DD3A5C73680734524EB30B3C159C063DC389
                                                                                                SHA-512:1778AA289D567BDABA783CD651FC6A34E75E7F2F04BA28737EF3829574CCDC37D8811C602F1737E7DDAABE67CF305975B79B85E8146842CFA6E7C3E0303AA266
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...................................t.....o.w......`...P
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):920
                                                                                                Entropy (8bit):5.773106278693203
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:DMzq6TvMx06TvMsEAgbcusZhC//ooRQQXswrVorA8cs:ejMxrjMsvgb+C/o3QXhYATs
                                                                                                MD5:CAE16B5CBD28771099A3AA4BEE4BFF22
                                                                                                SHA1:B692625C2D3A2AFE65519F57B20235E7321AB332
                                                                                                SHA-256:199DA3398504CE87F971816F6F67D7505D7BE136BED8B5690E4E6845EF2CA3D6
                                                                                                SHA-512:D2CB5ABE1E38E121A66220A29DCEC48CCF52D068A2FB59FD85225EBC0158D51004DF99BFC8DECF530FCB8DBB4BE297E9687A7509C6083871C44C8C17A1727083
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................................I.n.u........)..k..)...4.wEy..................................!.$...0.............'./..4....eN>...D....L...3..].N..).P.M.N........."....."..k..)...4.wW*eh................................!.$...0.............'./..4....eN>...D....L...3..].N..).P.M.N..............u......."","B...........G.G.G.G.D.q.G.....|....mMm..=.1...M.e.E.A...I.).9.}...........e.w...............G.A..4D..4G.G.D.>.J.../.......................h.~.................H...@.........E............................5k....4............7.......P....... ...............P................................... ... ................................................... ... ....................... ..j.v.......".H.S...A...D...G...U..P... ... ... ... ....`...... ... ...........`...P......:.l..... ...a........ ...P...P...P...P...P...P...P...P...P......C...o.w.]........`...`...`... ...`... ...P...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMrEl0t6E7lZEKd4:SveM0t6gWK6
                                                                                                MD5:8E658E24E91577B14FB18BDC90A2E1C5
                                                                                                SHA1:2A12C0DF79A4B42F048C50BA66C942AAC4A256E8
                                                                                                SHA-256:829E57B045199BA2D82B08BAAE8107B9875C7A99488FF32E7C3E225EA16A8A67
                                                                                                SHA-512:EEED6686C5CA622DBEB27D18AC89606D55F759C8F450860ADC1D5AA956ABA14F5606AAEE7A173846E947B7274F6BE9CA039BF0838FEA8D1FAE08D2B6B0B386C3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):4032
                                                                                                Entropy (8bit):5.607182675392539
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:kPkUdmvpI+tIJhIIhsBy8+VvbH7cpIIcLHB9m2Sj:k4dEhIMI+VvbH7cfcLHBfs
                                                                                                MD5:C180EE0ABDE3EF986D6725617A964F34
                                                                                                SHA1:189E8D526AC80FF06E3C74AB1987D92C4E36F3F9
                                                                                                SHA-256:E59900C74EE25A80F80B7F2856B32E43F38F0F4FE61F0934FFDFB13E63E14D39
                                                                                                SHA-512:C7D4A98C3ECF00B1805A69C1251BA72AEB0DF4CBCAE0963C84804118E019452F002DD68A8825132C8B52A6AA326C52F2B5DB929F78B3F69F3174DD9FC3518FF7
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .5....................5..................2...............................................................................................................................................h.e.b.r.......................................................................................................[.. . ]............................................................................................................................................................. ............. ............................................................................................................................................................................................................................. ................. .........................................................................................E. ....... .d...................................................................................................{.0.}. ....... .{.1.}...d..... .M.M.M. .y. .G...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):4104
                                                                                                Entropy (8bit):5.602271383533896
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:wiOtFIxmiQWKpVH7XVSRerbMmgxmQhxxymTmFi:LOtFomRhpVTURSQJx7xxJ
                                                                                                MD5:8E47DD79C2A4902D3930DC926A72C4ED
                                                                                                SHA1:4BBFAA0586B10D12F86F2AD49B73768D7B733681
                                                                                                SHA-256:4F8716C2397705120536D220A3928B7D247596093E0EA78BFD75BA9A2CC908B6
                                                                                                SHA-512:6FDB3116278569AE835F5C6E9DB2993637536AD1F9E873294FF15D1AD2558DD7A0E134FF5E6A878D1406FC24398091BA87F84447ABA0E5BA90E889E590847F88
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .A..............-.....A........................................A.j.....t.........A.g...B.....K.e...O.w...k.......r.....g.....g.....k.....r...O.s.......n.......n.....H.:.m.......k...A.g.[...B...l...K.[.r...K.[.t...O.w.e.....g.b.....g.......k.........p.......w.......b.....d...n.....j.T.........l.a.....b...m...K.[.i.n...S.h.[.......r...l.....g.b.........p.[.......w.........b.i.......r.T.........s...n.......s.[.....H.:.m.:.s.....s.[...g.....j.T...b.....j.T...r...S.h.[...r.....j.[.t.a.....r.[...n.....j.T...b.T.....j.T...r.....W...k...t.......s.[...j.....d. .M.M. .y.....t.....n.l.a.....j.T... .A.j.......j.T... ...t.....o.s.h... .y.........j.T... .....k.....O.s.h... .B...l.....O.s.h... ...g.b.....O.s.h... ...g...n...T...s.[... .y.......T...d...n. .y.........d... .m.[...r.i.n...O.s.h... .A.g.[.m.T...O.s.h... .O.w.e.w.e...O.s.h... ...r...l.....O.s.h... ...k...d.u...O.s.h... .....p.[.....M.[...t...r.....k.......s.[...j... .....y.....O.s.h... .....w...r.....O.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.8046240823663435
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlgelU8gl8l/68Qal6lafWn:SBtkJZlU8g8l/FQal6lSW
                                                                                                MD5:D9A010B9AEDF260EF91085DC8FCA33BD
                                                                                                SHA1:9ED18250ECF83FCE98ED8B4063FB39760E482D54
                                                                                                SHA-256:A06E9211A0DC2D0BF324B9101CDDB0E90B9BAEA6A71F32E4C6E9E4008A93DF82
                                                                                                SHA-512:1BA88D77B55502E79340A8EA47DF6798A26B47332465056306754693468DA4564323C0CE919EE8E14A3D5BA959B041FDB5CDC289FCD83BEE1784F41597092300
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.................................y.u.e._.H.a.n.t._.H.K.........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM76E7lqt6Enln:Svi6gqttl
                                                                                                MD5:6A2BE9D9E2A53419CFDA1820DA3CDB60
                                                                                                SHA1:D9354DEA3AEB269C8DBEFFE2AA41FFCBBFA737B4
                                                                                                SHA-256:AFD2CC131926A8D03C35D770BDB2D2BB92EF2F3A02B7FEB4293BE1D69A1BCA2F
                                                                                                SHA-512:973DD278E08B0F787835BA45DCD4359B7AE587C9B151F304D127F1BDCC127ED098EAE6A72E11AD58E8A971BDCA339E8646C38DF04B111A8269152F7FBB9C52E8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..2....................2..............2
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1040
                                                                                                Entropy (8bit):5.389035174290986
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:fOHM7iiRd8YR4EzlqAIjI59gQ1EzlqAIzUzuUFYXcRUkC/5Qp6+EsF/jtL7qHwmz:3xhlbuqLelb7RZEFLX0srN
                                                                                                MD5:26B42AE469D40966DD8F593075E51DA3
                                                                                                SHA1:3877D9BE4348E3C9D6BCAB1EBCAD2C64BC21FCA9
                                                                                                SHA-256:0006536EAE7598E66586CDE3E411F7C519FC1C8A80A2B175248EC49064ABBCAC
                                                                                                SHA-512:C28EA9F75461721E93D14B8E662A00E91BBB2E3F6193EA6262C362BB1E6D44B3A64E545EF908FAEECADE6E3999221DC4684F1433167AA147DA90F01C2E78BF26
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .fl...................fl.........0.0.0..N.N..d./.M./.y...E.....E.,. .d./.M./.y.G.G.G.G.G.....J.il..J.hl..J.gl..J.il..J.hl..J.gl...P.PE#.C.].k.kb.................... ..`5J...elJ...elJ....P.PE#.C.].k.k.=....................!........4.N...E..{lvlyl.......B.B.................*....$....R.R.R..$..]....$....4.4.4...P.PE#.C.]K_K_c...................W.!....... ..4.N.E.4..N.ml.).4.......B.B.................*....$....R.R.R..$..]....$....4.4.4...P.PE#.C.].k.kb..............P.PE#.C.].k.kb...............!.. .L...P.PE#.C.].k.kb.................!.....F...J.....J..............P!..P$..P..7.... ........'..P*..P-..P..7.... ..*........ ... ....... ........0...>..P.....P.`.P.`E#.`.C.`C...F...I...:7.`...`...`...`...`...`..........I.M.P......... ...k..Pp..P...`s..Pv..Py..P...P...P......5.L...Z..P... ..I.M.P......... ......P...P...`...P...P...P...P...P......5........P... .......................P...............P........`.......... ... ... ... ... ... ... ...........P...P....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):4644
                                                                                                Entropy (8bit):5.7980756728475376
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:nD0t0AhbysgPLVmOxdcc/ggycFIc/G9kl9YZIFPzRucL+5:gaPf0mIX9kl9oyzM
                                                                                                MD5:2B6769071D3D531FA1C1B64BA54480E8
                                                                                                SHA1:43E33BEF27C95267C09760D1238260AE8B760BCB
                                                                                                SHA-256:1AAF0609F0DDF59FFB261FBFE754792B7F42584AD83DA818034A1F92334D851E
                                                                                                SHA-512:7651524903AA542D2FA23EFAFA078D3A5D18BD0EB22174A5C87539E3716539FE94E65D6365FF3CA13C01410E96A3EFA876DCCADF8C6BB90FA84DA72E1EA75A59
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................v.. ..{.............,......{..........e.N..Zf.N...Nt^...Nt^...Nc[...N.e..MR.e..._.e...f.e..(f.e...Nc[...Nc[..,g.f.g...N.f.g...N.f.g...f.g~^.....R.......P.\Bf..,g.f.g.N..,g.f.g.N..,g.f.g.N..,g.f.gmQ..,g.f.g.V..{.0.}.."..."{.0.}....].S.{4V..,g.f.g.N..,g.f.g.e...T.].{4V...N.N.{4V...T.N.{4V...T.S.{4V..+.{.0.}.Q...M..g,{W.1...Y.t^,{w.1...{.0.}..RMR..{.0.}..R._..{.0.}.t^._..{.0.}..eMR..{.0.}..e._..{.0.}..y._..G.y.t^.y.t^..d.-.M...E.....{.0.}..P.gMR..{.0.}..P.g._..{.0.}..\BfMR..{.0.}..\Bf._..{.0.}..f.gMR..{.0.}..f.g._..{.0.}..S{.1.}...{.0.}. ..f.gMR..{.0.}. ..f.g._..{.0.}.."{.1.}...G.y./.M..y./.M...d./.M. .. .d./.M...M./.y. .. .M./.y...U...r...t^M.M.M.d...d./.M./.y. .. .d./.M./.y...U...r...t^M.M.M.d.E.E.E.E...d./.M...E... .. .d./.M...E.....d./.M./.y...E... .. .d./.M./.y...E.......$./.<...*.7..|.|.|.|.|.|..J.m...J.....J.....J.q...J.....J.....J.]...J.....J.....J.U...J.....J.....J.n...J.....J.....J.r...J.....J.....J.^...J.....J.....J.V...J.....J.......!.y#
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.932307687640496
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMxEllut6E7lfEKU:SvMM0t6g8KU
                                                                                                MD5:F637999C3373220F35094AB85161AFBB
                                                                                                SHA1:24891E13D210B7E6B7D0053CBF5A945566F79938
                                                                                                SHA-256:EB0040ACAD7DE2A57E33A3AD90FB1711651A7FF071D21653A3B6BC7AA39CEC7B
                                                                                                SHA-512:D7B2CD72563F0A9015A2D3239D4660A3086262F633B680128B0B6F86C3AB8051838858133488768D9BD0D1DB97F64C4B61172A7F6F7556C8D2295DB48673708F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P...................................o...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):20600
                                                                                                Entropy (8bit):4.710087176621795
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:RO7EpdiGx3F9nkphQvEvnVrLfnGVrEBkRo70LoBO2oSm6:IMd9VY70L2Gi
                                                                                                MD5:618BF105AA359F19B795895062E8EF83
                                                                                                SHA1:A1765E32A5AF318306C5DDE3E535614B2ED6AD4F
                                                                                                SHA-256:1BB55FDC74E76E0D911DD8B54E2609D6340A943B1D22F7C902609F56400341CB
                                                                                                SHA-512:F2C669E19D67281CF396331F8145E12C928AAAF1D66252BFC0FFB599FAA666109207E94D489559DEC083DDDFF5146C29E395EAA80421194F574ECBAE72115611
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ."..............G.....".....n.pQ..K.i...f...P.a.a.s...W.e.n.e...A.s.o.r.e...K.a...r.o...P.a.r.y.s...P.r.a.a.g...R.i.a.a.d...S.e.o.e.l...B.e.r.l.y.n...D.o.e.b.a.i...K.a.b.o.e.l...B.r.o.e.n.e.i...K.a.a.i.m.a.n...K.a.n.a.r.i.e...K.a.r.t.o.e.m...S.a.r.a.t.o.f...W.a.r.s.k.o.u...{.0.}.-.t.y.d...A.p.i.a.-.t.y.d...D.j.a.k.a.r.t.a...D.j.i.b.o.e.t.i...H.o.v.d.-.t.y.d...I.r.a.n.-.t.y.d...K.a.r.a.t.s.j.i...K.u.b.a.-.t.y.d...M.a.l.e.d.i.v.e...M.a.t.a.-.U.t.u...N.i.u.e.-.t.y.d...O.m.s.k.-.t.y.d...P.e.r.u.-.t.y.d...A.s.o.r.e.-.t.y.d...C.h.i.l.i.-.t.y.d...C.h.i.n.a.-.t.y.d...C.h.u.u.k.-.t.y.d...D.a.v.i.s.-.t.y.d...F.i.d.j.i.-.t.y.d...G.l.a.c.e.b.a.a.i...G.o.o.s.e.b.a.a.i...J.a.p.a.n.-.t.y.d...K.a.t.m.a.n.d.o.e...N.a.u.r.u.-.t.y.d...N.e.p.a.l.-.t.y.d...P.a.l.a.u.-.t.y.d...S.a.m.o.a.-.t.y.d...S.i.n.g.a.p.o.e.r...S.y.o.w.a.-.t.y.d...T.o.n.g.a.-.t.y.d...A.l.a.s.k.a.-.t.y.d...A.n.a.d.y.r.-.t.y.d...E.i.l.a.n.d. .M.a.n...G.u.y.a.n.a.-.t.y.d...I.s.r.a.e.l.-.t.y.d...K.a.a.p.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.777864799965059
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
                                                                                                MD5:264C63861CEEF0E1A4CC72D014AA43FC
                                                                                                SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
                                                                                                SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
                                                                                                SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):28844
                                                                                                Entropy (8bit):4.8624824473043695
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:Wz7MIuz9Q0izAdzKn44TlqOXY7Ai4mtZ0ol:Wz7MIuz9f3clqOCAi/j
                                                                                                MD5:6B4CC9E2BB391A6C39697A2B1E13377B
                                                                                                SHA1:E6CABD5F2E9281181B6EFA60840D4970B20E2ED3
                                                                                                SHA-256:E8A040142868D625961515E2E34FBAD3A9D99B25F0FF732015789394FAD222A5
                                                                                                SHA-512:16B12CF835EB5285F2D2A3E216BA34A7FE1E5B651FFA645500EC72CD91B04F76257A3FDF037F9C4576AB26370416DCD732C0197A3AFF532F1C31BF4B70085342
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .lG.....#...#...C.....lG....n.pQ......................................................................................................................................................................................................................................... ............................................................................................................................................................................................................................................................................. ................................................................................................................................................................................................................. .................................................................................................................................... .....................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.777864799965059
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
                                                                                                MD5:264C63861CEEF0E1A4CC72D014AA43FC
                                                                                                SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
                                                                                                SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
                                                                                                SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.777864799965059
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
                                                                                                MD5:264C63861CEEF0E1A4CC72D014AA43FC
                                                                                                SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
                                                                                                SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
                                                                                                SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):25388
                                                                                                Entropy (8bit):4.821860981536896
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:2z/Z/Lz/7N1KKvdaKT5l93GOX038P+207S:2rBLr7N1KKvdaKT5l93GOX0CrN
                                                                                                MD5:9D84C23D88CD13DBA3F72AB07F044EFE
                                                                                                SHA1:A4FF53C3627F58FDC205417EA3C44E92F7B69337
                                                                                                SHA-256:2189E53495AFB7A728485A2290ACDBBEB667018398269728038384E5474464DE
                                                                                                SHA-512:B536FFA184DEBFAE23B12CB09B8B03BB8D02E807EE5B4BFEBA945BE1D1387C0811CE9C2E706D3C98DEFF1625363F0ED20F77794790872D401D9BD8C0C8E99275
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ...............G......T...n.p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
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):120
                                                                                                Entropy (8bit):3.627526768396092
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tl+OsB/pll9l/JlROlIlXqkxPlu9l13lPP6n:SvuOElROqhPlYY
                                                                                                MD5:2E73166BDB1D4DC461A53A884E7B63A6
                                                                                                SHA1:E25361BD9881C21155B512E85C4206BF5A68F166
                                                                                                SHA-256:B3C0A1262290D2DF85B304E0AA12A77AA2224BBC63482E290D4DBE2406B871CF
                                                                                                SHA-512:96F7FAEFE92AD8E8DEAA63439E9C72E1A2A548B89AD542C36E8B98DB5E60FE2BA46FA3E29EDC7318EEBE4D79255630B95AE44C4B9311079EFC82D347FB61290D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .S....................S.....n.pQ..X...b...|.B.f...T.....#.T........P........R..`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):17336
                                                                                                Entropy (8bit):5.139077167547189
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:BVzZjdzVQD/b39FrQWEX2bjkMCrUwt6m3XDTUZ:LzZ9C/b39aWrwfrUwgEfUZ
                                                                                                MD5:2018A278B686B8FAE3CED280A8DDB441
                                                                                                SHA1:7BF83B51BF064DE0239EC8184A7F52CB164BD937
                                                                                                SHA-256:4C3A0E1F66749F2E497666BEDA521505AFFFBFE4465EFC5D58E8B18DC6A5D9DD
                                                                                                SHA-512:C24935034297DF1FAC5311BEBDB633EC29F36ABDF89EA38E72909DD908FAC49796A9E62321A39F8415177101499382A210F7AF7306145D8F8F2F939F5D2AB2B7
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .L..............'.....L.....n.p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
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):51488
                                                                                                Entropy (8bit):4.166628682082664
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:dQR0ti9JsZ8vPJ94bvXvIAvGTvusv7r/v7gvUv7dv7hv7v7mv7zv7bv79v7kvUER:YPv9+3DV8h/N
                                                                                                MD5:A6177E4FDF9E69B2DD3BD46529563EB5
                                                                                                SHA1:92B44DD562E270E0B57AAC0753D53168E09B8401
                                                                                                SHA-256:DA18DAFE0470C119EBE9320B6C2FE3FB8D30AD6C82CCB2FFD1A73F6FD4B778AB
                                                                                                SHA-512:162D068518BAC2B432E7E43F362E325A9DC495D5E2F71845BDED8E1C73C086E8C45B711D831BA41D42EED2F1ECC40A661CD3138CC4C83CB6263D25C808309EE6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................<2. .lG.....@2..@2..B.....lG....n.pQ............................ .............(.............*............."...$...........................*.........&...,....."...(.........#...(.........%.......".....%...(...$.....&.....................3...".................4.............(... ............."...4.........1.......4.............-.............*....................."...4............. ...#.........(...".............*...#...(.........(...#...(.........*.......-.........%.......*.........*.......4.................4.........#.......*.........(.......(.........%.......*.........&...(... .................1.........#............."...........4.....#...*...%.........#...........,.....%...........-.....&..."..."...,...2...1...4.8...8.8.....#. ...........4.........(...........,.........,..."...*................."...#...4.............,..."...(.............*...#...4.............,.......4.............4.......#......... ...4...".............&...,.......4.........'...".......
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2344
                                                                                                Entropy (8bit):3.8096174694386007
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:U/lkGWXtKcRtKDYGkEpKsu8obAXIgAJKlzV5GrryVhV6qrYIoENlNrvxyZeZ9:Uj6TtKhr2AXvAJKrUvEj6OxNlN1yZeZ9
                                                                                                MD5:A331E7B5A5AE00C5919C939B726D8050
                                                                                                SHA1:927E89E14F00A69CCA0CC9C775F74BC620CD8C98
                                                                                                SHA-256:34A46FE41B98599E75A33B9C3262FC27D36D7CABEA4E180801475A5D824E00C0
                                                                                                SHA-512:11C5E425F00E0F7BBD767E66DE0F6292A7240348A5DA866C87F92BF8943FB1CD7B3E8175DC0BE99FF1F8628CF8F9C0F83A619B1A418F1AB045403D72B9C13373
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................>.. .lG.....B...B.........lG"...n.pQ..{.1.}. .{.0.}...T.a.g.-.i.n.i.t. .O.r.a.s. .{.0.}...S.u.k.d.a.n.a.n.g. .O.r.a.s. .{.0.}...W.a.l.a. .M.a.i.l.h.i.n.g. .S.i.y.u.d.a.d...N.o.r.t.e. .A.m.e.r.i.k.a. .S.u.k.d.a.n.a.n.g. .O.r.a.s...K.a.s.a.r.a.n.g.a.n.g. .O.r.a.s. .s.a. .G.r.e.e.n.w.i.c.h...N.o.r.t.e. .A.m.e.r.i.k.a. .O.r.a.s. .s.a. .P.a.s.i.p.i.k.o...N.o.r.t.e. .A.m.e.r.i.k.a. .O.r.a.s. .s.a. .S.i.d.l.a.k.a.n...N.o.r.t.e. .A.m.e.r.i.k.a. .O.r.a.s. .s.a. .A.t.l.a.n.t.i.k.o...N.o.r.t.e. .A.m.e.r.i.k.a. .O.r.a.s. .s.a. .K.a.b.u.k.i.r.a.n...T.a.l.i.w.a.l.a. .n.g.a. .O.r.a.s. .N.o.r.t.e. .A.m.e.r.i.k.a...K.o.o.r.d.i.n.a.d.o. .n.g.a. .U.n.i.b.e.r.s.o.h.a.n.o.n.g. .O.r.a.s...S.u.k.a.d.a.n.a.n.g. .O.r.a.s. .s.a. .K.a.s.a.d.p.a.n.o.n. .s.a. .E.u.r.o.p.a...S.u.k.d.a.n.a.n.g. .O.r.a.s. .s.a. .T.a.g.a.-.O.r.y.e.n.t.e. .s.a. .E.u.r.o.p.a...N.o.r.t.e. .A.m.e.r.i.k.a. .S.u.k.d.a.n.a.n.g. .O.r.a.s. .s.a. .P.a.s.i.p.i.k.o...O.r.a.s. .s.a. .K.a.s.a.d.p.a.n.o.n. .s.a. .E.u.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.777864799965059
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
                                                                                                MD5:264C63861CEEF0E1A4CC72D014AA43FC
                                                                                                SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
                                                                                                SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
                                                                                                SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):20012
                                                                                                Entropy (8bit):4.787487694159469
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:nqw4u2arR1dM+9zK+AbcRC9Iggzo7xePWBohrZw:nqluFq+8gS8M0Zw
                                                                                                MD5:EA14443A48A5785B950AF7DFF8058650
                                                                                                SHA1:AEB1E67A930670A0C7D22EEE0D4C7324D7919BA8
                                                                                                SHA-256:9EE65ACE547964B6B36ADF21BBDEDB156EA0FCC4962BB02DBC3DB6FE4F0B099E
                                                                                                SHA-512:004EBEE510F5D93AF0109698122286E556C4FD598BCF0901464530F081A4D06FAF6C80AAEF6161363C669864D2745FB777FEF4497031F5B67EDEAA037593BB62
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ."..............P.....".....n.pQ..A.c.r.e.-.t.i.d...A.p.i.a.-.t.i.d...A.z.o.r.e.r.n.e...F...r...e.r.n.e...H.o.v.d.-.t.i.d...N.i.u.e.-.t.i.d...O.m.s.k.-.t.i.d...P...s.k.e...e.n...C.h.u.u.k.-.t.i.d...C.o.m.o.r.e.r.n.e...D.a.v.i.s.-.t.i.d...J.u.l.e...e.r.n.e...L.a.n.g.a. .t.i.d...M.a.c.a.o.-.t.i.d...N.a.u.r.u.-.t.i.d...S.y.o.w.a.-.t.i.d...U.k.e.n.d.t. .b.y...V.a.t.i.k.a.n.e.t...A.l.a.s.k.a.-.t.i.d...A.n.a.d.y.r.-.t.i.d...B.h.u.t.a.n.-.t.i.d...I.r.a.n.s.k. .t.i.d...K.o.s.r.a.e.-.t.i.d...M.a.l.d.i.v.e.r.n.e...M.a.w.s.o.n.-.t.i.d...M.o.s.k.v.a.-.t.i.d...P.o.n.a.p.e.-.t.i.d...S.a.m.a.r.a.-.t.i.d...T.a.h.i.t.i.-.t.i.d...T.a.i.p.e.i.-.t.i.d...T.u.v.a.l.u.-.t.i.d...V.o.s.t.o.k.-.t.i.d...A.r.a.b.i.s.k. .t.i.d...A.r.m.e.n.s.k. .t.i.d...C.a.y.m.a.n...e.r.n.e...C.e.n.t.r.a.l.-.t.i.d...C.h.a.t.h.a.m.-.t.i.d...C.u.b.a.n.s.k. .t.i.d...E.a.s.t.e.r.n.-.t.i.d...G.a.m.b.i.e.r.-.t.i.d...I.r.k.u.t.s.k.-.t.i.d...J.a.k.u.t.s.k.-.t.i.d...J.a.p.a.n.s.k. .t.i.d...M.a.g.a.d.a.n.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):21760
                                                                                                Entropy (8bit):4.726886706277565
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:i9Br0QYulvmpDNbRbtaKN1CVxZ1DxZ3jIQ3ZhzbPbKdiimDXDnwqNTdYpxplFNMM:U5rv3GHrdPot2f
                                                                                                MD5:ABA4F91B8CBBD3EA505CA51DBE75FD05
                                                                                                SHA1:A580E14E2F768319440A12CC74A98814EBC6CAF6
                                                                                                SHA-256:DF20932397AE0BB6CBB84E5F9E561FC80432854BCFED82F24D1853EF11463F84
                                                                                                SHA-512:8C78D8A7164CAD53399F83DAC258772D222BA192C6DE21448C3C1968BCA2E332C1836B6E361352035AC2BB49D323098093270694E338FA8A5047915FE613A6A0
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................4.. ."......8...8...Q.....".....n.pQ..C.h.o.w.d...E.r.i.w.a.n...K.a.n.a.r.e.n...K.o.m.o.r.e.n...S.a.r.a.t.o.w...T.s.c.h.i.t.a...{.0.}. .Z.e.i.t...A.c.r.e.-.Z.e.i.t...A.p.i.a.-.Z.e.i.t...A.s.t.r.a.c.h.a.n...G.o.l.f.-.Z.e.i.t...G.u.a.m.-.Z.e.i.t...M.a.l.e.d.i.v.e.n...N.i.u.e.-.Z.e.i.t...O.m.s.k.-.Z.e.i.t...A.q.t.a.u.-.Z.e.i.t...C.a.s.e.y.-.Z.e.i.t...C.h.o.w.d.-.Z.e.i.t...C.h.u.u.k.-.Z.e.i.t...D.a.v.i.s.-.Z.e.i.t...M.a.c.a.u.-.Z.e.i.t...N.a.u.r.u.-.Z.e.i.t...O.s.t.e.r.i.n.s.e.l...P.a.l.a.u.-.Z.e.i.t...S.a.m.o.a.-.Z.e.i.t...S.y.o.w.a.-.Z.e.i.t...A.l.a.s.k.a.-.Z.e.i.t...A.l.m.a.t.y.-.Z.e.i.t...A.n.a.d.y.r. .Z.e.i.t...A.q.t...b.e.-.Z.e.i.t...A.z.o.r.e.n.-.Z.e.i.t...B.h.u.t.a.n.-.Z.e.i.t...G.u.y.a.n.a.-.Z.e.i.t...K.o.s.r.a.e.-.Z.e.i.t...M.a.w.s.o.n.-.Z.e.i.t...P.o.n.a.p.e.-.Z.e.i.t...R.e.y.k...j.a...v...k...S.a.m.a.r.a.-.Z.e.i.t...T.a.h.i.t.i.-.Z.e.i.t...T.a.i.p.e.h.-.Z.e.i.t...T.u.v.a.l.u.-.Z.e.i.t...W.o.s.t.o.k.-.Z.e.i.t...C.h.a.t.h.a.m.-.Z.e.i.t...F.i.d.s.c.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):252
                                                                                                Entropy (8bit):3.5570860102991015
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlt5lI/Illl/uolilS2Mks9ks9ks9ks9ks9ks9ks9ksajtrI+58SU9tIS:Sv5IgN2oli0NTTTTTTTyDuiEW1M5N
                                                                                                MD5:7410A2E68E5324871E29EF1CE1EC3358
                                                                                                SHA1:388E5B0078C343AA1608D47E27105FA1263D5728
                                                                                                SHA-256:4B3E8A2D4C07E0C906AFDF11DBBB3A471805BE44E6AF6C1234622B3F1D2AA09F
                                                                                                SHA-512:7312A8D7C021FFCB839FE5755EFDB8E42BDBFA6D316E9D4833A7EC5CABCAD5756BEC57153BCB6D82E3F5593A8A30B2F96238454B54D3208C13F114286E50F1EC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................3.. .g......7...7.........g.&...n.pQ................................................................................................................................1...d......P...P...P...P...P$..P+..P2..P........f..`&..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):152
                                                                                                Entropy (8bit):3.8192580345823637
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlE4lhxczDVclS2Mq8avn0PfxWwk7kllnI6AuifD+f:Sv/sO0Nnav0P8wk7kl6xVDO
                                                                                                MD5:0C71A5B9C2CC51F08C3649005BD1667B
                                                                                                SHA1:9508AE1734F0C95DC9156EC6CB02F95AE23F975F
                                                                                                SHA-256:478DA27ACF835FB1C483F4D821C89B3470B887FDEA6E5C6CA60D67D565981391
                                                                                                SHA-512:153C672F0D957ABE9E54BBDAC31FE3835E9BE0B67B79F10C60172F9CEADF7922EDAD51C4DCAC1869315719DC4CFFB0E9D7ABF15B43B8C88C4175C7DA3C852757
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .g....................g.....n.pQ..............................................A.U......P...P...P..^%.......`f..`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM4lzxlbkllMs:SvHjkss
                                                                                                MD5:7B933F365B0F6A04C6DB118E4A5C302E
                                                                                                SHA1:193D872892E0BE99BDEB813CF9BC6E6B9AE2022F
                                                                                                SHA-256:21EDA0DEA9E1F55F8E7A899B005526EA9D3D08E9338B7A57524E35C0D472D903
                                                                                                SHA-512:91C56392F9924F26BF28A803377B5EF517A3F4D0E5DDA3541C0A73BA33BCE1EC6B78B325C59B4DEFCCE830C4133E4BCAF118372067A5D9D05A0AC4E592D75980
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.g....................g.....n.pQ....^%....f.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM4lzxlbkllMs:SvHjkss
                                                                                                MD5:7B933F365B0F6A04C6DB118E4A5C302E
                                                                                                SHA1:193D872892E0BE99BDEB813CF9BC6E6B9AE2022F
                                                                                                SHA-256:21EDA0DEA9E1F55F8E7A899B005526EA9D3D08E9338B7A57524E35C0D472D903
                                                                                                SHA-512:91C56392F9924F26BF28A803377B5EF517A3F4D0E5DDA3541C0A73BA33BCE1EC6B78B325C59B4DEFCCE830C4133E4BCAF118372067A5D9D05A0AC4E592D75980
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.g....................g.....n.pQ....^%....f.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):3.165365317526889
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlu1YlM68tbROl1ylh+V/9hAlP:SvKYlf8tROCl0WlP
                                                                                                MD5:2CBAA3E01A9CE225D0451E1F176E8F75
                                                                                                SHA1:05D436146BAD0B3926378FDA4143A3B19DC43B22
                                                                                                SHA-256:5FF27D8579BA400E855094F67D72E3DC577F68C734D6F3F57F510F7BC246DAAB
                                                                                                SHA-512:EF946D17BC1E6EF198E2A39BD61303DC0A147BFAB62C3B199EA6AB5D72B4D22232A34B5273C51EB9BA7730BF190CCD12B88EADFA4BCD37D666B9BEED2E3B232E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.\....................\.....n.pQ..2...1...4.8...5.0.....^%..[.].
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM4lzxlbkllMs:SvHjkss
                                                                                                MD5:7B933F365B0F6A04C6DB118E4A5C302E
                                                                                                SHA1:193D872892E0BE99BDEB813CF9BC6E6B9AE2022F
                                                                                                SHA-256:21EDA0DEA9E1F55F8E7A899B005526EA9D3D08E9338B7A57524E35C0D472D903
                                                                                                SHA-512:91C56392F9924F26BF28A803377B5EF517A3F4D0E5DDA3541C0A73BA33BCE1EC6B78B325C59B4DEFCCE830C4133E4BCAF118372067A5D9D05A0AC4E592D75980
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.g....................g.....n.pQ....^%....f.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.040932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM4lzxlbkllMEn:SvHjksE
                                                                                                MD5:2D23AF6F7FE7AE532F9E762BFE487A5C
                                                                                                SHA1:4742A78FC6D26E800814510D71749A05DA578C97
                                                                                                SHA-256:E9F6EF5729737BBD2236826FF878786D5009A6772997D0B363DAA04017BBF83E
                                                                                                SHA-512:03D2F1B5E1EDF75D120CBA0D19C5370FD34BC3000599B814B3D02519958E399BA61CE9CA98EC0798C7FC78C2F9FFABC488F0DB921537681F99163F0890122E77
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.g....................g.....n.pQ....^%..[.f.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):152
                                                                                                Entropy (8bit):3.855671533556861
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlE4lhxvlRkls02l2kv+PYJGD26kD9Gl19l1SMuifDkfn:Sv/3kaV+PYE26ksv9aMVDk
                                                                                                MD5:A2FECB24B478F9A9E53E5BD8CB82947B
                                                                                                SHA1:3EBA18A74E53BC95B39065AD1C229181284F3BDE
                                                                                                SHA-256:55D9048A31CCFB28F5DA7A418A221D2CF8D488DA50DC7A125A7BBB0EB7BD01B4
                                                                                                SHA-512:69A04CF483233F71DFE3E3730A11E4A5E86B57946A3BC9BE823DCB7C5E0B3C26C771962242E226C82E8A72ABD29133E90DCC0AEFAFA2CEAB146ED4FB321439C1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .g....................g.....n.pQ..............................%.%.....|............P...P...P...P..^%.......`f..`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.040932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM4lzxlbkllMEn:SvHjksE
                                                                                                MD5:2D23AF6F7FE7AE532F9E762BFE487A5C
                                                                                                SHA1:4742A78FC6D26E800814510D71749A05DA578C97
                                                                                                SHA-256:E9F6EF5729737BBD2236826FF878786D5009A6772997D0B363DAA04017BBF83E
                                                                                                SHA-512:03D2F1B5E1EDF75D120CBA0D19C5370FD34BC3000599B814B3D02519958E399BA61CE9CA98EC0798C7FC78C2F9FFABC488F0DB921537681F99163F0890122E77
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.g....................g.....n.pQ....^%..[.f.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):604
                                                                                                Entropy (8bit):4.308950039805167
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:rTOEqgfVyWUfTFs2RCoa5ndJaNO+ntJaNO+n0KJaNO+nPIRav0PLA4zZFMVxJ:2fBsDxSAC18aELA4gf
                                                                                                MD5:69DEA09287AFAC41CDF3D43CA243C040
                                                                                                SHA1:27B28E0A97C9EE44DA281BCCAF4D7C10A716387F
                                                                                                SHA-256:BEA763868037715A0F573BA746AA4C3252187058D7CB922913BA808C9ADAF0F4
                                                                                                SHA-512:03D1E92ABD64AF15C20D9B698EB840D2CA34CD600A494053EAD4888B398F5DAA816FF7F64D7B2D8B542DE9D57071160DB193B32F0843715EC611E55A4751D99B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................v...n.pQ..B.S.T...S.t. .K.i.t.t.s...S.t. .L.u.c.i.a...S.t. .H.e.l.e.n.a...S.t. .J.o.h.n.. s...S.t. .T.h.o.m.a.s...S.t. .V.i.n.c.e.n.t...S.t. .P.i.e.r.r.e. .&. .M.i.q.u.e.l.o.n. .T.i.m.e...S.t. .P.i.e.r.r.e. .&. .M.i.q.u.e.l.o.n. .D.a.y.l.i.g.h.t. .T.i.m.e...S.t. .P.i.e.r.r.e. .&. .M.i.q.u.e.l.o.n. .S.t.a.n.d.a.r.d. .T.i.m.e.....#.[K..#.....#.....#.....#.....#.....#.............5..w..................................................5.......................I...A.U...."...P...P...P...P...P...P...P...P...P...P...P...P...P..^%.......`T".`v..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM4lzxlbkllMs:SvHjkss
                                                                                                MD5:7B933F365B0F6A04C6DB118E4A5C302E
                                                                                                SHA1:193D872892E0BE99BDEB813CF9BC6E6B9AE2022F
                                                                                                SHA-256:21EDA0DEA9E1F55F8E7A899B005526EA9D3D08E9338B7A57524E35C0D472D903
                                                                                                SHA-512:91C56392F9924F26BF28A803377B5EF517A3F4D0E5DDA3541C0A73BA33BCE1EC6B78B325C59B4DEFCCE830C4133E4BCAF118372067A5D9D05A0AC4E592D75980
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.g....................g.....n.pQ....^%....f.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):152
                                                                                                Entropy (8bit):3.855671533556861
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlE4lhxvlRkls02l2kv+PYJGD26kD9Gl19l1SMuifDkfn:Sv/3kaV+PYE26ksv9aMVDk
                                                                                                MD5:A2FECB24B478F9A9E53E5BD8CB82947B
                                                                                                SHA1:3EBA18A74E53BC95B39065AD1C229181284F3BDE
                                                                                                SHA-256:55D9048A31CCFB28F5DA7A418A221D2CF8D488DA50DC7A125A7BBB0EB7BD01B4
                                                                                                SHA-512:69A04CF483233F71DFE3E3730A11E4A5E86B57946A3BC9BE823DCB7C5E0B3C26C771962242E226C82E8A72ABD29133E90DCC0AEFAFA2CEAB146ED4FB321439C1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .g....................g.....n.pQ..............................%.%.....|............P...P...P...P..^%.......`f..`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):252
                                                                                                Entropy (8bit):3.5570860102991015
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlt5lI/Illl/uolilS2Mks9ks9ks9ks9ks9ks9ks9ksajtrI+58SU9tIS:Sv5IgN2oli0NTTTTTTTyDuiEW1M5N
                                                                                                MD5:7410A2E68E5324871E29EF1CE1EC3358
                                                                                                SHA1:388E5B0078C343AA1608D47E27105FA1263D5728
                                                                                                SHA-256:4B3E8A2D4C07E0C906AFDF11DBBB3A471805BE44E6AF6C1234622B3F1D2AA09F
                                                                                                SHA-512:7312A8D7C021FFCB839FE5755EFDB8E42BDBFA6D316E9D4833A7EC5CABCAD5756BEC57153BCB6D82E3F5593A8A30B2F96238454B54D3208C13F114286E50F1EC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................3.. .g......7...7.........g.&...n.pQ................................................................................................................................1...d......P...P...P...P...P$..P+..P2..P........f..`&..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):152
                                                                                                Entropy (8bit):3.855671533556861
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlE4xvlHtqls02l2kv+PYJGD26kD9Gl19l1SMuif5OF3Nn:SvPtqaV+PYE26ksv9aMV5MN
                                                                                                MD5:584B7ED10634A00ED0E4F58E9404CD0F
                                                                                                SHA1:F167A677FBC727A61D5AC6A326CF1F2EAA8E6073
                                                                                                SHA-256:D3E4B494D598C2C08DCDBB9379B164C95158BB673AAE0AD789124F46170937F3
                                                                                                SHA-512:F32C2E4FD559487D4B3E8A67392D5989EC99212453E1AFA2DCBBD22AB69C3E21C589790653D357A5C048C670E2961A1810AF3718823038BA9523164478468D0E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .]....................].....n.pQ..............................%.%.....|............P...P...P...P..^%.......`\..`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMqxlVtqllMe:SvDtqse
                                                                                                MD5:7C270F310229B7A3BCEABD9AE3BE08B8
                                                                                                SHA1:B4FB1A986654111BEAA667E79A6EE7EFD3958C21
                                                                                                SHA-256:A865EC010C2680B1674F3F258F1AFF7A401E7ED6459F98C0699287FC05B8C520
                                                                                                SHA-512:1967B7F33051C0E665CDE999BF594921BA1376017895E2CD74B3863D8704BEABE9CB4D7E44BE46C038225A24C205A31310198682885E8BC7A14575860C5CC988
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.]....................].....n.pQ....^%....\.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMqxlVtqllMe:SvDtqse
                                                                                                MD5:7C270F310229B7A3BCEABD9AE3BE08B8
                                                                                                SHA1:B4FB1A986654111BEAA667E79A6EE7EFD3958C21
                                                                                                SHA-256:A865EC010C2680B1674F3F258F1AFF7A401E7ED6459F98C0699287FC05B8C520
                                                                                                SHA-512:1967B7F33051C0E665CDE999BF594921BA1376017895E2CD74B3863D8704BEABE9CB4D7E44BE46C038225A24C205A31310198682885E8BC7A14575860C5CC988
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.]....................].....n.pQ....^%....\.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMqxlVtqllMe:SvDtqse
                                                                                                MD5:7C270F310229B7A3BCEABD9AE3BE08B8
                                                                                                SHA1:B4FB1A986654111BEAA667E79A6EE7EFD3958C21
                                                                                                SHA-256:A865EC010C2680B1674F3F258F1AFF7A401E7ED6459F98C0699287FC05B8C520
                                                                                                SHA-512:1967B7F33051C0E665CDE999BF594921BA1376017895E2CD74B3863D8704BEABE9CB4D7E44BE46C038225A24C205A31310198682885E8BC7A14575860C5CC988
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.]....................].....n.pQ....^%....\.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):152
                                                                                                Entropy (8bit):3.855671533556861
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlE4xvlHtqls02l2kv+PYJGD26kD9Gl19l1SMuif5OF3Nn:SvPtqaV+PYE26ksv9aMV5MN
                                                                                                MD5:584B7ED10634A00ED0E4F58E9404CD0F
                                                                                                SHA1:F167A677FBC727A61D5AC6A326CF1F2EAA8E6073
                                                                                                SHA-256:D3E4B494D598C2C08DCDBB9379B164C95158BB673AAE0AD789124F46170937F3
                                                                                                SHA-512:F32C2E4FD559487D4B3E8A67392D5989EC99212453E1AFA2DCBBD22AB69C3E21C589790653D357A5C048C670E2961A1810AF3718823038BA9523164478468D0E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .]....................].....n.pQ..............................%.%.....|............P...P...P...P..^%.......`\..`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):152
                                                                                                Entropy (8bit):3.855671533556861
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlE4xvlHtqls02l2kv+PYJGD26kD9Gl19l1SMuif5OF3Nn:SvPtqaV+PYE26ksv9aMV5MN
                                                                                                MD5:584B7ED10634A00ED0E4F58E9404CD0F
                                                                                                SHA1:F167A677FBC727A61D5AC6A326CF1F2EAA8E6073
                                                                                                SHA-256:D3E4B494D598C2C08DCDBB9379B164C95158BB673AAE0AD789124F46170937F3
                                                                                                SHA-512:F32C2E4FD559487D4B3E8A67392D5989EC99212453E1AFA2DCBBD22AB69C3E21C589790653D357A5C048C670E2961A1810AF3718823038BA9523164478468D0E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .]....................].....n.pQ..............................%.%.....|............P...P...P...P..^%.......`\..`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):152
                                                                                                Entropy (8bit):3.855671533556861
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlE4xvlHtqls02l2kv+PYJGD26kD9Gl19l1SMuif5OF3Nn:SvPtqaV+PYE26ksv9aMV5MN
                                                                                                MD5:584B7ED10634A00ED0E4F58E9404CD0F
                                                                                                SHA1:F167A677FBC727A61D5AC6A326CF1F2EAA8E6073
                                                                                                SHA-256:D3E4B494D598C2C08DCDBB9379B164C95158BB673AAE0AD789124F46170937F3
                                                                                                SHA-512:F32C2E4FD559487D4B3E8A67392D5989EC99212453E1AFA2DCBBD22AB69C3E21C589790653D357A5C048C670E2961A1810AF3718823038BA9523164478468D0E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .]....................].....n.pQ..............................%.%.....|............P...P...P...P..^%.......`\..`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):152
                                                                                                Entropy (8bit):3.855671533556861
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlE4xvlHtqls02l2kv+PYJGD26kD9Gl19l1SMuif5OF3Nn:SvPtqaV+PYE26ksv9aMV5MN
                                                                                                MD5:584B7ED10634A00ED0E4F58E9404CD0F
                                                                                                SHA1:F167A677FBC727A61D5AC6A326CF1F2EAA8E6073
                                                                                                SHA-256:D3E4B494D598C2C08DCDBB9379B164C95158BB673AAE0AD789124F46170937F3
                                                                                                SHA-512:F32C2E4FD559487D4B3E8A67392D5989EC99212453E1AFA2DCBBD22AB69C3E21C589790653D357A5C048C670E2961A1810AF3718823038BA9523164478468D0E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .]....................].....n.pQ..............................%.%.....|............P...P...P...P..^%.......`\..`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMqxlVtqllMe:SvDtqse
                                                                                                MD5:7C270F310229B7A3BCEABD9AE3BE08B8
                                                                                                SHA1:B4FB1A986654111BEAA667E79A6EE7EFD3958C21
                                                                                                SHA-256:A865EC010C2680B1674F3F258F1AFF7A401E7ED6459F98C0699287FC05B8C520
                                                                                                SHA-512:1967B7F33051C0E665CDE999BF594921BA1376017895E2CD74B3863D8704BEABE9CB4D7E44BE46C038225A24C205A31310198682885E8BC7A14575860C5CC988
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.]....................].....n.pQ....^%....\.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.8041805894387437
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMr/66E7l7cls/DDn:Svq/66gQa/fn
                                                                                                MD5:093DE8623D6D1F9CDF81286A210EE1CC
                                                                                                SHA1:55B4F15F11A4CAC5916D97F1DFD223D44F3A3F0F
                                                                                                SHA-256:7A99245469289DB8E7452AF32179CF9FFA12DE7FA65536A9481E0C78C7F847AC
                                                                                                SHA-512:A00DDD2FFF9C37BF986872735ED3FB16B3642D898C4E4D221F981EBEE7D1A283ACF8C17ED459FF81F9F419B3FB4CB505A9D36355FF6071E93998F79F3E598FFB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..&....................&....n.pQ.......&
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):22764
                                                                                                Entropy (8bit):4.579134794988456
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:8HI6wYEKPUC+AV0C9PcvycIIBV7+I25bA5Bo+jEypRlJd:8orpK8C+AVD0/j+I2ZALBRLd
                                                                                                MD5:E85C8E73BEA1878FB4B139F5B262E02C
                                                                                                SHA1:9D78A14D78B95D2E5B093787DE493EC89A360CB3
                                                                                                SHA-256:7DD88943034DE7C1E70760FC9884C35D93B8781A8DEA2F9E04106EAB6C2AE046
                                                                                                SHA-512:6DB91F89F22EF5FE9E2BB4CC48581BCC72DA5F03480CCDD2968FABB15F56113DF90BE463F917350630D3029439D9BA1B2F64A4CCC0C6D6AA71E1C3E077C78039
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................/.. .D......3...3...P.....D.....n.pQ..A.d...n...D.a.c.a...A.r.g.e.l...B.e.l...n...B.i.s...u...C.h.i.t.....D.u.b...i...K...r.o.v...T.i.m.b.u...T...n.e.z...A.b.i.y...n...A.n...d.y.r...B.a.r...i.n...B.e.l.i.c.e...C.a.y.e.n.a...E.r.e.v...n...J.a.r.t...n...M.a.n.a.o.s...S.a.i.p...n...S.k.o.p.i.e...S...d.n.e.y...Y.a.m.e.n.a...Y.i.b.u.t.i...Z...r.i.c.h...A.s.j.a.b.a.d...B.a.r.n.a...l...C.o.m.o.r.a.s...C.u.r.a.z.a.o...S.a.r...t.o.v...T.a.s.k.e.n.t...Y.a.k.a.r.t.a...A.s.t.r.a.c...n...B.r.u.s.e.l.a.s...C.h.i.s.i.n...u...E.l. .C.a.i.r.o...E.s.t.a.m.b.u.l...H.o.n.o.l.u.l.....K.o.s.t.a.n...i...N.u.a.k.c.h.o.t...S.h.a.n.g.h...i...U.a.g.a.d.u.g.......z.h.g.o.r.o.d...J.e.r.u.s.a.l...n...U.l.i...n.o.v.s.k...Z.a.p.o.r.i.y.i.a.....m.s.t.e.r.d.a.m...G.r.a.n. .T.u.r.c.a...S.a.n.t.o. .T.o.m.....E.l. .V.a.t.i.c.a.n.o...I.s.l.a. .d.e. .M.a.n...I.s.l.a.s. .F.e.r.o.e...L.o.s. ...n.g.e.l.e.s...S.a.n.t.a. .E.l.e.n.a...H.o.r.a. .d.e. .A.c.r.e...h.o.r.a. .d.e. .F.i.y.i...h.o.r.a. .d.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):156
                                                                                                Entropy (8bit):3.8338907553219608
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlHFf/glull55Jcl2ktlxl/pl2lZkbOa+/Q6+ne8vSMQtfkbN:Sv5IUR5O4WqobO1o/HvH4f6N
                                                                                                MD5:0FB437D334430CBAA4931566E18477F5
                                                                                                SHA1:093E013BE25D6827C504669A333D5482ACDB0B82
                                                                                                SHA-256:E8DC00AC382773E5D86B3701B5B09289978D50CC0DD0CB4E6EF975F18129259B
                                                                                                SHA-512:24A49A68686E89B025C74E83D21FB4987C0711BB1C32432DD6FE11E6BD7BC26B50E6E7F2C1A3CE819A07E215DCE37F8BFC0341EAF40BEAC5697B4D75E3BF8AAC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .]....................].....n.pQ..W.A.R.T...W.A.R.S.T...........d._._.........c.^.^...i.x......P...P..^%...._..`\..`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):112
                                                                                                Entropy (8bit):3.382914428948526
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlrntbr5OllqZkg6tMMQtfkAN:SvrOakg6tx4fL
                                                                                                MD5:5ED6BE36E3AF9385F15F8C9A869F806C
                                                                                                SHA1:56F14B5F08AD95543A6AF2896D17397D1B2D5E75
                                                                                                SHA-256:61BB8B40B3585ABAF84250AAFB515305025821B362DD2E3865410235B7CDC74F
                                                                                                SHA-512:EAD67AA2CF5A350C3E7D3CE18E7502571BC4E64A7D517A983381CCF9ED0F3D41A731912B05F889AC4FD55B258A9822D179A9E9DAF4E8F2D1E1D3049D5FC5093D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .]....................].....n.pQ..B.O.T.......^...E....P..^%...._..`\..`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.040932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMqxlVtqllMk6:SvDtqsk6
                                                                                                MD5:10E40DF5115F3C4978DCE4DA2E0D6451
                                                                                                SHA1:BC28046E014F618395E2CCCCC316C17ED91DAA4A
                                                                                                SHA-256:876F59B33BA2CA4DFCB619BAE86DA6165DF4955B09EC4FC989BC4E8FD4F1DF89
                                                                                                SHA-512:00E5DF6097B58ACFEE5B47748856A95F4E0CD920AE9C33A4D6ED71425B1714E7F2DC6031FEBC5EC4CCF216A1E3E3CAB2A3950999DC8343B746EE20747DBCF6FF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.]....................].....n.pQ....^%.._.\.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):112
                                                                                                Entropy (8bit):3.4007715718056684
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlrntbr5OlgmZkgLsaMQtfkAN:SvrOOWkgm4fL
                                                                                                MD5:609E1049FBC3527EB61D51C82BC5333D
                                                                                                SHA1:B9A6E79053EB441328E6D474567069A99D264F26
                                                                                                SHA-256:0713312787DC30E6903ABED7D316D580C6427071FD16673E96621B446E9BA9D1
                                                                                                SHA-512:2421778496FBEFC0EA61C81DCBCE01B0E7EE6E9CFF3B116F7BC4AF0C67D0762013A91B392784CC3DD8E6FF72CF0696C9FB8C84464D5E499EBE21C63507D7139F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .]....................].....n.pQ..E.C.T.......^...4....P..^%...._..`\..`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.040932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMqxlVtqllMk6:SvDtqsk6
                                                                                                MD5:10E40DF5115F3C4978DCE4DA2E0D6451
                                                                                                SHA1:BC28046E014F618395E2CCCCC316C17ED91DAA4A
                                                                                                SHA-256:876F59B33BA2CA4DFCB619BAE86DA6165DF4955B09EC4FC989BC4E8FD4F1DF89
                                                                                                SHA-512:00E5DF6097B58ACFEE5B47748856A95F4E0CD920AE9C33A4D6ED71425B1714E7F2DC6031FEBC5EC4CCF216A1E3E3CAB2A3950999DC8343B746EE20747DBCF6FF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.]....................].....n.pQ....^%.._.\.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.040932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMqxlVtqllMk6:SvDtqsk6
                                                                                                MD5:10E40DF5115F3C4978DCE4DA2E0D6451
                                                                                                SHA1:BC28046E014F618395E2CCCCC316C17ED91DAA4A
                                                                                                SHA-256:876F59B33BA2CA4DFCB619BAE86DA6165DF4955B09EC4FC989BC4E8FD4F1DF89
                                                                                                SHA-512:00E5DF6097B58ACFEE5B47748856A95F4E0CD920AE9C33A4D6ED71425B1714E7F2DC6031FEBC5EC4CCF216A1E3E3CAB2A3950999DC8343B746EE20747DBCF6FF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.]....................].....n.pQ....^%.._.\.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):880
                                                                                                Entropy (8bit):5.1076431106135
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:GlO10lTlw0WelRWj7WUS8lQqqciigVWnz7mn:jvKUS8lDqjigVt
                                                                                                MD5:005590E5FD1DF5FB6ACFB74C1C32C1D7
                                                                                                SHA1:AAF654A259DC1C87D4325119284DBA3CE271D909
                                                                                                SHA-256:38F7EA608D52F4BD129ECF6E2963A1F443D7C2127C3DA0ABCAD0DA2972B27F19
                                                                                                SHA-512:7F6DB0B64B35B2EE656E9A58015006D27DC929EC3018C45E2CEEC9C4834DC27C9EA9B39C49E94C628C985DF7AD6CAB44C7D769E712CF7C47A06B98F765DA3B2C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ................%...........n.pQ..h.o.r.a. .d.e. .C.h.a.m.o.r.r.o...h.o.r.a. .d.e.l. .O.c...a.n.o. ...n.d.i.c.o...h.o.r.a. .d.e. .l.a.s. .i.s.l.a.s. .F...n.i.x...h.o.r.a. .u.n.i.v.e.r.s.a.l. .c.o.o.r.d.i.n.a.d.a...h.o.r.a. .d.e. .l.a.s. .i.s.l.a.s. .M.a.r.q.u.e.s.a.s.....#.....#.{G..#.....#.P!..#.M?..#.....#.....5.^...#.(7..#.....#.L7........\.............B...3.........R.,...........W...........5.............u.,.z.............#.....Hz........(.&.....5.....5.v|......5..........5....|....5.........5.............5.........5...........'.a.-...5./...5....5.x...5.....5.^|..5.F...5..]..5....5..n%.&...b.~...i.....................1.R...|...(.U.i.......d.... .!.!.!t"."%#+$w..Pz..P}..P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P...P..^%...._..`T".`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/lcls8l:SBtkJ1li6gml/qa0
                                                                                                MD5:4F880C5D6BDDF339F850A87F0DC7BE2D
                                                                                                SHA1:90F0E7728BF802B7E962DB8434D1C562705F0613
                                                                                                SHA-256:B175F94ED5CE958A83AAB63677471AA4C0B2EA04FABA7C42681A5AEAEF8E5530
                                                                                                SHA-512:C9FC5B2F71F055D42C8501AAAAF6E6B6C290A6018CF1CFCB993735A01868850D0B3C5EAAD3A611C80D456AF9319DCF1F20CE4A8A0DB54736BA8C8D7089B54144
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................n.pQ.....$..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.925547915629603
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/ql5DEMd4Pn:SBtkJYlU8g8l/qnEb
                                                                                                MD5:4167F884C4D893D3C4CF676EBA59ECCC
                                                                                                SHA1:F9BB765CDD97565E7F27DA2D29F5595E726EAF43
                                                                                                SHA-256:6FA9F3809A63EB8495058651296095C1F448FE0E626FD8E3C20A4BF21C92A818
                                                                                                SHA-512:E1172C023E0EFD679E505BB795D215705B78CBF938A3336E06A934D9645CAC47C070BDAB5C2C7F149209D3B2D9F7908F2851EAA8CEDADADF31C1292A178385D6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................n.pQ..f.f._.L.a.t.n._.S.N......$....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):22340
                                                                                                Entropy (8bit):4.587445833031727
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:09ChQS+N9XABGt8yG5QTvv5s6VPGvf31g6Ii778bUys79S2djA3A15BP/s6iIdxv:mV8h2FJwUcdeY00rF
                                                                                                MD5:90127A7DF92278761613D2C5C269506F
                                                                                                SHA1:4749C60F9BF1B69E2C70484627B2303BCB4E4925
                                                                                                SHA-256:48E2BABC11DBD696B4C9E73548576F5A4F28FCF7D50A3BC97CA0AB065E2FB8C8
                                                                                                SHA-512:19F38EB9D1EBD934E20820A06B19DA8D6AC6F1197FDF084A52C1C357F7B107432EFCAB62DF2C833F150DF07A4DEF2E1BFF2AD62A8368CDB9CA67D2A256C627B2
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ."..............Q.....".K...n.pQ..A.q.t.a.w...K.i.o.v.a...R.i.i.k.a...T.a.i.t.a...A.t.e.e.n.a...A.t.1.r.a.w...A.z.o.r.i.t...L.o.n.t.o.o...A.a.g.a.b.a.t...B.r.y.s.s.e.l...G.o.d.t.h...b...H.a.n.d.y.g.a...K.o.m.o.r.i.t...M.o.s.k.o.v.a...P.a.r.i.i.s.i...V.a.r.s.o.v.a...B.e.r.l.i.i.n.i...C.h.i._.i.n...u...D.a.m.a.s.k.o.s...M.a.n.s.a.a.r.i...T.a.l.l.i.n.n.a...T.u.k.h.o.l.m.a...F...r.s.a.a.r.e.t...T.a.o.i.b.a.l.s.a...V.a.t.i.k.a.a.n.i...A.c.r.e.n. .a.i.k.a...A.p.i.a.n. .a.i.k.a...J.o.u.l.u.s.a.a.r.i...M.a.l.e.d.i.i.v.i.t...N.i.u.e.n. .a.i.k.a...P.e.r.u.n. .a.i.k.a...W.a.k.e.n. .a.i.k.a...t.u.n.t.e.m.a.t.o.n...+.H...m.m.;.-.H...m.m...C.a.s.e.y.n. .a.i.k.a...C.h.i.l.e.n. .a.i.k.a...F.i.d.~.i.n. .a.i.k.a...G.u.a.m.i.n. .a.i.k.a...H.o.v.d.i.n. .a.i.k.a...I.n.t.i.a.n. .a.i.k.a...I.r.a.n.i.n. .a.i.k.a...K.i.i.n.a.n. .a.i.k.a...K.o.r.e.a.n. .a.i.k.a...K.u.u.b.a.n. .a.i.k.a...M.a.c.a.o.n. .a.i.k.a...N.a.u.r.u.n. .a.i.k.a...O.m.s.k.i.n. .a.i.k.a...P.a.l.a.u.n. .a.i.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):20800
                                                                                                Entropy (8bit):4.655454957739464
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:scfinzfe5eIM4X0KsnaJWHro751BOIoNofTh:Xfuq5P0N6
                                                                                                MD5:C3330C381F55DB8725E606C466ED6A20
                                                                                                SHA1:85FE864A063EAE8C6A30B6920946E367D94ADC6C
                                                                                                SHA-256:A24C3C66C245EBFAD7E92205CFDF50F1F91ED978CA8D2B03BCDA636C8BC3A92D
                                                                                                SHA-512:B9F09B877013A8FCE6F5AF98AE3F5132BD78254ECB16075839804BBD52E9F8C881AC0B3D82BFB57993E998D4D1D7F931508431920045A8195B327E2FBB39536E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................D.. ."......H...H...H.....".....n.pQ..O.r.a.s. .s.a. .G.u.l.f...O.r.a.s. .s.a. .N.i.u.e...O.r.a.s. .s.a. .C.h.u.u.k...O.r.a.s. .s.a. .D.a.v.i.s...O.r.a.s. .s.a. .N.a.u.r.u...O.r.a.s. .s.a. .N.e.p.a.l...O.r.a.s. .s.a. .P.a.l.a.u...O.r.a.s. .s.a. .S.y.o.w.a...O.r.a.s. .s.a. .A.n.a.d.y.r...O.r.a.s. .s.a. .G.u.y.a.n.a...O.r.a.s. .s.a. .K.o.s.r.a.e...O.r.a.s. .s.a. .M.a.w.s.o.n...O.r.a.s. .s.a. .P.o.n.a.p.e...O.r.a.s. .s.a. .S.a.m.a.r.a...O.r.a.s. .s.a. .T.a.h.i.t.i...O.r.a.s. .s.a. .T.u.v.a.l.u...O.r.a.s. .s.a. .V.o.s.t.o.k...O.r.a.s. .s.a. .B.o.l.i.v.i.a...O.r.a.s. .s.a. .E.c.u.a.d.o.r...O.r.a.s. .s.a. .G.a.m.b.i.e.r...O.r.a.s. .s.a. .M.y.a.n.m.a.r...O.r.a.s. .s.a. .R.e.u.n.i.o.n...O.r.a.s. .s.a. .R.o.t.h.e.r.a...O.r.a.s. .s.a. .T.o.k.e.l.a.u...S.a.m.a.r.a. .D.a.y.l.i.g.h.t...S.e.n.t.r.a.l. .n.a. .O.r.a.s...O.r.a.s. .s.a. .M.a.l.a.y.s.i.a...O.r.a.s. .s.a. .M.a.l.d.i.v.e.s...O.r.a.s. .s.a. .P.i.t.c.a.i.r.n...O.r.a.s. .s.a. .S.u.r.i.n.a.m.e...L.u.n.g.s.o.d. .
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/lcls8l:SBtkJ1li6gml/qa0
                                                                                                MD5:4F880C5D6BDDF339F850A87F0DC7BE2D
                                                                                                SHA1:90F0E7728BF802B7E962DB8434D1C562705F0613
                                                                                                SHA-256:B175F94ED5CE958A83AAB63677471AA4C0B2EA04FABA7C42681A5AEAEF8E5530
                                                                                                SHA-512:C9FC5B2F71F055D42C8501AAAAF6E6B6C290A6018CF1CFCB993735A01868850D0B3C5EAAD3A611C80D456AF9319DCF1F20CE4A8A0DB54736BA8C8D7089B54144
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................n.pQ.....$..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):18660
                                                                                                Entropy (8bit):4.849465373321238
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:J+zx2cNQ1oDZlmaxxrjoV4hZ+0fmuoo7SNRBOzb5a:QzHasx1hc0eEek9a
                                                                                                MD5:DBD5BB81EB3D90797262E6A56192A213
                                                                                                SHA1:F5741F88935D6293C8798889422631224A16678B
                                                                                                SHA-256:F4C36BE13BE6DA0D8C17FFA80B921B56811BCB23C0FFA010B2552E4B8A392D16
                                                                                                SHA-512:28924EC658702AA6A67855E1FFE422D88E97B7E1638B5B0BD02D28883BA6E9140882A3920E80AC370600EB39D8D1BE0690608F4F17184554985AF2666F5E4833
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................-.. ."......1...1...D.....".....n.pQ..G.a.s.a...B.e.l.i.s...B.a.r.e.i.n...K.u.v.a.i.t...F...r.o.y.a.r...{.0.}. .t.......2...1...4.8...9...A.p.i.a. .t.......C.u.b.a. .t.......F.i.j.i. .t.......H.o.v.d. .t.......I.r.a.n. .t.......K.i.l.i. .t.......K.i.n.a. .t.......M...r.i.t.i.u.s...N.i.u.e. .t.......O.m.s.k. .t.......P.e.r.u. .t.......S.i.n.g.a.p.o.r...V.a.r.s.j.a.v.a...A.z.o.r.u.r.n.a.r...B.u.t.a.n. .t.......C.h.u.u.k. .t.......D.a.v.i.s. .t.......I.n.d.i.a. .t.......J.a.p.a.n. .t.......K.o.r.e.a. .t.......N.a.u.r.u. .t.......N.e.p.a.l. .t.......P.a.l.a.u. .t.......S.a.m.o.a. .t.......S.t.o.k.k.h...l.m...S.y.o.w.a. .t.......T.o.n.g.a. .t.......V.a.t.i.k.a.n.i.....A.l.a.s.k.a. .t.......K.o.s.r.a.e. .t.......L.u.k.s.e.m.b.o.r.g...M.a.w.s.o.n. .t.......M.o.s.k.v.a. .t.......P.o.n.a.p.e. .t.......T.a.h.i.t.i. .t.......T.a.i.p.e.i. .t.......T.u.v.a.l.u. .t.......V.o.s.t.o.k. .t.........s.r.a.e.l. .t.......A.m.a.s.o.n.a. .t.......A.r.a.b.i.s.k. .t.......A.r.m.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):108
                                                                                                Entropy (8bit):3.3591523788867974
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlrg/slvl/U5OlGPl/bOk/tlllPPzf:SvEEPCOodTOirf
                                                                                                MD5:74B3A4A3E3DFDE9ADF9448221E5EA996
                                                                                                SHA1:7277F7B77A1AFB67ED204988FB6202C0E233A5D4
                                                                                                SHA-256:A15B59CAF06B44336F6E9046CECE35935500CC6F4851D0ECF624D46FA6E47C07
                                                                                                SHA-512:7FD4B0F078B3A9D9DF9BE0C37796E95B7E0E73D9755B91B65260273B474FEC5EA45BB2B255F6192CD935BA968ED9AC6CEA447BD80D6FDCEE141281CF6535738A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .]....................].....n.pQ..G.F.T.......^........P........\..`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):18016
                                                                                                Entropy (8bit):4.247675192624289
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:HiiGZC3fksmmNWnajJMKFoMGrCe13e8TasnhDUM38HkH7etCQnt+dNbuLgFD:gZC3MsfPjJvoZZ13LpDUM3NatBcdN+s
                                                                                                MD5:19BD6A30658D60EA527D4F961A1B12AB
                                                                                                SHA1:1D47EAEC4553CA76FD8DF9461186B3A49301A544
                                                                                                SHA-256:C4608EBB73A5A11413381D8C2887441A008880E4ED8C818F2B5A5E9FD8F5BCD6
                                                                                                SHA-512:4E1DBFF1201D74F76839CEEE382CD3E1FE28A75D22B58694020DFC2F227B55EF69ACC8FF6383EED7B997924F2924C25225D440BFAF0C0C57C50F22C4174C968A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................n.pQ..C.a...r.o...P.a.r.y.s...W.e.n.e.n...B.e.r.l.y.n...P.r.a.a.c.h...F.a.e.r...e.r...I.r.k.o.e.t.s.k...K.h.a.r.t.o.e.m...S.j.a.n.g.h.a.i...{.0.}.-.t.i.i.d...A.c.r.e.-.t.i.i.d...H.o.v.d. .t.i.i.d...O.m.s.k.-.t.i.i.d...A.q.t.a.u.-.t.i.i.d...D.a.v.i.s. .t.i.i.d...K.r.y.s.t.e.i.l...n...L.a.n.k.a.-.t.i.i.d...S.y.o.w.a. .t.i.i.d...A.l.a.s.k.a.-.t.i.i.d...A.n.a.d.y.r.-.t.i.i.d...A.q.t...b.e.-.t.i.i.d...A.z.o.r.e.n.-.t.i.i.d...M.a.w.s.o.n. .t.i.i.d...M.e.x.i.c.o.-.s.t.a.d...M.o.s.k.o.u.-.t.i.i.d...N.i.u.e.s.e. .t.i.i.d...P.e.a.s.k.e.e.i.l...n...P...r.t.o. .V.e.l.h.o...S.a.m.a.r.a.-.t.i.i.d...S...d.-.G.e.o.r.g.i.a...T.a.i.p.e.i. .t.i.i.d...V.o.s.t.o.k. .t.i.i.d...A.m.a.z.o.n.e.-.t.i.i.d...B.e.l.a.u.s.e. .t.i.i.d...C.e.n.t.r.a.l.-.t.i.i.d...C.h.a.t.h.a.m. .t.i.i.d...C.h.u.u.k.s.e. .t.i.i.d...E.a.s.t.e.r.n.-.t.i.i.d...F.a.t.i.k.a.a.n.s.t...d...F.i.j.y.s.k.e. .t.i.i.d...M.a.c.a.u.s.e. .t.i.i.d...M.a.g.a.d.a.n.-.t.i.i.d...P.a.s.i.f.i.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):23536
                                                                                                Entropy (8bit):4.669685317674906
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:73Lu4wf1udeaneyK9CxGoEvE6SAhIBCt90ebBolEyedX:vhCt90eNPX
                                                                                                MD5:1D5A90E0F1F1ACDD3BD85AF4B6F3C1EE
                                                                                                SHA1:22142B21B22F9C93F640B4409FC7B803BDB3433B
                                                                                                SHA-256:53ADFB0D48FD9D37CBAC5CA4D941C0810A23F2BC5D78F5EE9A3A9C801C2F048E
                                                                                                SHA-512:AEF2445D8D19DF2EB87EE6919BEA149801C0723A3A94EC5BBB1D9BD0EA9A1FDE57F7151AD493E3F03D17B6D3F4C3600CD23348E76D4C7FC170B3C09468F12C7E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ."..............Q.....".v...n.pQ..T.S.B...F...r.o...G...s.a...P.r...g...R.+.g.a...A.m.m...n...A.r...b.a...M.o.s.g.o...P.a.r.a.s...S.i.d.n.i...T.M.k.y.M...A.s.m.a.r.....B.e.i.r.b.h...K.a.r...c.+...T.e.h.r...n...U.a.l.l.a.s...B.a.g.h.d...d...C.a.i.m.e.a.n...I.n.u.u.v.i.k.....m. .A.c.r.e.....m. .A.p.i.a.....m. .C...b.a.....m. .F...d.i.....m. .G.u.a.m.....m. .H.o.v.d.....m. .N.i.u.e.....m. .O.m.s.k...A.i.n.t...o.g.a...A.n. .R...i.m.h...B.a.c.h.r.a.i.n...B.e.a.r.m...d.a...B.r...n.a.i.g.h...C.u.i.b.h...i.t...D.i.a.m.e.u.g.a...G.r.e.a.n...d.a...G.u.a.d.a.l.u.p...R.a.p.a. .N.u.i.....m. .A.q.t.a.u.....m. .C.h.u.u.k.....m. .L.a.n.c.a.....m. .P.e.a.r.......m. .T.o.n.g.a.....m. .N.a.b.h.r.u.....m. .P.a.l.a.b.h...A.n. ...i.t.h.n.e...A.n.g.u.i.l.l.i.a...D.e...r.s.a.i.d.h...G.l.a.s.b.a.i.d.h...I.e.r.u.s.a.l.a.m...M.a.i.r.t.i.n.i.c...M.a.n.g.a.r.e.v.a...N.. D.j.a.m...n.a.....m. .A.l.a.s.k.a.....m. .A.l.m.a.t.y.....m. .A.n.a.d.y.r.....m. .A.q.t.o.b.e.....m. .B.u.t...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):25988
                                                                                                Entropy (8bit):4.446503866012001
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:u5yST56w65n40o84EGUShxiQuUm/EV02oohqma0gmgZ9CAfNs4AIU9Br2OgltJd0:+yZnME/cTBs9rc+g7LP7HBOc6DZ89AA
                                                                                                MD5:CCF25A2391B64C4046D7791E4E11157F
                                                                                                SHA1:46074795DA2FA6F0C93DF5CC5D56CA8C90330AE3
                                                                                                SHA-256:77343E3C760CF2036620E41EAD789434EB51ABBE77A2E408F5D694D04B5CF6C4
                                                                                                SHA-512:69A0AC93BADF5AE1371B5E19E4E1D07FCA661B4344AD88B4C2B0D02206925725547C78F36B804E6217713387F5008BBA7F9CC8E3BFD853B3AC73C7DD902C8FD0
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................U.. ."......Y...Y...G.....".....n.pQ..A.d...n...A.m...n...B.a.c.....B.a...a...A. .P.a.z...A.l.x.e.r...C.a.b.u.l...C.h.i.t.....T.u.n.e.s...A.n.t.i.g.a...B.a.m.a.c.o...L.u.s.a.c.a...O. .A.i...n...T.h.i.m.b.u...A. .R.i.o.x.a...I.a.c.a.r.t.a...I.e.r.e.v...n...K.h.a.r.t...n...O. .C.a.i.r.o...X.a.m.a.i.c.a...A. .H.a.b.a.n.a...A.s.t.r.a.k...n...B.r.u.x.e.l.a.s...H.o.n.o.l.u.l.....M.o.g.a.d.i.x.o...S.a.n. .T.o.m.....S.a.r.a.x.e.v.o.....z.h.g.o.r.o.d...A.c.h.k.h.a.b.a.d...H.e.l.s.i.n.q.u.i.....m.s.t.e.r.d.a.n...O. .S.a.l.v.a.d.o.r...O.s. ...n.x.e.l.e.s...R.e.i.q.u.i.a.v.i.k...I.l.l.a. .d.e. .M.a.n...P.o.r.t.o. .E.s.p.a...a...X.o.h.a.n.e.s.b.u.r.g.o...E.k.a.t.e.r.i.n.b.u.r.g.o...H.o.r.a.r.i.o. ...r.a.b.e...I.l.l.a.s. .C.a.n.a.r.i.a.s...H.o.r.a.r.i.o. .d.e. .A.p.i.a...H.o.r.a.r.i.o. .d.e. .C.u.b.a...H.o.r.a.r.i.o. .d.e. .H.o.v.d...H.o.r.a.r.i.o. .d.e. .I.r...n...H.o.r.a.r.i.o. .d.e. .N.i.u.e...H.o.r.a.r.i.o. .d.e. .O.m.s.k...H.o.r.a.r.i.o. .d.e.:. .{.0.}...H.o.r.a.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):148
                                                                                                Entropy (8bit):3.936161469353265
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlEO2oWvXclS2MYnES7OmaZ5UidlPPWFn:SvMoh0NYES7JaZ5UiS
                                                                                                MD5:F6DB885DC481ADA70E79194A29215141
                                                                                                SHA1:741D20DC95B0846BC02CA30D7FF386786E512A9B
                                                                                                SHA-256:EF63F894FB5F80380C15A01DB1055AD64DFC46E2FFED4E67DD5BF7139500B03E
                                                                                                SHA-512:CC4C87C80E6B392F70A4E20D322F5DB355AECD8E4168D30B42B7CDAD1F6FE9FC26231E691C3D472A7F6B39E5B8414993E61839CDEF003E313CA0B6339F4FC28E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .B....................B.....n.pQ..........\.............B...3.........'.a.-.......d....P...P...P........A..`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):25968
                                                                                                Entropy (8bit):4.822707727401076
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:qq8mZge/E56J9iDlQzdweTCeEgfVTNeZsBX/0hNcV17baYBO+bgnjiuDwax:wSq65dw+deGF0PcV1nHjbgjiaZx
                                                                                                MD5:35AC0062FF005B40EC596263CA6F3C5F
                                                                                                SHA1:B6B32C7416AD6AEFD47C46C5B478DA9D6E759817
                                                                                                SHA-256:91F3C3ADF2D70C618F06ECD7E34F415BA6CF657B2A8F4DB9163AFD4B5D73D2A8
                                                                                                SHA-512:F7C841B696F543376CF872C8DC45E0CF090D5D678EC61B5DCB45B97257246C5577AB74F8DED1CFE6B4418FCBA33A2ABA30CE42570DBE046E610A5714A1DD402D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................P.. ..!.....T...T...O......!....n.pQ....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):22940
                                                                                                Entropy (8bit):4.7178692801383635
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:1WCR2KVuwG9inxiEhkZgxP3smTWOXSm6iMJciPs80AQ5XwzgodBo4ngrBpJ:dQvbUIPv0BZEx2pJ
                                                                                                MD5:B42DB2CAFAF88E78FF00DF60C75942E2
                                                                                                SHA1:BC3D36A18CABBF2D64138DD6810D58EF84CF35BD
                                                                                                SHA-256:A0B6E0260665C7896725EAC8DB6A920348BA25257A7875EF7B21BD8DF97A0169
                                                                                                SHA-512:E63EB27D0C1A521A008842572F78E16FFB25B7AAAD1093885CC1A703EECA6DF2CB7776029EA47593FEE7C36F071E920C3675ED6355B58149B605A2D6585133B3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................[.. ."......_..._...Q.....".....n.pQ..B...c.s...G...z.a...R...m.a...T.r.u.k.....d.e.n...A.l.g...r...A.t.h...n...C.s.i.t.a...K.a.i.r.....M.a.k.a.....M...l.t.a...O.m.s.z.k...P.r...g.a...S.z...u.l...T.o.k.i.....V.a.r.s.....B.i.s.k.e.k...F.e.r...e.r...F.i.d.z.s.i...K.a.r.t...m...K.o.m.o.r.....K.u.v.a.i.t...M.a.l.a.b.....M.i.n.s.z.k...P...r.i.z.s...S.z...f.i.a...T.o.m.s.z.k...T.u.n.i.s.z...U.n.g.v...r...Z...g.r...b...A.s.g.a.b.a.t...B.e.l.g.r...d...E.l.-.A.j...n...J.e.r.e.v...n...K.a.r.a.c.s.i...K.u.c.s.e.n.g...M.a.g.a.d...n...M.o.s.z.k.v.a...P.h.e.n.j.a.n...P.o.z.s.o.n.y...S.a.n.g.h.a.j...S.z.a.m.a.r.a...T.a.s.k.e.n.t...V.o.s.z.t.o.k...{.0.}. .i.d.Q...A.c.r.e. .i.d.Q...B.r...s.s.z.e.l...D.z.s.i.b.u.t.i...I.r.k.u.t.s.z.k...J.a.k.u.t.s.z.k...S.z.a.h.a.l.i.n...S.z.a.r.a.t.o.v...T.b.i.l.i.s.z.i...a.r.a.b. .i.d.Q...A.s.z.t.r.a.h...n...I.s.z.t.a.n.b.u.l...K.a.m.c.s.a.t.k.a...K.o.s.z.t.a.n.a.j...L.i.s.s.z.a.b.o.n...S.z.a.r.a.j.e.v.....S.z.i.n.g.a.p...r...U.l...n.b.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):31400
                                                                                                Entropy (8bit):4.623794531707291
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:GGVhrTLIra5Q7DgXJrkk77wxJtmG1pSk3WQzY1BOyRK:9hrXImWIZkk77wxJtmGLRzYPhK
                                                                                                MD5:98B689EF955FB96BD71EB35CB84A72D8
                                                                                                SHA1:6DA982F170608ED44F894688C0E56DE9DCF4ED08
                                                                                                SHA-256:EFAE5C8F286397DA2E8E6760D25BC9E3BD803E0C078D7B954D611A11F330AEB3
                                                                                                SHA-512:C6EB126E21516486D45132A612CAE845294A8208C068A499D942C7521E1D6402A44FD87ABD01B5398955E6AC0AA3517BD846555721781D31A46B73907CFA54E5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .lG.............D.....lG7...n.pQ..?.k.....D.a.g...F.x.t...1.d.e.v...1.z.k.a...1.....a...3.a.f.a...4.k.l.k...<.k.t.a...<.x.t.e...@.x.~.d...@.|.x.t...I.k...a...J.e...i...L.k.c.a...T.e...k...U.t.}.o...U.}.l.x...V.k.{.k...1.i.e.v.....1.l.j.k.....1.t.t.a.v...2.a.k.u.a...2.a.v.c.k...2.a...x.....2.e.l.e.t...2.e.l.k.f...2.x.u.}.e...3.x...a.t...4.a...a.....4.a.....a...5.....a.v...7...a...e...9.a.k.i.k...<.a.c.x.}...?.a.u.e.v...?.a...a.....?.k...x.~...D.a.l.i.a...D.a.o.a.x...D.a.u.x.i...D.k.v.}.o...F.k.x...e...I.a.c.x.}...J...a.p.a...K.e...}.k...K.x...b.a...K.x...v.x...M.a.l...a...M.e.x...l...M.k...o.a...M.u.x.~.a...M.x...k.a...O.x.o.k.x...O.x.t.}.o...O.x...l.e...O...x.l.l...S.a...k.f...T.e.u.}.k...T.k.w.v.....1.b.k.{.a.v...1.l.t.a.i.k...1.o...a.x.....1.o...x.b.e...1.v.a.d.k.....1.}.t.e...a...1...x...b.a...2.a.r.d.a.d...2.a.t.a.o.x...2.e.|.l.k.v...2.k.w...e.o...2.k.}.a.x.....2.x.c.x...a...3.a.u.a.v.a...3.e...v.}.k...4.a...~.k.v...4.e.u.~.k.}...4.e.v.~.e.....4.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):17048
                                                                                                Entropy (8bit):4.9398153997186025
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:cTznbpp4Rp8wRGP1+mc7bElA4A0C7eVaCMfe7NWUFiPvHuj7cXz66SoolrM7n3yN:cU8/N+FEu4iU5MfSWUiOj7celooq7CN
                                                                                                MD5:37DECE8933C2A4EC8EB048DECFE7EA75
                                                                                                SHA1:638B5B6C30A47BB72A2DAEF2047B232F1B5BB33E
                                                                                                SHA-256:C02E308964060F1DB7A635CAEED8E2638E20C7F986DED2F8119E2A25587ACFE7
                                                                                                SHA-512:1816143FA7A00A6CCB615B88FB0CF885393FCA8DAD2AE7F2D28FA2131BCB1256D8076074674EFA81D744125D987198953BB5E26887BB23AC71A3BE5448F9FD87
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .S..............P.....S.!...n.pQ..W.I.B...W.I.T...W.I.T.A...W.i.n.a...A.l.j.i.r...W.a.r.s.a.w.a...K.i.s.h.i.n.e.v...P.u.l.a.u. .M.a.n...W.a.k.t.u. .A.c.r.e...W.a.k.t.u. .C.i.l.e...W.a.k.t.u. .G.u.a.m...W.a.k.t.u. .K.u.b.a...W.a.k.t.u. .A.q.t.a.u...W.a.k.t.u. .C.a.s.e.y...W.a.k.t.u. .I.n.d.i.a...W.a.k.t.u. .L.a.n.k.a...W.a.k.t.u. .A.l.m.a.t.y...W.a.k.t.u. .A.q.t.o.b.e...W.a.k.t.u. .B.r.a.s.i.l...W.a.k.t.u. .J.e.p.a.n.g...W.a.k.t.u. .T.e.n.g.a.h...T.i.d.a.k. .D.i.k.e.n.a.l...W.a.k.t.u. .E.k.u.a.d.o.r...W.a.k.t.u. .M.a.l.a.d.e.w.a...W.a.k.t.u. .K.o.l.o.m.b.i.a...W.a.k.t.u. .T.i.o.n.g.k.o.k...W.a.k.t.u. .K.e.p... .C.o.o.k...W.a.k.t.u. .K.e.p... .L.i.n.e...W.a.k.t.u. .K.i.r.g.h.i.z.i.a...W.a.k.t.u. .Q.y.z.y.l.o.r.d.a...W.a.k.t.u. .A.f.g.a.n.i.s.t.a.n...W.a.k.t.u. .P.e.g.u.n.u.n.g.a.n...W.a.k.t.u. .E.r.o.p.a. .B.a.r.a.t...W.a.k.t.u. .E.r.o.p.a. .T.i.m.u.r...W.a.k.t.u. .P.u.l.a.u. .N.a.t.a.l...W.a.k.t.u. .S.t.a.n.d.a.r. .{.0.}...W.a.k.t.u. .T.i.m.o.r. .L.e.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):88
                                                                                                Entropy (8bit):2.7376269297851303
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlKelBjlgljl/qlkBphlXW:SBtkJTl44iBpDW
                                                                                                MD5:6A062B4BD17710E30170823F502B0B5E
                                                                                                SHA1:26E68B38204EB89AB102DFDADEFBE3CAF9614D3F
                                                                                                SHA-256:461638F44C429A57DBABB202B97B8310B8E856D3A3DB69395622121D9D0AD833
                                                                                                SHA-512:BA8928D297DCDB049BDE94AFED3FEB1E924C745B5A6362D044F104F5A6D62EC18E32AFAF428D656A850396F25947599AC3ED2E3F2EE4FD76CF6B700A75BEBF9A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................n.pQ..i.d._.I.D......$..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):23800
                                                                                                Entropy (8bit):4.5080804837934325
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:b9En6TDax0SRtvSfYLISCleB1w5fjzBOHgYfDE:5E6ixrSALulecb1I4
                                                                                                MD5:1227C3201D8D853109024248151D377F
                                                                                                SHA1:6FFEC15E72745296917D3EEE07938F9ADAC16B54
                                                                                                SHA-256:C4B9C2116340A9D7E598758C33317F02D00CF7B1373E426063D82A263FAA6DBB
                                                                                                SHA-512:F529605AC8A1B673BCF3FEFB3D7116F05E006372420819DA7A9E8CA39FD9115B02DD3A5EA7B43237456FB9353A820A01370CBF32F2B41B301D82143E94AD3C21
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................2.. ."......6...6...H.....".....n.pQ..A.t.e.n.e...G.i.u.b.a...A.l.g.e.r.i...G.i.b.u.t.i...N.a.t.a.l.e...P.a.r.i.g.i...T.u.n.i.s.i...Z.u.r.i.g.o...A.n.a.d.y.r.. ..B.e.r.l.i.n.o...C.a.i.e.n.n.a...C.a.n.a.r.i.e...D.u.b.l.i.n.o...E.l. .A.y.u.n...L.u.b.i.a.n.a...L.. A.v.a.n.a...O.r.a. .{.0.}...G.i.a.c.a.r.t.a...G.i.a.m.a.i.c.a...I.l. .C.a.i.r.o...V.a.r.s.a.v.i.a...Z.a.g.a.b.r.i.a...F.a.m.a.g.o.s.t.a...G.u.a.d.a.l.u.p.a...O.r.a. .a.r.a.b.a...P.o.r.t.o.r.i.c.o...S.a.n. .P.a.o.l.o...S.t.o.c.c.o.l.m.a...C.o.p.e.n.a.g.h.e.n...G.i.b.i.l.t.e.r.r.a...S.a.n.t.. E.l.e.n.a...G.e.r.u.s.a.l.e.m.m.e...L.a. .R.i.u.n.i.o.n.e...L.u.s.s.e.m.b.u.r.g.o...O.r.a. .c.o.r.e.a.n.a...O.r.a. .d.i. .A.p.i.a...O.r.a. .d.i. .C.u.b.a...O.r.a. .d.i. .H.o.v.d...O.r.a. .d.i. .N.i.u.e...O.r.a. .d.i. .O.m.s.k...S.i.n.f.e.r.o.p.o.l.i...I.s.o.l.a. .d.i. .M.a.n...O.r.a. .d.e.l. .C.i.l.e...O.r.a. .d.e.l. .P.e.r.....O.r.a. .d.i. .D.a.v.i.s...O.r.a. .d.i. .M.o.s.c.a...O.r.a. .d.i. .N.a.u.r.u...O.r.a.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.915924628458436
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMP86E7l/Jclspmn:Svx6g/Oapm
                                                                                                MD5:C89AB79572AEE0973AA783D281FCDE07
                                                                                                SHA1:11E8372F90FBCAAD6BB059FEEFEF65BB0430F2E6
                                                                                                SHA-256:AE0A466EE3A80283293DB356A68145A8F511876CFF123DB28AAD481B87DAB44C
                                                                                                SHA-512:7CE0BDC3BA1A5E9387D62DA873C107273FB4FE38D0056C787199EB2A0BCEE30B0B0BF05C5D05FDF4A2250888FE3AE54BFE33AD39C14460A38EC66DB09A76DFC0
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................n.pQ.....$..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):19212
                                                                                                Entropy (8bit):5.735763854057635
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:V+F49oB3jHNJ5VpLBS6jNBMxtdSzLFiZ3QV0tyaMShZf9BoAeotcXB:2OoB3jHNJ5VpLfBBMxtdSHFiZ3QVbanG
                                                                                                MD5:5FDC594DEDC9EA7DA83F9BEF72CE054D
                                                                                                SHA1:319D830328309FDF87FD50D90A080104A547C5A3
                                                                                                SHA-256:C0E56C7B8C134BDF2149906569BD443DD8EB3635FD238510E25EBD45CE5E3937
                                                                                                SHA-512:5C5FA05E4A92EF3D40D0D9457075C36BCB12C9E896D2F2DBF3C2B5AE658BB4F73A287B26DA4E64A98D077CAAB5737D2B072469D692C59DC21EDEB2FB0C332401
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .lG.............Q.....lG=...n.pQ...0.0...0.0...0.0...0.0...0.0...0.0...0.0..s^.X..qg.N..../n..J.D.T...J.S.T....0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.\...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0.0.0.0...0
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):2.923728528591944
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtldelFal9lDOldMJlnbv/1:SBtkJUlYC0JlnL/1
                                                                                                MD5:4DF3E79562D7D1384D3245D2C6E52DC8
                                                                                                SHA1:BF6B6612C1138276BC1D46E73419B7236D515633
                                                                                                SHA-256:E25DB564D313414F46DE6EBD4D57C19C2D55992E69BB47FF91EE633E1769C2FA
                                                                                                SHA-512:75744265C5EC9B48241FAA27A7F4C0EC54B8CCE70BBDD5B04AFAC90E41F2FEB27D1FF082137496C250E5BD5574A120A0D1B7637CCABB5142F205C9467E689C58
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ............................n.pQ..j.a.p.a.n.e.s.e......%......~%...P
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.777864799965059
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
                                                                                                MD5:264C63861CEEF0E1A4CC72D014AA43FC
                                                                                                SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
                                                                                                SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
                                                                                                SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):25556
                                                                                                Entropy (8bit):4.686397811770793
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:uQI6whMQuULn4D4p0io0t7vClnadncsIU7V5E4kHETCVtv4TCgyPL9rM6Dwi6CUK:uQILMQuULn4D4pto0t7vClnadncxU7Vw
                                                                                                MD5:F6F9E13B01FBACACB4C6548B5D5A777B
                                                                                                SHA1:6D16A044A8D6A8BA0ECEA7C1A76F4FB2601FAA40
                                                                                                SHA-256:CCBC4A94EA7849D2FA6794E5766E7A35CE83BF35FC2AC461E71345B12BE6DED6
                                                                                                SHA-512:1D7A02205EB28FA9A3AC7521717FEE422D8571D269745543A5DDD4637DBF0FA2A31DD25CBE0B25AB7C1EB6BD80537E10F9B65A58B0315BF96A37A0021C017FAC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .Xf...................Xf....n.pQ..3.H.D...F.P.H...y.1.....-.H.H...../.P.D.....1.P...'...:.'.2.'...A. .1.H...A.P.,.....D.P.E.'...E...H.y...F.H...3.......V.H...".~.P...'...'. ...1.'...'.H.1.N.D...'.N.E.'.F...'.P./.N.....'.....U.F...(. .D. .E...(.'.B.H.W...(.E.'...H...(.H...P.3...(...1.O.*...,.H.W.F.....-.H.'.F.'...-...(.r.y.../.N...'.1.../.O.(.N.....1.P...'./...3.P...F.....3...H.H.'...3.....N.F...B.'.(.O.D...B.N.*.N.1...E.'.(...F...E.'.3.N.F...E.'.D.y.'...E.'.........E.B.'.$.....E.N.F.H.3...E.P.F.3.....F.3.'.$.....F.H.E.......H.'./.O.2...H...D.P.3...H...H.......y. .D.P.F...y.H.....H...y.P.1...F...~.'.E.N.1...~.N.D.'.H...~.T.1.*.....~...1.P.3.......'...'.......H.P.3.....'.3.N.F.....N...1.H.....N.....F.....O.H...*.......E.N.F.......H.3....."...D...F.....'.N.B.y.H.(...(. .D...V.2...(.1.3.(...F...(.1.3.U.D.3...(.H...H.y.'...(.N...P...'...(.P.3.'.$.....(.P.4.........(.P.D.P.3.....(.T.1.D.P.F...*. ...1.'.F...*.1.~.H.D.....*.N...P.*.....*.N...~.......,.O.,.H.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.777864799965059
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
                                                                                                MD5:264C63861CEEF0E1A4CC72D014AA43FC
                                                                                                SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
                                                                                                SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
                                                                                                SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):23496
                                                                                                Entropy (8bit):4.892508392504618
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:ZFdee0sLkAK/sCXakRAeHLuC0CowZbnjXBOkgYfahWsQ:rdee0sLkR/tRxo2nNH67Q
                                                                                                MD5:348B448B9DF6BDCB75B69B7368E7C8B4
                                                                                                SHA1:B724E39E60A131647EDCBC5E0A7114C37DAD1A3D
                                                                                                SHA-256:E532525F93D83F54129C545F37458B4D2F96753CDDC40F913DA714F46619FE4E
                                                                                                SHA-512:ECAC208E93A503BF7DB5912B2E081CF921FB2DF277564DA288B955CC86704276FB31918E74BE56C29E79B44A92D5CB6D63C76488FE825E80D0A83BD9461E76B5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .G..............D.....G.....n.p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
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):16844
                                                                                                Entropy (8bit):4.396706133608963
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:TRiTvqMTJufO2ASV26dkaWe8iWhcoDrcYeGOSUbFC99JBI8lmBlysTSWRDDudWoA:TbHotfYoro4siNjtE6XPi4TptKN/nRh
                                                                                                MD5:B5BC7162FF7B709924872AEABA47BBD8
                                                                                                SHA1:8051BCE37F7CC1794FB14543E1A4598A1FF8DD88
                                                                                                SHA-256:4307A72ECB770C01AC632278E9C62F007955F6732B6E526354630CDE84680251
                                                                                                SHA-512:33CD96AE0B8405EEE28B101B466CE7928474C2B0EDAD991EC42BB5737420F18212088C3D420BEDFA36F2EB559EED415BE432FAAF51BF3C48AD49A0B17BD1ACD9
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................g.. ........k...k...............n.pQ..R.o.u.m...Z...r.e.c.h...K.o.m.o.r.e.n...B.r...i.s.s.e.l...{.0.}. .Z...i.t...A.c.r.e.-.Z...i.t...G.o.l.f.-.Z...i.t...G.u.a.m.-.Z...i.t...H.o.v.d.-.Z...i.t...N.i.u.e.-.Z...i.t...O.m.s.k.-.Z...i.t...O.n.b.e.k.a.n.n.t...C.h.u.u.k.-.Z...i.t...D.a.v.i.s.-.Z...i.t...L...t.z.e.b.u.e.r.g...N.a.u.r.u.-.Z...i.t...P.a.l.a.u.-.Z...i.t...S.a.m.o.a.-.Z...i.t...S.y.o.w.a.-.Z...i.t...A.l.a.s.k.a.-.Z...i.t...A.l.m.a.t.y.-.Z...i.t...A.n.a.d.y.r.-.Z...i.t...A.z.o.r.e.n.-.Z...i.t...B.h.u.t.a.n.-.Z...i.t...B.r.u.n.e.i.-.Z...i.t...G.u.y.a.n.a.-.Z...i.t...K.o.s.r.a.e.-.Z...i.t...M.a.w.s.o.n.-.Z...i.t...M.e.x.i.k.o.-.S.t.a.d...P.o.n.a.p.e.-.Z...i.t...S.a.m.a.r.a.-.Z...i.t...T.a.h.i.t.i.-.Z...i.t...T.a.i.p.e.i.-.Z...i.t...T.u.v.a.l.u.-.Z...i.t...W.o.s.t.o.k.-.Z...i.t...C.h.a.t.h.a.m.-.Z...i.t...F.i.d.s.c.h.i.-.Z...i.t...G.a.m.b.i.e.r.-.Z...i.t...I.n.d.e.s.c.h. .Z...i.t...I.r.k.u.t.s.k.-.Z...i.t...J.a.k.u.t.s.k.-.Z...i.t...M.a.g.a.d.a.n.-.Z...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.804180589438744
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMZk66E7lillcls/jAn:SvEt6gika/8
                                                                                                MD5:70ADA25FCCA87A398A07454F1CCF8AF9
                                                                                                SHA1:BF6A6488EA65B58FEE6A38A4FAD9E8736103D80E
                                                                                                SHA-256:CEC9F7B0018C18423B65891DCCB8012E61798D06482F3CBE24B40F3A9EE73A44
                                                                                                SHA-512:5B71FA265E19ADF736DE9854CD69B07D7F34FE51D0195DBE0375808459235E37A97A9221D3E66AE2A9E8EE09D8D436FFF97CBAB66EBC5BFB11D5174901076D42
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..%....................%....n.pQ.......%
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):264
                                                                                                Entropy (8bit):4.194496591843038
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SvCOPlhmK+Iwj3gfY/2j33Dwj3+b6yNpwwj/10vT:+PlU0igfY/2jjtb/Nbq
                                                                                                MD5:2D518042985AD7C3F3516076B425818F
                                                                                                SHA1:09624BC1C9FB47F07CB0BCBE9419C0E8F4144755
                                                                                                SHA-256:D8EBB59A0208DA7E80AB2FDACBD9B99B9AE7048B6AFEEC8183B8FFF17240AB11
                                                                                                SHA-512:8744DA7AFA3B5755A4E47F2C5996880ADBDCE27C627FEC9D0100ACE03F5C597FABE88DFA7FACFFA4A72A51F77B0D09296622682DE566982B0BB56982DBA04EA5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................6.. .S......:...:.........S.1...n.pQ..F.'./...'.1.....'.[.*. .E...F.,.'.[.......1.H.Y.4.F.'..... .F.&.G.'./.'.1. .1.H.Y.2.....'.[.*. .E...F.,.'.[..... .&.3.*.'.[.F./.'.[.1./.....#.T.......5.i.[..........$F..PI..P...`........R..`1..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.777864799965059
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
                                                                                                MD5:264C63861CEEF0E1A4CC72D014AA43FC
                                                                                                SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
                                                                                                SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
                                                                                                SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.777864799965059
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
                                                                                                MD5:264C63861CEEF0E1A4CC72D014AA43FC
                                                                                                SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
                                                                                                SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
                                                                                                SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):28080
                                                                                                Entropy (8bit):4.398950415400721
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:YvaSQDkn/IOAnEcBFrmtx0T/qBE92t9qgGasgZv6Zwota84NHc+Crw8T2ipVaSeo:uxQDfMGasVwoteK+NiKVLX8ZT
                                                                                                MD5:F1E7CF7CD6190E9A5D1A5F3D2A7CCD47
                                                                                                SHA1:71F397452FFC708639C9B2A594A377EB395EB96F
                                                                                                SHA-256:745CE455D67D8A8E7F121E672238D3827EE2F3D8A9EE2C27B549B82E3F452BEA
                                                                                                SHA-512:F8A54E3D0ADB504F2EA722BF56EE623AC8805FCF90AB7EF1E54908F9795B1D9FE6CDEEA811651B3764403A1367817F3D52F915D030C4182C92B72611CD449FD1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................`.. ..v.....d...d...G......v....n.pQ..M.a.e...K.a.r.i...N.a.s.o...N.o.m.a...N.k.k.a...R.+.g.a...V.+.n.e.....k.k.a...`.o.v.a...A.d.a.k.a...A.d.e.n.a...A.j.k.n.a...D.~.u.n.o...D.~.k.b.a...G.u.a.m.a...H.o.v.d.a...J.u.k.l.a...K.a.i.r.a...K.e.i.s.i...O.m.s.k.a...O.r.a.l.a...P.r...g.a...P...r.t.a...S.e.u.l.a...V.i.<.F.a...A.k.t.e.b.e...A.l.~.+.r.a...A.m.m...n.a...A.t...n.a.s...B.e.l.e.n.a...B.e.l.i.z.a...B.i.s.a.v.a...C.+.r.i.h.e...D.a.k.a.r.a...G.a.j...n.a...H.u.h.u.j.a...K.a.b.u.l.a...K.a.r.....i...K.a.t.a.r.a...K.i.j.e.v.a...K.i.r.o.v.a...K.u...i.n.a...L.a.g.o.s.a...L.a.p.a.s.a...M.a.j.o.t.a...M.a.p.u.t.u...M.e.h.i.k.o...M.i.n.s.k.a...M.o.s.o.n.a...N.o.r.o.F.a...P.a.r.+.z.e...R.i.j...d.a...T.a.i.b.e.i...T.i.r...n.a...T.o.k.i.j.a...T.o.m.s.k.a...T.r.o.l.l.a...T.u.n.i.s.a...U.a.u.a.j.a...V.a.d.u.c.a...V.o.l.i.s.a.....e.t.e.m.a.....i.k...g.a.....i.v.a.v.a...A.n.a.d.i.r.a...A.n.g.i.l.j.a...B.a.g.d...d.e...B.e.i.r.k.t.a...B.e.r.l.+.n.e...B.i.a.k.e.k.a...B.r.i.s.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.777864799965059
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
                                                                                                MD5:264C63861CEEF0E1A4CC72D014AA43FC
                                                                                                SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
                                                                                                SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
                                                                                                SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.777864799965059
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
                                                                                                MD5:264C63861CEEF0E1A4CC72D014AA43FC
                                                                                                SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
                                                                                                SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
                                                                                                SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.777864799965059
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
                                                                                                MD5:264C63861CEEF0E1A4CC72D014AA43FC
                                                                                                SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
                                                                                                SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
                                                                                                SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.777864799965059
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
                                                                                                MD5:264C63861CEEF0E1A4CC72D014AA43FC
                                                                                                SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
                                                                                                SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
                                                                                                SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):15692
                                                                                                Entropy (8bit):5.107136461073751
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:9jZTE2gdY0qewORxHEAxmLAckJVniL3Ab8JCe7qq+E4J6BolRnbPrM2+4xt:hZTE2GjhxH1mLAJJdJg17j4YBonjYCt
                                                                                                MD5:FB23BA30730A5971C264F5E05FABAA72
                                                                                                SHA1:BFEC5F4476EB55EA95C96A2542E36A8B596E8613
                                                                                                SHA-256:631FA2E1E597AFCF4962EEC5B424EBEF12CE681C1B5B1D3BF879C1F6475F0996
                                                                                                SHA-512:2AAA89B36EE96833D57AE50FFDB288F444A1EF0AB2F325F8068137CB37DC8BF58BB0613EC13A4E5BB9973AD2D5978D7491FF5F292CACEF37FB79EB4BC1F9A9DE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................G.. ........K...K...R...........n.pQ..T.h.i.m.p.u...T.s.j.i.t.a...A.s.o.r.e.n.e...A.c.r.e.-.t.i.d...F...r...y.e.n.e...G.u.a.m.-.t.i.d...J.a.j.a.p.u.r.a...K.o.m.o.r.e.n.e...C.a.s.e.y.-.t.i.d...L.a.n.k.a.-.t.i.d...M.a.c.a.u.-.t.i.d...M.a.l.d.i.v.e.n.e...u.k.j.e.n.t. .b.y...C.a.y.m.a.n...y.e.n.e...K.a.n.a.r.i...y.e.n.e...c.u.b.a.n.s.k. .t.i.d...A.c.r.e. .n.o.r.m.a.l.t.i.d...A.c.r.e. .s.o.m.m.e.r.t.i.d...i.r.s.k. .s.o.m.m.e.r.t.i.d...s.o.m.m.e.r.t.i.d. .. .{.0.}...A.q.t.a.u.,. .s.o.m.m.e.r.t.i.d...M.a.c.a.u.,. .s.o.m.m.e.r.t.i.d...i.r.a.n.s.k. .s.o.m.m.e.r.t.i.d...n.e.w.z.e.a.l.a.n.d.s.k. .t.i.d.....s.t.a.f.r.i.k.a.n.s.k. .t.i.d.....s.t.a.u.s.t.r.a.l.s.k. .t.i.d...A.l.m.a.t.y.,. .s.o.m.m.e.r.t.i.d...A.q.t.o.b.e.,. .s.o.m.m.e.r.t.i.d...a.r.a.b.i.s.k. .s.o.m.m.e.r.t.i.d...a.r.m.e.n.s.k. .s.o.m.m.e.r.t.i.d...a.s.o.r.i.s.k. .s.o.m.m.e.r.t.i.d...b.r.i.t.i.s.k. .s.o.m.m.e.r.t.i.d...c.u.b.a.n.s.k. .n.o.r.m.a.l.t.i.d...c.u.b.a.n.s.k. .s.o.m.m.e.r.t.i.d...j.a.p.a.n.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/lcls8l:SBtkJ1li6gml/qa0
                                                                                                MD5:4F880C5D6BDDF339F850A87F0DC7BE2D
                                                                                                SHA1:90F0E7728BF802B7E962DB8434D1C562705F0613
                                                                                                SHA-256:B175F94ED5CE958A83AAB63677471AA4C0B2EA04FABA7C42681A5AEAEF8E5530
                                                                                                SHA-512:C9FC5B2F71F055D42C8501AAAAF6E6B6C290A6018CF1CFCB993735A01868850D0B3C5EAAD3A611C80D456AF9319DCF1F20CE4A8A0DB54736BA8C8D7089B54144
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................n.pQ.....$..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.777864799965059
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
                                                                                                MD5:264C63861CEEF0E1A4CC72D014AA43FC
                                                                                                SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
                                                                                                SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
                                                                                                SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):24584
                                                                                                Entropy (8bit):4.855226136028372
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:mea/zju+yZRw+F23UXN9OhTq0G5CBO76HnT:m//zju+yZRJIUXN9sqzIA6HT
                                                                                                MD5:3963DA338F2B60544A36292CA418DF3D
                                                                                                SHA1:80F35F5AABC530BEF03F43094B8CBC37AFF1C481
                                                                                                SHA-256:BD61D131C724CC3205EF75F221F7949CD6D14D469EFA90F3C5C958676398D222
                                                                                                SHA-512:37735E781842F1E6AC04A3170B8AB11DA4B2AFD09585DBBD455D346C530B753EE5A5344B2581FDB9ABAFD6385ECA6A1C2F273326157A4E771C3A298CA11140ED
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .7..............D.....7.....n.pQ....0.2.....?.-.....B.....!.8.(...(.B.....2.K.....5.G.......!.>.......!.G.(.....$.>.0.....G...G.....>...>.....?.$.>...$.0.5.>...(.?.......*.2.>.....+.?...@...,.K...........>.....2.?...>...8.?.......8.?...2...9.............M.0.>.....*.?./.>.....8.M...0.....+.>.$.G.....>...0.K.....>.,.A.2.....?.0.K.-.....A...?.......A.5.G.$.....A.5.>.......>.%.>.......A...A.......A.(.?.......A.0.?.......A.(.?.8...!.>...>.0...!.G.-.?.8...$.>...*.G...&.A.,.9.@...(.>...0.A...(.>./...G...*.G.0.?.8...+.>.0.K.....,.0.(.L.2...,.?.8.>.....,.G.2.?.....,.H.........-.>.!.A.....-.?./.(.>.....(.?.2.>.....8.M...K.....>...8.(...0.?./.>.&...2.#.M.!.(...5.>.0.8.....8.>...*.(...9.-.>.(.>...9.K.-.M.!.......?.0.>.........M...>.........M...K.,.......K.0.M.8.......M...>.(.....(.A.-.?...........K.0.&.....6.A...........!.G.2.G.!.....%.G.(.M.8.....?...>.2.@.....M./.A.0.@.....A... .,.G.......>.....>.....?.0.>.(.G.....K...?./.K...!.,.M.2.?.(...!.G.(.M.-.0...!.K...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):3.2808845065320833
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQl8tSRJcls076snlPPQu/F:Sv88cROaaF
                                                                                                MD5:57D73A36C1932BCC70E095139AA27CFC
                                                                                                SHA1:B1316520907CDEFBF5E2E151B759264681C555D8
                                                                                                SHA-256:3DBB21BB0B9320A9ED2CC73EC1F94F96F6B39A5577F054538A21A981D1FB5F15
                                                                                                SHA-512:6EE871A38C28520B3D0BA288012D0265B16A9E9B40A68F463E117562EAEE348DF04F204A869D6E38930AF57193F5F07E7F035982FA7B8013E80D0E5943A06CC2
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .o!...................o!....n.pQ......>........P........n!.`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):22216
                                                                                                Entropy (8bit):4.6739069186607916
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:b4G0SJVvFTxvKlSHtCCeQWFmXJ/fWhHUdZmK3B7gcX7sVbBolYS6qrEAS2XJ:btLvFFkSNcQImZnkHGl5gcLsVbBoIOdJ
                                                                                                MD5:B04F1EB4EB42510211A541F8A719D410
                                                                                                SHA1:7B45C706D51B261825AF4475810A733A74FDBC6F
                                                                                                SHA-256:F4C5A3853648DD603D129293FA77A527F4CAE7D47F9259DADAA10C122FA18996
                                                                                                SHA-512:30305B3D15409A41B0A7605CD59750C5675CE48127C6C08BBF69C7A718D968BE995D691FEEF06BD52BD6C263F8557537EF35CC802E876D91E991006156B97DD3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ."..............L.....".3...n.pQ..C.a...r.o...P.r.a.a.g...W.e.n.e.n...A.t.1.r.a.w...P.a.r.i.j.s...B.e.r.l.i.j.n...F.a.e.r...e.r...I.r.k.o.e.t.s.k...K.h.a.r.t.o.e.m...S.j.a.n.g.h.a.i...{.0.}.-.t.i.j.d...A.c.r.e.-.t.i.j.d...A.p.i.a.-.t.i.j.d...D.o.e.s.j.a.n.b.e...H.o.v.d.-.t.i.j.d...O.m.s.k.-.t.i.j.d...A.q.t.a.u.-.t.i.j.d...C.a.s.e.y. .t.i.j.d...D.a.v.i.s.-.t.i.j.d...L.a.n.k.a.-.t.i.j.d...P.a.a.s.e.i.l.a.n.d...S.y.o.w.a.-.t.i.j.d...A.l.a.s.k.a.-.t.i.j.d...A.n.a.d.y.r.-.t.i.j.d...A.q.t...b.e.-.t.i.j.d...A.z.o.r.e.n.-.t.i.j.d...M.a.w.s.o.n.-.t.i.j.d...M.e.x.i.c.o.-.S.t.a.d...M.o.s.k.o.u.-.t.i.j.d...N.i.u.e.s.e. .t.i.j.d...S.a.m.a.r.a.-.t.i.j.d...T.a.i.p.e.i.-.t.i.j.d...V.o.s.t.o.k.-.t.i.j.d...A.m.a.z.o.n.e.-.t.i.j.d...B.e.l.a.u.s.e. .t.i.j.d...C.e.n.t.r.a.l.-.t.i.j.d...C.h.a.t.h.a.m.-.t.i.j.d...C.h.i.n.e.s.e. .t.i.j.d...C.h.u.u.k.s.e. .t.i.j.d...E.a.s.t.e.r.n.-.t.i.j.d...I.n.d.i.a.s.e. .t.i.j.d...I.r.a.a.n.s.e. .t.i.j.d...J.a.p.a.n.s.e. .t.i.j.d...M.a.c.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):108
                                                                                                Entropy (8bit):3.3035968233312416
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlZeslvl/46lCbl/VEwg/1flPPQoNn:SvDPA6EBtTg/Xn
                                                                                                MD5:6DCCF108C3C097C66553C7A5E07C723B
                                                                                                SHA1:EC0E0B09ABADE270E9B1E8785084FC60F6AEA19C
                                                                                                SHA-256:C144CCA804224B9DC92C0A89431F76EA766634E8EA822A5E9DCD76D1834F8492
                                                                                                SHA-512:41FB6CFCEE21F0E3EE62E2911F90C1981988ECA2BE9A8E91F9236635224ABB36A77CCF98B627F0C85D1B3DF481C5BB0FDAC4BB530FF33022C83D910F973B9EC8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .o!...................o!....n.pQ..S.R.T.......p!..E#...P........n!.`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):2.981496329528674
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM8l3qllMBE:SvdqsBE
                                                                                                MD5:F296D3FCC79936E98F21165E870D5D2C
                                                                                                SHA1:E80750375415F9D975F3B372A3926EDEE0171024
                                                                                                SHA-256:C340243D5A2B7FD6DA05EBB7113DC4A516FF4F02CBAA48CAF1E7EF5ACA0BAAFA
                                                                                                SHA-512:AF8D4F6D49D618CAB159DDA4E545B94CDBBE8E7E8C9C87B4CEFD9A7D8103B7F0634A06B02DBA23378A8DBC43B431E8509CE42C6FBAD15D21A0CEB639D25F3D9A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.o!...................o!....n.pQ....^%....n!
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):2.981496329528674
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM8l3qllMBE:SvdqsBE
                                                                                                MD5:F296D3FCC79936E98F21165E870D5D2C
                                                                                                SHA1:E80750375415F9D975F3B372A3926EDEE0171024
                                                                                                SHA-256:C340243D5A2B7FD6DA05EBB7113DC4A516FF4F02CBAA48CAF1E7EF5ACA0BAAFA
                                                                                                SHA-512:AF8D4F6D49D618CAB159DDA4E545B94CDBBE8E7E8C9C87B4CEFD9A7D8103B7F0634A06B02DBA23378A8DBC43B431E8509CE42C6FBAD15D21A0CEB639D25F3D9A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.o!...................o!....n.pQ....^%....n!
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):176
                                                                                                Entropy (8bit):3.64308153590282
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlif2lnqlS2Mks9ks9ks9ksWbjkgl1IrSMbhot:SvVq0NTTTAg2Mb6t
                                                                                                MD5:0314889A62D29F92898F2E84FB0D88D6
                                                                                                SHA1:5E274DBBD7F357AD6D09B3B822A4B92D3109C8B4
                                                                                                SHA-256:C1991718A07AEFC99FB6206F3BC6C99AFA7FF678E9F6A01B4A475DDC2B288B23
                                                                                                SHA-512:04B0C28F2BA9CC19A5A89D0946050C41874617F8EC2CB3C1F268931446AF51C4B3850F4A3A627E14EB34C504435F726CC4F8B11733FCC5F2D73EF2371BACB1CD
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .o!.....$...$.........o!....n.pQ................................................................A.U........P...P...P...P..^%.......`n!.`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):176
                                                                                                Entropy (8bit):3.64308153590282
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlif2lnqlS2Mks9ks9ks9ksWbjkgl1IrSMbhot:SvVq0NTTTAg2Mb6t
                                                                                                MD5:0314889A62D29F92898F2E84FB0D88D6
                                                                                                SHA1:5E274DBBD7F357AD6D09B3B822A4B92D3109C8B4
                                                                                                SHA-256:C1991718A07AEFC99FB6206F3BC6C99AFA7FF678E9F6A01B4A475DDC2B288B23
                                                                                                SHA-512:04B0C28F2BA9CC19A5A89D0946050C41874617F8EC2CB3C1F268931446AF51C4B3850F4A3A627E14EB34C504435F726CC4F8B11733FCC5F2D73EF2371BACB1CD
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .o!.....$...$.........o!....n.pQ................................................................A.U........P...P...P...P..^%.......`n!.`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):23516
                                                                                                Entropy (8bit):4.552049322327995
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:hpEGbjU41qS/99gByDR0ARPS4Q2wt5aCKLiBoVyY:DJH64Q2wn2Lo+
                                                                                                MD5:54208A5849F9D7A1CD280C6A82C6D4FB
                                                                                                SHA1:190A5142210A28B571BAE971BD8B9670E30F060D
                                                                                                SHA-256:8B2F3EDF22821BAE7D5A6761E61B46929A95CC8CCBA1E05F61A3D9509F95119F
                                                                                                SHA-512:9DC00FD02E2E0F6254BE04AC65D856AF661F34408F7DB369DE2D3EEF864683C372E27C0DA84A1B869DDC48721C177B2A2C1E942D2B1B93609958B008E32FA80C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ."..............I.....".}...n.pQ..C.i.t.a...A.t.e.n.a...A.l.m.a.t.....A.t...r.a.u...B.i...k.e.k...C.a.n.a.r.e...D.a.m.a.s.c...K.u.w.e.i.t...A...g.a.b.a.t...D.u...a.n.b.e...M.o.s.c.o.v.a...P.h.e.n.i.a.n...T.a...k.e.n.t...U.j.h.o.r.o.d...O.r.a. .A.c.r.e...V.a.r...o.v.i.a...Z.a.p.o.r.o.j.e...B.u.d.a.p.e.s.t.a...G.u.a.d.e.l.u.p.a...H.o. ...i. .M.i.n...I.e.r.u.s.a.l.i.m...K.a.m.c.i.a.t.k.a...O.r.a. .C.u.b.e.i...O.r.a. .a.r.a.b.....S.f... .E.l.e.n.a...I.n.s.u.l.a. .M.a.n...O.r.a. .C.h.i.n.e.i...O.r.a. .C.o.r.e.e.i...O.r.a. .I.n.d.i.e.i...N.o.v.o.k.u.z.n.e...k...O.r.a. .d.i.n. .{.0.}...O.r.a. .A.r.m.e.n.i.e.i...O.r.a. .B.o.l.i.v.i.e.i...O.r.a. .G.e.o.r.g.i.e.i...O.r.a. .I.r.a.n.u.l.u.i...O.r.a. .J.a.p.o.n.i.e.i...O.r.a. .M.o.s.c.o.v.e.i...O.r.a. .d.i.n. .A.p.i.a...O.r.a. .d.i.n. .F.i.j.i...O.r.a. .d.i.n. .H.o.v.d...O.r.a. .d.i.n. .N.i.u.e...O.r.a. .d.i.n. .O.m.s.k...O.r.a. .d.i.n. .P.e.r.u...O.r.a. .B.r.a.s.i.l.i.e.i...O.r.a. .C.o.l.u.m.b.i.e.i...O.r.a. .N.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):14992
                                                                                                Entropy (8bit):4.205931100903372
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:rO2AQ2/BEPDnNluF7Mwv+orW27MuEAxVcTyovG:a2AQ2/BEPDNlSwwvhrr7yTyD
                                                                                                MD5:305060097964078359699857BACD82C4
                                                                                                SHA1:6DD6F95BEACF2940B01859877A93739C5F2DF026
                                                                                                SHA-256:936A9046CBD208EDE26D0EB4CB0AFCA088985D52129F67C1BADA1DC692A5034D
                                                                                                SHA-512:88A65EF7BEE1C82C89C407349310F4FFDB0925ED421C8551AB49BA3E38F317643F3A7EBD4F0A08980405DF228D3E3A0EF445922B61CE265F117F6539ED71ACC0
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ........................q...n.pQ..A.z.o.r.a.t...J.a.k.u.c.k...H.e.l.s.s.e.t...K.a.n...r.i.a...W.a.r.s.a.w.a...D.a.m.a.s.k.o.s...M.a.n.s.u.o.l.u...A.p.i.a. ...i.g.i...C.u.b.a. ...i.g.i...F.i.j.i. ...i.g.i...L.u.x.e.n.b.u.r.g...P.e.r.u. ...i.g.i...C.h.i.l.e. ...i.g.i...H.o.v.d.a. ...i.g.i...I.r.a.n.a. ...i.g.i...K.o.r.e.a. ...i.g.i...N.a.u.r.u. ...i.g.i...N.i.u.e.a. ...i.g.i...O.m.s.k.a. ...i.g.i...S.a.m.o.a. ...i.g.i...S.y.o.w.a. ...i.g.i...T.o.n.g.a. ...i.g.i...A.l.a.s.k.a. ...i.g.i...A.r...b.i.a. ...i.g.i...C.h.u.u.k.a. ...i.g.i...D.a.v.i.s.a. ...i.g.i...J.a.p...n.a. ...i.g.i...J.u.o.v.l.a.s.u.o.l.u...K.i.i.n.n... ...i.g.i...M.a.l.e.d.i.i.v.v.a.t...M.a.r.q.u.e.s.a.s.a.t...M.o.s.k.v.a. ...i.g.i...N.e.p.a.l.a. ...i.g.i...N.o.v.o.k.u.s.n.e.c.k...P.a.l.a.u.a. ...i.g.i...P.o.n.a.p.e. ...i.g.i...T.a.h.i.t.i. ...i.g.i...T.u.v.a.l.u. ...i.g.i...A.m.a.z.o.n.a. ...i.g.i...A.r.m.e.n.i.a. ...i.g.i...A.z.o.r.a.i.d. ...i.g.i...B.h.u.t.a.n.a. ...i.g.i...B.o.l.i.v.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.0064963295286735
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMnsbxl9illM96:SvOwisY
                                                                                                MD5:CA8B438F4E17056EF5FCEFC231433AA5
                                                                                                SHA1:344346EB61A633E5075E40206F6ABEC7EA930F4C
                                                                                                SHA-256:633ABCC57CE9C650409448B097E913DBB7C0A47A7FC9ADC552B1FB9679EB64E7
                                                                                                SHA-512:37996B08968548E85165343C1F664A20899B0F9EFCC1C37845BC35E9EF8D9E69DD02747D99245493E006973454FFB8C3708B4D0A439A92D5132A10750343BB0D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.S....................S.....n.pQ....^%....R.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.777864799965059
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
                                                                                                MD5:264C63861CEEF0E1A4CC72D014AA43FC
                                                                                                SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
                                                                                                SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
                                                                                                SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):28804
                                                                                                Entropy (8bit):4.8037122129403205
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:BtaMCsiftfEWjqoB8z4x4JFbTSxua9lXzGIICMqfBOvxHp:jaMtw5qoB8zw8bTh6DGIsm03
                                                                                                MD5:B0D1B01BC5142182E56BB88EFCD1792E
                                                                                                SHA1:BD0CA25D62FC4101C148666E4DEB2A53CEF8C6AF
                                                                                                SHA-256:59C6FE8C2D4E270CA4E8F18D5153E81CE7687FC07D66A353DCA38D8DC1FD1338
                                                                                                SHA-512:1D4727B85CCAE3D002850D3792EAD55D0D9160A7674BD718DFF449017E06EEE499FE8D2EF95837308AC6F8A005F9C4AEC813A1F35C50C3871320B396AB7350E6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..H.............E......H....n.pQ....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):21756
                                                                                                Entropy (8bit):4.682056859194047
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:4vFmDWcp+9IrHu+Uu/GuZf9o7h9mfBIaBOBNDgm:4UDebQXZfsh9UBIwqDgm
                                                                                                MD5:28AF7AE04C85237773049449E01F2692
                                                                                                SHA1:EB5CB4FDD13DEB69131C170160CEB8851EBB01C3
                                                                                                SHA-256:EE1E1DF9FB0C5757C4ED94F40DCE1BB5F30887DB66D9155F8D692708EFCEA9B0
                                                                                                SHA-512:D81B0363866B50AFCCF715F89CEFBB17BB4A5167A5C628C25E778DE8DFC2381D1A695A86163EC9A1A480FCFDBC73DD419266A60AEB9C170D1F6096C9E7774B61
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................3.. ."......7...7...G.....".....n.pQ..A.t.e.n.e...D.u.n.a.j...K.o.m.o.r.i...M.u.a.k.a.t...B.e.r.m.u.d.i...B.r.u.s.e.l.j...L.i.z.b.o.n.a...{.0.}. ...a.s...H.o.a.i.m.i.n.h...K.i.z.l.o.r.d.a...O.t.o.k. .M.a.n...B.u.k.a.r.e.a.t.a...K...b.e.n.h.a.v.n.....a.s.:. .A.p.i.a...G.o.r.s.k.i. ...a.s.....a.s.:. .D.a.v.i.s.....a.s.:. .S.y.o.w.a.....i.l.s.k.i. ...a.s...A.l.j.a.a.k.i. ...a.s...A.r.a.b.s.k.i. ...a.s...A.z.o.r.s.k.i. ...a.s...H.o.v.d.s.k.i. ...a.s...I.r.a.n.s.k.i. ...a.s...V.z.h.o.d.n.i. ...a.s...A.r.m.e.n.s.k.i. ...a.s...B.o.~.i...n.i. .o.t.o.k...B.u.t.a.n.s.k.i. ...a.s...J.a.p.o.n.s.k.i. ...a.s...K.i.t.a.j.s.k.i. ...a.s...K.o.r.e.j.s.k.i. ...a.s...K.u.b.a.n.s.k.i. ...a.s...N.e.p.a.l.s.k.i. ...a.s...N.i.u.e.j.s.k.i. ...a.s...P.a.l.a.v.s.k.i. ...a.s...P.e.r.u.j.s.k.i. ...a.s...P.o.n.a.p.s.k.i. ...a.s...S.a.m.a.r.s.k.i. ...a.s...V.o.s.t.o.a.k.i. ...a.s.....a.t.a.m.s.k.i. ...a.s...A.m.a.z.o.n.s.k.i. ...a.s...A.n.a.d.i.r.s.k.i. ...a.s...A.t.l.a.n.t.s.k.i. ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9849392665878645
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMWEi6E7lDJcls0:Svvt6gDOa0
                                                                                                MD5:7A74FC755D1E0D6D48CD5B4C2361592B
                                                                                                SHA1:F35EE9E8B2B8AD42D48265AB5F32617B664A77FE
                                                                                                SHA-256:028A167D99B424B29176736EAFD35631BACF7A4F087E765C6E244CEF0D12203E
                                                                                                SHA-512:BE38F81FE8D53B9FA2ADAD5D2B403DAE7E6223F6AA4438F5DDD5C3BE3B88795A720E90197A96263DC8251ABC10F96A7C5E987DBEA84A00CB88F60394278F54F6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.J/...................J/....n.pQ.....$I/
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9849392665878645
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMWEi6E7lDJcls0:Svvt6gDOa0
                                                                                                MD5:7A74FC755D1E0D6D48CD5B4C2361592B
                                                                                                SHA1:F35EE9E8B2B8AD42D48265AB5F32617B664A77FE
                                                                                                SHA-256:028A167D99B424B29176736EAFD35631BACF7A4F087E765C6E244CEF0D12203E
                                                                                                SHA-512:BE38F81FE8D53B9FA2ADAD5D2B403DAE7E6223F6AA4438F5DDD5C3BE3B88795A720E90197A96263DC8251ABC10F96A7C5E987DBEA84A00CB88F60394278F54F6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.J/...................J/....n.pQ.....$I/
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/lcls8l:SBtkJ1li6gml/qa0
                                                                                                MD5:4F880C5D6BDDF339F850A87F0DC7BE2D
                                                                                                SHA1:90F0E7728BF802B7E962DB8434D1C562705F0613
                                                                                                SHA-256:B175F94ED5CE958A83AAB63677471AA4C0B2EA04FABA7C42681A5AEAEF8E5530
                                                                                                SHA-512:C9FC5B2F71F055D42C8501AAAAF6E6B6C290A6018CF1CFCB993735A01868850D0B3C5EAAD3A611C80D456AF9319DCF1F20CE4A8A0DB54736BA8C8D7089B54144
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................n.pQ.....$..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.95862347711418
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM7t66E7l3lPclspK:Svk06g3lkapK
                                                                                                MD5:514CBEF4886D54AED23144B3AA05EDAF
                                                                                                SHA1:F442A0E8F56D355AB8522DF0BBEC1CECE89BF781
                                                                                                SHA-256:96D1D9268B17D977DCB132AD277E8455A59B0C6DDAC7AB3117BC85994E4B1C97
                                                                                                SHA-512:86377B2655874404E292B3F3EE869CCFBCD930002FC65CE291587A9B75D7BCF6A1F29EC5AD6264D25DEF534CB39EED0967CC8C4A87316C5C6CD3A73E4F165DF8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P../..................../....n.pQ.....$./
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.925547915629603
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/qli16lLMA+GIPn:SBtkJYlU8g8l/qk16JAGy
                                                                                                MD5:0603FC86A4027231623B2CBDBF29364E
                                                                                                SHA1:AB307EB3EA3DE97CF414C2F262431D6D8891196B
                                                                                                SHA-256:06B72F72F727D3340FBCB8E5B1016B5F8D49B84A78BFF39A95B4F0E7BFE1BFB4
                                                                                                SHA-512:97555480587963BCF964D37048A7E388C6885726565F966159474846E9B8560B449509783637AACF290472C85C39A70B86E6C1F6A35BC494DCCAFE533490B355
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................n.pQ..s.r._.L.a.t.n._.M.E......$....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9849392665878645
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMWEi6E7lDJcls0:Svvt6gDOa0
                                                                                                MD5:7A74FC755D1E0D6D48CD5B4C2361592B
                                                                                                SHA1:F35EE9E8B2B8AD42D48265AB5F32617B664A77FE
                                                                                                SHA-256:028A167D99B424B29176736EAFD35631BACF7A4F087E765C6E244CEF0D12203E
                                                                                                SHA-512:BE38F81FE8D53B9FA2ADAD5D2B403DAE7E6223F6AA4438F5DDD5C3BE3B88795A720E90197A96263DC8251ABC10F96A7C5E987DBEA84A00CB88F60394278F54F6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.J/...................J/....n.pQ.....$I/
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.9849392665878645
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMWEi6E7lDJcls0:Svvt6gDOa0
                                                                                                MD5:7A74FC755D1E0D6D48CD5B4C2361592B
                                                                                                SHA1:F35EE9E8B2B8AD42D48265AB5F32617B664A77FE
                                                                                                SHA-256:028A167D99B424B29176736EAFD35631BACF7A4F087E765C6E244CEF0D12203E
                                                                                                SHA-512:BE38F81FE8D53B9FA2ADAD5D2B403DAE7E6223F6AA4438F5DDD5C3BE3B88795A720E90197A96263DC8251ABC10F96A7C5E987DBEA84A00CB88F60394278F54F6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.J/...................J/....n.pQ.....$I/
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):19576
                                                                                                Entropy (8bit):4.816887587208837
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:LebdlpyruH/MtVTcYXmHxvfy/wxdrYRmxi62Q3Qzc7sBo33zR:LebdTsufMtVA1xv32zmii1
                                                                                                MD5:47F8199400ABE079A5E142835EE078CC
                                                                                                SHA1:2A405F29574126B2D977933EE9B9E22824BF1D6F
                                                                                                SHA-256:243E93F98403EF1220E25D26978C812B8BDE2DCAD9F23A6A488C5C4D553750D9
                                                                                                SHA-512:AD86AA297663821A6AF615C0834D1ACCFDFF61455A0604B94CB04A3224CF02FA07F55C61EB7C16868616A28A48493EE00E6D48880344707B06B709F8A245C431
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ."..............R.....".....n.pQ..S...u.l...C.h.o.v.d...J.u.l...n...T.j.i.t.a...P...s.k...n...{.0.}.t.i.d...A.p.i.a.t.i.d...B.r.y.s.s.e.l...F.i.j.i.t.i.d...G.u.a.m.t.i.d...N.i.u.e.t.i.d...O.m.s.k.t.i.d...A.q.t.a.u.t.i.d...A.z.o.r.e.r.n.a...C.a.s.e.y.t.i.d...C.h.o.v.d.t.i.d...C.h.u.u.k.t.i.d...D.a.v.i.s.t.i.d...E.l.-.A.a.i...n...M.a.c.a.o.t.i.d...N.a.u.r.u.t.i.d...P.a.l.a.u.t.i.d...P...s.k...t.i.d...S.y.o.w.a.t.i.d...T.o.n.g.a.t.i.d...T.o.r.s.h.a.m.n...W.a.l.l.i.s...n...2...1...4.8...9.0...A.l.a.s.k.a.t.i.d...A.l.m.a.t.y.t.i.d...A.n.a.d.y.r.t.i.d...A.q.t...b.e.t.i.d...B.r.u.n.e.i.t.i.d...K.o.m.o.r.e.r.n.a...K.o.s.r.a.e.t.i.d...K...p.e.n.h.a.m.n...M.a.w.s.o.n.t.i.d...M.o.s.k.v.a.t.i.d...P.o.n.a.p.e.t.i.d...S.:.t. .J.o.h.n.s...S.:.t. .K.i.t.t.s...S.:.t. .L.u.c.i.a...S.a.m.a.r.a.t.i.d...T.a.h.i.t.i.t.i.d...T.a.i.p.e.i.t.i.d...T.u.v.a.l.u.t.i.d...V.a.t.i.k.a.n.e.n...V.o.s.t.o.k.t.i.d...C.h.a.t.h.a.m.t.i.d...G.a.m.b.i.e.r.t.i.d...I.r.k.u.t.s.k.t.i.d...J.a.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.777864799965059
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMnsct6E7lE/3Vcls/36n:SvOnt6gA6a/K
                                                                                                MD5:264C63861CEEF0E1A4CC72D014AA43FC
                                                                                                SHA1:74B6AAFBFE5D4DCE23EC1950246D948A8AF12CEF
                                                                                                SHA-256:2C7E3796404241F7FF344F6E838EB3DFB77569152BFEB1880927E4347B50C642
                                                                                                SHA-512:A65E31C1FA603F4A893236A84D56B04A9563E8A9520100839A997C62A2D749C3A47FF862F195D8C731194F1E9FFA9D7112214E6D3C06FAC5C940A26611217B9B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.S....................S.....n.pQ......R.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):30388
                                                                                                Entropy (8bit):4.72273812066149
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:ekS9UdNG5fJgz+F/byKWtBOWLdBwSBo+9:WegbyrLUYJ9
                                                                                                MD5:234FBFF3A0EEC012EE900974B4511D6B
                                                                                                SHA1:B5F228C08CFC8882F3C773722719493F0EA052AE
                                                                                                SHA-256:0D9A840AAAB51E4377F959157536A056500A3D72F81AD2E5750227C346ADC4F6
                                                                                                SHA-512:715E2C9B244ACD22C4110DEEA0DCFA3E84A8F495B3CB5FB36452BBF24BC3A4FE6BE8AB4CF30B673743056E1095FBC215BC61B4ACF93336F198A8EE896C63A196
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .4..............J.....4.1...n.pQ....0.9.O.....V.;.V.....0.W.@.....8.W.2.....V.<.0.....C.0.<.....D.V.=.8.....0.=...V.....5.;.V.7.....V.A.0.C.....2.:.;.0.....0.@.@.V.....5.9.A.V.....V.@.>.2.....0...>.A.....<.A.L.:...!.>.D.V.O...!.L.>.2.0...!.V.B.:.0...".>.:.V.>...".C.=.V.A...&.N.@.V.E...'.0...>.A.../.=...>.=.....@.5.2.0.=.....=.C.2.V.:.....5.@.;.V.=.....>...>.B.0.....V.4.5.=.L.....>.1.0.@.B.....0.@.2.V.=.....6.5.@.A.V.....C.1.;.V.=.....0...@.5.1.....0.@.0.G.V.....0.T.=.=.0.....>.<.>.@.8.....C.G.V.=.......V.3.0.;.V.....0.=.V.;.0.....0.@.V...>.....5.@.V.4.0.....5.E.V.:.>.....V.4.2.5.9.....V.=.A.L.:.....V.0.<.5.9... .5.A.V.D.V...!.:.>.?...T...!.B.5.=.;.V...!.V.4.=.5.9...".0.9.1.5.9...".>.<.A.L.:...#.>.;.;.V.A...#.@.C.<.G.V...$.V.=.V.:.A...'.V.:.0...>...'.V.C.0.C.0.....0.9.0.=.0.....5.@.=.A.V.....:.0.;.C.W.B.....1.V.4.6.0.=.....=.B.8...C.0.....=...V.;.L.O.....H.3.0.1.0.B.....0.=...:.>.:.....5.;...@.0.4.....5.@.<.C.4.8.....@.V.A.1.5.=.....V.;.L.=.N.A.....V.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):24288
                                                                                                Entropy (8bit):4.554695048412468
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:RT8tBfUI7LLNfYyVPlRAJ3hNT3o2jauVEtE256UGpQTKin2gYFs40lplr5FKwyE+:lIfUI7fNfYyVPlRAJ3hNT3o+a5tE256z
                                                                                                MD5:D46047BA9245966FC8B99F2632FC2977
                                                                                                SHA1:80F44E7EE033540E67131B6F2AE1F412C3D43DD2
                                                                                                SHA-256:C837DEA1D261BF66F36487B31E5361FA764415ED567C9B9F55C979C47C0DCF15
                                                                                                SHA-512:969173DF74EECDA597607BD686D0AA0D94435B5E1577029091BBF7944F42400986B85F5667CB40B57CCAFB94D294CD9867B8F177CBD1349E5389863114CF31B8
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ._..............D....._.E...n.pQ..M.a.e...A.d.a.n...B.o.k.u...J.u.n.o...V.e.n.a...X.o.v.d...A.f.i.n.a...A.m.m.o.n...B.a.i.y.a...E.v.k.l.a...G.. a.z.o...J.e.r.s.i...K.e.r.r.i...K.e.y.s.i...K.i.y.e.v...O.q.t.o.v...P.a.r.i.j...Q.o.b.u.l...S.y.o.v.a...B.a.y.r.u.t...B.r.u.n.e.y...D.e.y.v.i.s...G.a.v.a.n.a...G.a.y.a.n.a...G.e.r.n.s.i...G.o.t.x.o.b...J.a.y.p.u.r...J.a.z.o.i.r...K.u.y.a.b.a...L.a.-.P.a.s...M.a.p.u.t.u...M.a.s.e.y.o...O.k.l.e.n.d...Q.o.h.i.r.a...Q.u.d.d.u.s...Q.u.v.a.y.t...S.a.y.p.a.n...S.k.o.p.y.e...S.y.u.r.i.x...T.a.y.p.e.y...T.e.h.r.o.n...V.a.d.u.t.s...X.a.r.a.r.e...X.a.r.t.u.m...X.e.v.r.o.n...X.o.b.a.r.t...A.l.-.A.y.u.n...A.n.g.i.l.y.a...A.n.k.o.r.i.j...A.s.u.n.s.o.n...B.a.g.. d.o.d...B.a.h.r.a.y.n...B.r.i.s.b.e.n...C.h.i.k.a.g.o...D.a.m.a.s.h.q...D.e.t.r.o.y.t...G.o.n.k.o.n.g...G.u.s.-.B.e.y...J.o.n.s.t.o.n...K.a.y.e.n.n.a...L.o.n.g.y.i.r...M.a.y.o.r.k.a...N.a.y.r.o.b.i...N.o.r.o.n.y.a...O.q.t.o.. b.a...O.x.i.n.a.g.a...P.n.o.m.p.e.n...P.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):104
                                                                                                Entropy (8bit):3.3096875248934543
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlQnsFNcS/3VclsytndhAMkSfeF:Svie6a4diDF
                                                                                                MD5:EE47D260BC9D7EF4556B22C5AD88ADAB
                                                                                                SHA1:9986347E802739F9B794338B3B92CCBB028ADA68
                                                                                                SHA-256:9695AD90BB6D18EDE15FA97709E722D3486D655B0D08EFC1AA3E96DB6DD40D22
                                                                                                SHA-512:4BBF77654E4FAD49310DA385BC895CCD410242677A0736198F2FDC7E9AA10BF0D7489BC83FE73D29E546A15F3F949C72EDBC51D809D4C3B2AD965668F83E9B64
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .S....................S.....n.pQ....#.}........P..^%.......`R..`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.777864799965059
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMn6E7l2RJcls/LEn:Svm6g2ROa/w
                                                                                                MD5:CBF1E43602D294E22F60CDEFFFBE1133
                                                                                                SHA1:E9B337C3EE0C3FE63B741FAA70A51FB5A8475970
                                                                                                SHA-256:968F1197DF1B8B6F2FF8113B28253086818EA2C8E21C049509DC10D50ADEB7F8
                                                                                                SHA-512:66979D342BEBA1C32521F3797499C19FA3895E8EFE74AE6E50CAAC65AA72B282180BB3BE55AD6B4A479C393E992F88F0F12B4D2B5429FEFD5681076D519041EB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.o!...................o!....n.pQ......n!
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):100
                                                                                                Entropy (8bit):2.945547915629603
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlDklU8gl8l/qlwfglwl3l/yPn:SBtkJYlU8g8l/q+fgK/c
                                                                                                MD5:ED70BEABDBA235CE58329F8207310ACA
                                                                                                SHA1:5CA4DD0342660519C47EA266536E2B25490F394F
                                                                                                SHA-256:BDD363B832BC4A953FF0EB4889AE2CC4E15BFBC941B9B6867B33AC5B004249F0
                                                                                                SHA-512:944FD804B9FE6D5639B55FE67478B9332F2518F1624278E59D4190C019F210AE1004466ED861E65014A0B51D988A5BA507671D5FC105E07049F7571DD301DD0B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................n.pQ..u.z._.L.a.t.n._.U.Z......$....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/lcls8l:SBtkJ1li6gml/qa0
                                                                                                MD5:4F880C5D6BDDF339F850A87F0DC7BE2D
                                                                                                SHA1:90F0E7728BF802B7E962DB8434D1C562705F0613
                                                                                                SHA-256:B175F94ED5CE958A83AAB63677471AA4C0B2EA04FABA7C42681A5AEAEF8E5530
                                                                                                SHA-512:C9FC5B2F71F055D42C8501AAAAF6E6B6C290A6018CF1CFCB993735A01868850D0B3C5EAAD3A611C80D456AF9319DCF1F20CE4A8A0DB54736BA8C8D7089B54144
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................n.pQ.....$..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1564
                                                                                                Entropy (8bit):4.555311598702862
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:EJhy5pG0kRHp5uKu5wyu5Guhu5zF2u02uFjh2u0jhjPkHHBXgsKs:uhyZkBp565wf5GuU5zgu9u18uWRPknpB
                                                                                                MD5:C3FD8EEAD516A6FDCBC4F005EDDFAAF9
                                                                                                SHA1:F857BABC9B5922075AEE7D53E3B4A1DBFC67D5C3
                                                                                                SHA-256:4C974E2311222AC517CFE86D7F3573E1726563868CCEB02B2869B905527F68CF
                                                                                                SHA-512:2BF54B5D8A3B0C24AEBC6591CB8173660DAAE9B80870C89E08F98C1E2E72A6E388C17BED95DF2BD36D27D159E056D9499CA61F0416E8AD29617F372FC61E4840
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................{.. ................-.......7...n.pQ..R.e.v.a.l...T.i.r.a.n...Z...r.i.....L.a.i.b.a.....S.i.d.n.e.i...W.a.r.a.a.u...D.a.i.b.u.t.i...H.a.w.a.n.n.a...{.0.}. .z.i.t...B.u.d.a.p.e.a.t...B.u.k.a.r.e.a.t...K.o.p.e.h.a.g.e...M.o.n.s.e.r.a.t...R.i.k.j.a.w.i.k...A.m.a.t.e.r.d.a.m...K...n.i.g.s.b...r.g...K.a.i.m.a.n.i.n.s.l.a...A.t.l.a.n.t.i.a.i. .Z.i.t...K.o.n.a.t.a.n.t.i.n.o.p.e.l...O.a.t.e.u.r.o.p...i.a.i. .Z.i.t...U.n.b.e.k.a.n.n.t.i. .S.t.a.d.t...W.e.a.t.e.u.r.o.p...i.a.i. .Z.i.t...A.t.l.a.n.t.i.a.i. .S.u.m.m.e.r.z.i.t...M.i.t.t.e.l.e.u.r.o.p...i.a.i. .Z.i.t...A.t.l.a.n.t.i.a.i. .S.t.a.n.d.a.r.d.z.i.t...O.a.t.e.u.r.o.p...i.a.i. .S.u.m.m.e.r.z.i.t...W.e.a.t.e.u.r.o.p...i.a.i. .S.u.m.m.e.r.z.i.t...O.a.t.e.u.r.o.p...i.a.i. .S.t.a.n.d.a.r.d.z.i.t...M.i.t.t.e.l.e.u.r.o.p...i.a.i. .S.u.m.m.e.r.z.i.t...W.e.a.t.e.u.r.o.p...i.a.i. .S.t.a.n.d.a.r.d.z.i.t...M.i.t.t.e.l.e.u.r.o.p...i.a.i. .S.t.a.n.d.a.r.d.z.i.t.....#.....#.....#.....#."...#.....#.j...#.....#.n...#.|...#.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):1888
                                                                                                Entropy (8bit):4.031767224099958
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:9fMHKzH51PKEwdevOMuZNMEEggv5JkKFXyErIKFcKjM1KF5Q8gKMEg1auVaEEg1Q:xMqzZ1PKEw4mM8NMEEggxJkeyErIZEMI
                                                                                                MD5:B0F769E5129E8F6FB422F06F87C3AB4D
                                                                                                SHA1:11D9DE49352A932DCEEDC8ED3ED62FFE3A62FB29
                                                                                                SHA-256:26070309EABA6283EE84AD1F10AA40C6BB36939720490D305094EC411AAEEE88
                                                                                                SHA-512:1C46E0CAC402A344BF65B3F7295C36475D5A9792F3C94A7341AB5F91DC0B44E7BDB04B039CE119625CD209428AF308FBE7EF1204760D9AAB7ADC614B45F91B6E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .lG...................lG....n.pQ..2...1...4.7...8.4...D...k.k. .b.u... .x.a.m.u.l...E.T. .w.a.x.t.u. .p.e.n.k.u...M.T. .(.w.a.x.t.u. .t.u.n.d.u.)...P.T. .(.w.a.x.t.u. .p.a.s.i.f.i.k.)...A.T. .(.w.a.x.t.u. .a.t.l...n.t.i.k.)...C.T. .(.w.a.x.t.u. .s...n.t.a.r.a.l.)...G.M.T. .(.w.a.x.t.u. .G.r.e.e.n.w.i.c.h.)...E.D.T. .(.w.a.x.t.u. .b...c.c...g.u. .p.e.n.k.u.)...E.E.T. .(.w.a.x.t.u. ...r.o.o.p. .u. .p.e.n.k.u.)...M.D.T. .(.w.a.x.t.u. .b...c.c...g.u. .t.u.n.d.u.)...C.T.E. .(.w.a.x.t.u. ...r.o.o.p. .s...n.t.a.r.a.a.l.)...P.D.T. .(.w.a.x.t.u. .b...c.c...g.u. .p.a.s.i.f.i.k.)...A.D.T. .(.w.a.x.t.u. .b...c.c...g.u. .a.t.l...n.t.i.k.)...A.S.T. .(.w.a.x.t.u. .e.s.t...n.d.a.a.r.u. .p.e.n.k.u.)...C.D.T. .(.w.a.x.t.u. .b...c.c...g.u. .s...n.t.a.r.a.a.l...E.S.T. .(.w.a.x.t.u. .e.s.t...n.d.a.a.r.u. .p.e.n.k.u.)...M.S.T. .(.w.a.x.t.u. .e.s.t...n.d.a.a.r.u. .t.u.n.d.u.)...W.E.T. .(.w.a.x.t.u. ...r.o.o.p. .u. .s.o.w.w.u.-.j.a.n.t...P.S.T. .(.w.a.x.t.u. .e.s.t...n.d.a.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):308
                                                                                                Entropy (8bit):4.212503743247875
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:SvMppagg8z9sk141A6YEgFW4g9VFig9zwi4uyNOlwl+oD:bpReVYJkPVFh6NOKEC
                                                                                                MD5:3912F22AB65F8E1F7A473ACCCD9CAC9C
                                                                                                SHA1:E770D84AAF2CEA9CEF79D6B1224C37FEB7FCCF00
                                                                                                SHA-256:186E5766A194471B751F5F6A9AB765C4AD018BE5B8C614A18AE55A3E9F55F77B
                                                                                                SHA-512:2C10C046FC16DCB6C8ED8DFDA415F32459C3B2D8129628A08753A90AEDCBE64D4CF12E3E33AB0BB36381836727D23438F8BB9F1ACFFE4C7CE837B2D3A907C6DC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................A.. .S......E...E.........S.7...n.pQ.............................................................................. ....... ....... ....................................... ...............#.m...#.c...#.T...#.Z...#.x...#.......U...(.......J..PM..PP..PS..PV..PY..P........R..`7..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.777864799965059
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMn6E7l2RJcls/LEn:Svm6g2ROa/w
                                                                                                MD5:CBF1E43602D294E22F60CDEFFFBE1133
                                                                                                SHA1:E9B337C3EE0C3FE63B741FAA70A51FB5A8475970
                                                                                                SHA-256:968F1197DF1B8B6F2FF8113B28253086818EA2C8E21C049509DC10D50ADEB7F8
                                                                                                SHA-512:66979D342BEBA1C32521F3797499C19FA3895E8EFE74AE6E50CAAC65AA72B282180BB3BE55AD6B4A479C393E992F88F0F12B4D2B5429FEFD5681076D519041EB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.o!...................o!....n.pQ......n!
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.500123730064915
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVTtkJtlMeli6E7lml/lcls8l:SBtkJ1li6gml/qa0
                                                                                                MD5:4F880C5D6BDDF339F850A87F0DC7BE2D
                                                                                                SHA1:90F0E7728BF802B7E962DB8434D1C562705F0613
                                                                                                SHA-256:B175F94ED5CE958A83AAB63677471AA4C0B2EA04FABA7C42681A5AEAEF8E5530
                                                                                                SHA-512:C9FC5B2F71F055D42C8501AAAAF6E6B6C290A6018CF1CFCB993735A01868850D0B3C5EAAD3A611C80D456AF9319DCF1F20CE4A8A0DB54736BA8C8D7089B54144
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P............................n.pQ.....$..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):16120
                                                                                                Entropy (8bit):6.334477949772806
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:Q9fhn8/bDuVja1f3SLmACG+NsIN53YOJiBoIT/O19e5:Yfh8GVwCpCII3/odqne5
                                                                                                MD5:9AACAB1B7BC93CE38E27EDFE0A9FC386
                                                                                                SHA1:CDDF34A9738E2C73A904CDC7FD2C44920EEB9994
                                                                                                SHA-256:016EF8A44579E8BDA42A0E2F6B65A7D44F0C8BDB1E270273DA4A2F7FFDB047B3
                                                                                                SHA-512:F393371C49DA797435867E406AE26DC5FACD040F13A5696BF1F8DB5AF354509F0562C18A0E4EDA3B7125F2EEC2516076E94766310E2468BE13770F86E5D900FA
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ..S.............R......S6...n.pQ...Na....N.N..9N[O...N.N...NIQ...O....&Ofe..sQ.\..)Rl....R.l...RKQ..NS.l..aS^X..aS.[...SKf...V.R..NW.f..dW8u...W....TX.g..^X.s...ZKQ...[.f...].^...].g...]....^.R...^.R..s^.X...^)R...^.^..._.f..._W....`<\...b.....e.....eNm..-f.T...f.\...f7...1g.]..1g.....k.~...lW....m.....o....s.e...s.T..Yt.....~.W...~.~..W.l......h.....Y....&O..d.TX....aS....b..S..h....R........xQ.....\..../n..-N...\..LN.b.\..TN.]q\...N~g.h../O)RyQ..[O._...pQ.N~n...QW..k...Q.Q.W..)R.._..QReh~n...R..)R...R..?...ZS.O....aSTX.\..aS.bGY..bS.h!X..bS(.aS...S.e~n...S.S.e...T.^.c...U.^.\...V.^.f..#W.OW...#W.W(...#WTX&O..#W.Y....#W.[..#W..\..-W.N.....W..KQ...W.)n..TX.^.c...X.\,g...Y&O.Y..'YNWnf..'YyrKQ..8Y>..g..GY.t.t..eYKQpQ..eY.eF....[-W.b...[.c.t...[S..\...[KQ....<\.N....<\.v!....].O.N...].bl....]<h.....]l..y...^/O&O...^..\...^.N.]...^.b"}...^[..W..._.fe..._.pQ..4b.~.e...b.T.e..id.~.T...efW)R...e.m.U...g.R!...\g.\+R...gTX.Y..9h...\..Qh._.....h
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):76
                                                                                                Entropy (8bit):2.777864799965059
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlMn6E7l2RJcls/LEn:Svm6g2ROa/w
                                                                                                MD5:CBF1E43602D294E22F60CDEFFFBE1133
                                                                                                SHA1:E9B337C3EE0C3FE63B741FAA70A51FB5A8475970
                                                                                                SHA-256:968F1197DF1B8B6F2FF8113B28253086818EA2C8E21C049509DC10D50ADEB7F8
                                                                                                SHA-512:66979D342BEBA1C32521F3797499C19FA3895E8EFE74AE6E50CAAC65AA72B282180BB3BE55AD6B4A479C393E992F88F0F12B4D2B5429FEFD5681076D519041EB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P.o!...................o!....n.pQ......n!
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):140
                                                                                                Entropy (8bit):3.846510265593906
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlyFzqlbVqg+UrlasJGtsh/tflPPQ3N:Svmzq7L+ptHN
                                                                                                MD5:222797C3BC9CF426918973066ED97CF1
                                                                                                SHA1:10E18BD3F6029EAC17B0DD5B464F4646034C6570
                                                                                                SHA-256:D14FBFD89AF2619B58720CED7B01BDE205CD5B1C04495A95A96FD03C97CCC448
                                                                                                SHA-512:10050C82FE674441513BF118927D0AB733AAEF7E4048696294221453F3286E450F10FE188D0CD99F16F62A008D364A0E396B68C03EF47DF8CA7FE06C6B1AE654
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... .o!...................o!....n.pQ...e...e/O~g._....#.p!....;.....K........ .#...P...P...P........n!.`...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):80
                                                                                                Entropy (8bit):3.065932423305717
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:XCbVSm/tlM4lRd6llMKH:SvTssc
                                                                                                MD5:0675F9EF282F3CDA710A1C06B1959D24
                                                                                                SHA1:F2DE1CCCB927527A4CADFC1057AC9D021967F8AD
                                                                                                SHA-256:001397A5D0FF3FBBDCABE1B278FD3EB55FA7917791730164515589F0409D7758
                                                                                                SHA-512:CFFA1AA55ED0A9ED3AAF597B3ECA4A6F4AF6B9D0A6ADA8D1CAB2227D4112B92BF2DBA0305FEE835AABEA897A21E61770F27CAADD8A38A711ADC8D34BE041501E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB...................P..3....................3....n.pQ....^%...3T"
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):154192
                                                                                                Entropy (8bit):6.466773952608882
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:Dblc9Zh0cUdDFuMkqIlipBpcfNPSHjgdWhUSfyczLKuHsGUZvj1qheERDWF3JXDN:Dhc9Zh0cUdZqvEB8PbdWJFzeNzA2Ya
                                                                                                MD5:0D76CB4C8F700A77AC63BD55D73C9456
                                                                                                SHA1:6F9AB1F986329C147AD64B5CF6174F794F9D9358
                                                                                                SHA-256:A25FE98CAB0C7F01D79E008C5DEF18B330A1B7ECC4D72B067EFD37D4C1EF3320
                                                                                                SHA-512:FDA7B80D502AEC658524AFCBB01E80985ACA0185C4DB47FDA87FFC393C409A654B6F8B9737834BB9C44733E73E0C9C21C71E67A616D2568CC3ACBF1895A9C824
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview: ..'........ResB................... ....P...................v...TZVersion.Zones.trans.typeOffsets.typeMap.links.transPre32.finalRule.finalRaw.finalYear.transPost32.Names.Rules.AN.AS.AT.AV.Brazil.C-Eur.Canada.Chatham.Chile.Cuba.EU.EUAsia.Fiji.Haiti.Iran.Jordan.LH.Lebanon.Mexico.Moldova.NZ.Palestine.Para.Syria.SystemV.Thule.Troll.US.WS.Zion.Regions......U.S...E.U...C.A...R.U...A.U...B.R...A.R...M.X...A.Q...C.N...N.Z...K.Z...F.M...A.S...C.L...G.B...I.D...G.L...M.N...P.T...U.A...B.D...C.Y...E.G...E.S...I.L...J.P...K.I...M.H...P.F...T.R...U.M...V.N...W.S...A.M...B.T...C.D...C.I...C.U...D.E...E.C...E.R...F.O...F.R...H.K...I.E...I.R...I.S...J.M...K.E...K.R...L.Y...M.D...M.M...M.O...M.Y...M.Z...N.O...N.P...P.G...P.K...P.L...P.R...P.S...S.B...S.G...T.M...T.W...U.Z...A.D...A.E...A.F...A.G...A.I...A.L...A.N...A.O...A.V...A.W...A.X...A.Z...B.A...B.B...B.E...B.F...B.G...B.H...B.I...B.J...B.L...B.M...B.N...B.O...B.Q...B.S...B.W...B.Y...B.Z...C.C...C.F...C.G...C.H...C.K...C.M...C.O...C.R...C.V...C.W.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2999
                                                                                                Entropy (8bit):7.872676574137398
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:27/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODaH1Ri:27SDZ/I09Da01l+gmkyTt6Hk8nTaHS
                                                                                                MD5:0050F2B87610533FB835211CE7768C38
                                                                                                SHA1:10FF8C5A57BC95928CB4ECECB3615F3F21CE3E53
                                                                                                SHA-256:A266EB60C4E5D978C0B3AB1BBED3504C9F7724D9B876439F4E96790B029C1090
                                                                                                SHA-512:BEA5FD1E21AB2B12F0455395B151A7F9CD2D40CC352A32702D15293D5BF01F7D7910377D0D4D3EE667D2D9908D1C4AE2A8C48C380188ED2E5467816D1D2A9A6E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR... ... .....szz.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2995
                                                                                                Entropy (8bit):7.87233812759291
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:27/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD4zubbRr:27SDZ/I09Da01l+gmkyTt6Hk8nT4zQN
                                                                                                MD5:BBB18E318B9373027B899F3BBD043F63
                                                                                                SHA1:38763D53BB5CDF5DD864661D1FFECC6C6985D6FC
                                                                                                SHA-256:C1AD63A5E2E7FF765FF5E1614C7AF90ABDB04558E13AAD1CCFAC456A701FB870
                                                                                                SHA-512:924463FC68F1D338FF918E8C8652535709C01D0E2FB84D5B2573A7D5B5F665B29A733C1A19F366EE6AFC1CE105D5E30B7810F61B7896C2E2C1BF5583AB497C3A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR... ... .....szz.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2930
                                                                                                Entropy (8bit):7.88291600595306
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:kocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD+/6LdrOp:kZ/I09Da01l+gmkyTt6Hk8nT+SLF+
                                                                                                MD5:D89B1D1B0B8D55FDCFA1896DBF7CBADD
                                                                                                SHA1:C4822D8D605AD956841C48C18A093921795D6859
                                                                                                SHA-256:840B1AB3934616994BF1B4B6A0BD543C4BD64C153A5FE985321231FEF037E666
                                                                                                SHA-512:4C1647AC06F03646D7A30EEBD3A0C035E4FCCF57803F2C84707B1630D81D6E83A3B183B37E6B4A97D65B53B761E474F2C44A667E387016FB35C28AA326646632
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................a...OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9., +.....3...!.[..b@q
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2837
                                                                                                Entropy (8bit):7.853233109337811
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:27/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODWnB:27SDZ/I09Da01l+gmkyTt6Hk8nTs
                                                                                                MD5:EA84112CCCC50942A97F8803EDDCAEA5
                                                                                                SHA1:3032DD08E256410ED5C3A1A4A570EC947907102B
                                                                                                SHA-256:2F4E4424324F44CB153161DE9BCCEF6A0891780C08EC5582D5A1CF5D15FB15B6
                                                                                                SHA-512:F05F9A83E64C619452644D1892B644B4308F480B0B2A06203916D2094781E495E3311000E03BD0155445B5FFE199A866430AE55C39884A70C67A9F3A274585EA
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR... ... .....szz.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):15599
                                                                                                Entropy (8bit):1.800599730119888
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:b/6NpKlYk29WJsEvPg5lzwuB4BLJBLSMZxN+Y9rNGw3Gvsc5IY7XW9K:bSLQYkEWmsghxCxNXrNGkGvsc5lmK
                                                                                                MD5:180C749967F129693CE9CE6D25825077
                                                                                                SHA1:F87B56EDD6A46ECA3D2B77859A073C892B074FDA
                                                                                                SHA-256:35708367FAF8E3BBDFC528744D57A0C3285B77E3E640035DB7F593D8EE1BB66F
                                                                                                SHA-512:DA13F6D970A02D4B78E412204DB62D2F21D569CB85B78EE23CDBB6B5AFFFDF0C4BC210A538ED18B1F0B292C36F5CD23EAC02A34D4A6CFECF27AFDD39F57FA069
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................a....pHYs...............<.iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.5-c021 79.154911, 2013/10/29-11:47:16 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/". xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#". xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#". xmlns:xmp="http://ns.adobe.com/xap/1.0/". xmlns:dc="http://purl.org/dc/elements/1.1/". xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/". xmlns:tiff="http://ns.adobe.com/tiff/1.0/". xmlns:exif="http://ns.adobe.com/exif/1.0/">. <xmpMM:DocumentID>xmp.did:5C2DE4146B9111E49893B4FB72F1608B</xmpMM:DocumentID>. <xmpMM:InstanceID>xmp.iid:f4150d88-d661-8e40-ae0b-446d398644
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):468
                                                                                                Entropy (8bit):7.089121604480162
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:6v/78kFmDSKN9DDDqEvwtnMkBvC4z2r/ofgR2yc:f2aJDuEvwKIvxijugAyc
                                                                                                MD5:0BBDC2B8F75B6BEE90997226456EF876
                                                                                                SHA1:0F5C013BB5F76D4EE57DF167DB8A911FB1B0FFC6
                                                                                                SHA-256:0FEE50B7CFB08A5B7E308935558A826AB00A685F8876C7D6CAA4585799ADA048
                                                                                                SHA-512:AD211658C7BF7CB75E2BC0514B2895DD52AF98866DF936A3394DD0B73A0FA8C16C59E37D02C1F67B14B69FD8A3312AECB7CE7647B33D1B6C15D94D3C88AA3900
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................a....gAMA......a.....pHYs..........(J.....tEXtSoftware.Paint.NET v3.5.6..Z...QIDAT8Oc`@.[.%7.)...Q.\*.`...I......1#.>.m..J..UN.QP.O.o.S.Y&"n.4.......5.#..Y~...].6u .a..(..<......../e.au.....=r..g...4@...o}.. E .n.6q.n......kd.........N..@.,.V.(.......dl.....`.....Px....3...^.(r..a...Rb...2....c..J`,.R$..&9.#...y..w.......1...4..(.......A.<.}.....V.*.>w .e.0`.bE v.......A.FB..s...eO.!.@,...@.....A. u ...C`.t.LyL....IEND.B`.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2876
                                                                                                Entropy (8bit):7.869300876573546
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODwAiU:bSDZ/I09Da01l+gmkyTt6Hk8nTl
                                                                                                MD5:490AA5F7B6E477DCD469250ECF087363
                                                                                                SHA1:8CEE767E4E593036A33348B2766013B7CAD750C8
                                                                                                SHA-256:200B77FD30AEC8BD908FBF8F706480E87FA76ABDB3A9A29F34878CA8E31F9295
                                                                                                SHA-512:01B7A0721D3060EBDCAA17749F39BCE49FE7B39150C6AE34DDC852FB4A563B76FB3CBD9EA770CF8DD39AF79302DAE2335B417D2CA1E0F4C1D6F591DAF95D636E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................a....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2784
                                                                                                Entropy (8bit):7.898125953959213
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:2ldHE8+JjpMNNa3OjboViS4nXsAYdPd3F58ZpiU54SN775OBf/6A:2XHt+JcNgOSiS4XsAYNpf2ESNwSA
                                                                                                MD5:BCEF878CE6891793C22F6CC4D421F329
                                                                                                SHA1:A3962106D5E5173A038999C8AA8F5CA4BF47379C
                                                                                                SHA-256:894CDB8AE6C3BFB799075E4810F3971ACE713BF89BC5AB083CE958080CAFED70
                                                                                                SHA-512:180533A000945F8392D91A3E31205E74A9B0F099C433BCD604ED0D404A789403D8DECCB9C292E02BCA1413A0083A8F744ECA6116D71C1042DF89D3C7FD1AEFAC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................a...9iCCPPhotoshop ICC profile..H..wTT....wz..0.R.....{.^Ea..`(..34.!...ED."HP..P$VD...T..$.(1.ET,oF.........o......Z..../...K......<....Qt.....`.).LVF._.{......!r._...zX..p..3.N....Y.|......9.,...8%K.......,f.%f.(A..9a..>.,....<...9..S.b...L!G....3..,....F.0.+.7..T.3...Il.pX."6.1...."....H._q.W,.d..rIK..s...t......A..d.p....&+..g.].R.......Y2...EE.4...4432..P.u.oJ..Ez...g.........`.j..-....-....b.8....o....M</..A...qVV....2.....O.....g$>...]9.La.....+-%M.g.3Y.......u..A.x....E.....K.......i<:...............Pc...u*@~..(.. ...]..o..0 ~y.*..s..7.g...%...9.%(....3........H.*...@...C`...-p.n.......V..H.....@....A1....jP..A3h..A'8..K....n..`.L.g`......a!2D..!.H... .d..A.P....B....By.f..*...z....:....@..]h...~....L.............C.Up.......p%....;...5.6<.?.........."....G..x...G.....iE..>.&2.. oQ...EG..lQ..P......U..F.Fu.zQ7Qc.Y.G4....G......t...].nB../.o.'.1.......xb"1I.....>L...f.3...b..X}..........*.Q.Y..v...G...p.(..........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2838
                                                                                                Entropy (8bit):7.867554233620986
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:2/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODpFMr9:2SDZ/I09Da01l+gmkyTt6Hk8nTpKh
                                                                                                MD5:053C99C0861AFA9F1818B917E52DEE42
                                                                                                SHA1:B7495D17E30C80046E8C28A89D60E27A98DC9127
                                                                                                SHA-256:C4424B85591917D64739F32B2AD98CF7B517A64AC63F5A2E0CDEC82B2EC24B83
                                                                                                SHA-512:4F7B92675532CA18935EB5CE185AC1955F79DE5F2A052FE1DC13BFFFC005F4BA0B68A22E8573D13EDAB005270E6C19851300DE6A989BDD7806ABB2522033F17C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR..............H-.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 14 x 14, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2836
                                                                                                Entropy (8bit):7.865935447689982
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:2/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODDLsN:2SDZ/I09Da01l+gmkyTt6Hk8nTDLe
                                                                                                MD5:DB8437A8F2BC6FF9756AEDAFFE55122E
                                                                                                SHA1:DA7ADE552ECB7FF2D5EACC5DE4818CA62AB8946E
                                                                                                SHA-256:AA7D5A698596D06194515329C39767F7219162C1B2B8DB8CCD4311A16A0CA16B
                                                                                                SHA-512:A5BEB564397C270EDC72A72C77B0E0EC096EBF1A5CCBE074A71B83587D4D538C5D073B02FE47416FE635A30B7F83650DC827C1CFCF99B25EFA6AB4BF8320D13A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR..............H-.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 8 x 4, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2811
                                                                                                Entropy (8bit):7.874236433479311
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:0VocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD+/6u8:UZ/I09Da01l+gmkyTt6Hk8nT+SJ
                                                                                                MD5:FAF4ED201C26BAE9E687DD4FF5456041
                                                                                                SHA1:979627FEF736DE553C5AA0169720B04F85150111
                                                                                                SHA-256:4BF8DEBD83FC146673F09E846BF62A2D6934D43E1D231BEB16E854652E2D7A94
                                                                                                SHA-512:BDF7B5B41A50C378A689A0506FE91E7121738E877250CCF1F0A94E18C88E6F0FFC76D56E6FE7CAEDF13E83C75AC36BE53342E2B8922496BB878C5D616C2E655D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...............~....OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9., +.....3...!.[..b@q
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 8 x 4, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2808
                                                                                                Entropy (8bit):7.8765574063891295
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:0VocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD+/6TgQ:UZ/I09Da01l+gmkyTt6Hk8nT+S0Q
                                                                                                MD5:24C86B20F3A1850116F0C4052490DB59
                                                                                                SHA1:D61178F5C4875A7E4039FC3680204FBF26E1C815
                                                                                                SHA-256:1909A2B9421ACE6C4610C8A967F6E477529132ACBC7474CA0ADBB0F7CEF1BB74
                                                                                                SHA-512:69A79870610B6350A9AD5F2DB6BD073F7B0C62E790681C17F8AC6268594349698F09231D159394BEBC5C2FAC80A9F5259E4BF5D108984860A718D5D45EEFE485
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...............~....OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9., +.....3...!.[..b@q
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):3171
                                                                                                Entropy (8bit):7.899498876019361
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:CldHE8+JjpMNNa3OjboViS4nXsAYdPd3F58ZpiU54SN775OBDVRDrLmt1UG7:CXHt+JcNgOSiS4XsAYNpf2ESNgLMUG7
                                                                                                MD5:32466EAF2EE705725C4372710A5A3484
                                                                                                SHA1:63DF604C3788457CB7DB6DDE90999F20C1B29B4C
                                                                                                SHA-256:5D1A57C140142E3466D97B7CD17D364F6908A22C670E9DE7FAD93BDD90B5210D
                                                                                                SHA-512:7B25063E9F92758A383BAF4A412AAAA5ACB9E5872A2C3B216079E22122781294256C59619463B90848C24CD4E71366C22B20094AE09B5A9C836D87E0F6FE70DC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................a....gAMA....|.Q.... cHRM...........R...@..}y.....<.....s<.w...9iCCPPhotoshop ICC profile..H..wTT....wz..0.R.....{.^Ea..`(..34.!...ED."HP..P$VD...T..$.(1.ET,oF.........o......Z..../...K......<....Qt.....`.).LVF._.{......!r._...zX..p..3.N....Y.|......9.,...8%K.......,f.%f.(A..9a..>.,....<...9..S.b...L!G....3..,....F.0.+.7..T.3...Il.pX."6.1...."....H._q.W,.d..rIK..s...t......A..d.p....&+..g.].R.......Y2...EE.4...4432..P.u.oJ..Ez...g.........`.j..-....-....b.8....o....M</..A...qVV....2.....O.....g$>...]9.La.....+-%M.g.3Y.......u..A.x....E.....K.......i<:...............Pc...u*@~..(.. ...]..o..0 ~y.*..s..7.g...%...9.%(....3........H.*...@...C`...-p.n.......V..H.....@....A1....jP..A3h..A'8..K....n..`.L.g`......a!2D..!.H... .d..A.P....B....By.f..*...z....:....@..]h...~....L.............C.Up.......p%....;...5.6<.?.........."....G..x...G.....iE..>.&2.. oQ...EG..lQ..P......U..F.Fu.zQ7Qc.Y.G4....G......t...].nB../.o.'.1.......xb"1I.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 8 x 8, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2802
                                                                                                Entropy (8bit):7.861531898056138
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODQ:bSDZ/I09Da01l+gmkyTt6Hk8nTQ
                                                                                                MD5:9DD1092BA0D5B0AA805FF78728052FD5
                                                                                                SHA1:799E9FE238D3D3B62D34B3F21F2C5F0F275999DA
                                                                                                SHA-256:910A084AC16C65AA71E79AAE4884BA010EEE5DE6E9E8ED671E080DE335400421
                                                                                                SHA-512:076FD1AF94F67AB359AC2FD6F8978A1B9D515F4A2791515530271141846BD84D1F8E726A972EC84962471C760143D010A5ECBD3F32E23CDAA57CD3BBF8FAAF29
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR.....................pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 32 x 32, 8-bit/color RGB, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):320
                                                                                                Entropy (8bit):6.988275403142871
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:6v/lhP12/6TSlQE7EelEQ1Zsr9n9xhyhY8yjhjvegmjniSVdwup:6v/792/6TeQUSr9n9Llhjtv/UiSAc
                                                                                                MD5:1BEB398B37A81C6F743A7BCD8076477D
                                                                                                SHA1:3F60B75477D49793B0B91746C519D28CBA8D9EBD
                                                                                                SHA-256:E2CFF5756D4C0496BF6864EB36436D9426849CF2CAB678B8B2F360607DA8110C
                                                                                                SHA-512:309EDD39FEB63270CBDD6FA06D0E4AEE86C580476DBAA4A58307D780CB357C151375397903091B91B3109974DA5EDAA9ABEF3C4953ACEEDD17151B5072C5DDA5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR... ... ............pHYs.................IDATx..V...0.........L+{.k...l.M6;...P@^.u.&.......Hp..f&..8.y..e1..7.......E....y.w.....E".ZD.z...w.6tPk..|....|.....tP......K.]w.R..W.n.........c,9....ZD.2P..z........u.p.%.....<...(K...F9.q]N...,.....*/.6Z;E...F....m..G7.m.1....2.o.......IEND.B`.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 8 x 8, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2827
                                                                                                Entropy (8bit):7.867316892820178
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODy+paUW:bSDZ/I09Da01l+gmkyTt6Hk8nTJW
                                                                                                MD5:5B6EC4EEBF6FDF67C3C6FBD673A46370
                                                                                                SHA1:53181029FBEA06AED2E663392654737696F5B4CB
                                                                                                SHA-256:8F6C088620C842670EC544DFC4B0313795D8E52C4203472848CF9558D06D1597
                                                                                                SHA-512:3A9478F764F5AA6FDD239B4217DD9A60AD600CD0F06F108AD23F9F2BFDC71387457F35DCEC3B66F497C00A838BF7940A6E3C9AF718B3FBCB73ADF0A212395A0F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR.....................pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 8 x 8, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2843
                                                                                                Entropy (8bit):7.868357699094754
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODOzF:bSDZ/I09Da01l+gmkyTt6Hk8nTOZ
                                                                                                MD5:212B43546F774BEB2ABB9D7A1B7B5076
                                                                                                SHA1:78AF6E84B7DD56CEED551580D6634FF40D0B9ACA
                                                                                                SHA-256:0E3C193F90CA6E0109584D51036DB71EFF5EE8E5A2D17994EFFC379A94893DD3
                                                                                                SHA-512:638E4414A7B24234C03811C0C638C62A89090E9FE8A5909D3CA82F6B3940F81C6381128664787B44CBDAFAAB44D583A0BD1572E2BBCB454CF4718CB8F769A5A6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR.....................pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2871
                                                                                                Entropy (8bit):7.870767548972718
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODcF:bSDZ/I09Da01l+gmkyTt6Hk8nTcF
                                                                                                MD5:C988D0BC16B46F5D878944FBF953132C
                                                                                                SHA1:C0B39AC1FE4476E016C5A450B4479905BCAC11C5
                                                                                                SHA-256:5E9D32D1168A13BF9C112D3696968F2A6B4ADC3FCCA0C4970AFF07B3F105DF1B
                                                                                                SHA-512:FDE833EDE566D846E1C9898E0B5EAF01A52E03AA71C91790547CF41CC2EAA72F07DA2EEBEF5301FE346DB08943F80B7A36D5CF304C7CAAEC0E07162E2D8CB0CF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................a....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2877
                                                                                                Entropy (8bit):7.8734940498364185
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODXM:bSDZ/I09Da01l+gmkyTt6Hk8nTc
                                                                                                MD5:9F6B685443F0035E01BBC75B8D0368E2
                                                                                                SHA1:37CCDA24A3B031E4D17558EE5FB5F5EBB52A7CF9
                                                                                                SHA-256:3D58D6E3496AD46DF8D450C07F3ED38CD5EA2BC39399634A7F8D28AF85D6F36D
                                                                                                SHA-512:0B73CC057D5EA8FD2BBB6EA2D664FA23948B294FD9D9100DC563820DD54EC15D0DCF618C36CF0399818ED13B50D9BCA435FB79DEFC73EB610ACD7A044A4047E5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................a....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2975
                                                                                                Entropy (8bit):7.8649855935944375
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:27/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD/AV:27SDZ/I09Da01l+gmkyTt6Hk8nT/AV
                                                                                                MD5:C0AD6235DA2F86747861A36538AC70F9
                                                                                                SHA1:7A171C42FA927323189647D7BEECA7349623C615
                                                                                                SHA-256:F93F51EA88F7636BF442F963A944105C984D89266AB4FC7258389578348F9692
                                                                                                SHA-512:752E24A4A24289440D5682D850B450E277AB3CC8A914FA6BD851EE71B85D71D70E03BC6F257728A61EA87FC65EA2F330E821F8871395CACF1050AA55794ECE22
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR... ... .....szz.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 10 x 10, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2830
                                                                                                Entropy (8bit):7.862535708330178
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:8/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODc:8SDZ/I09Da01l+gmkyTt6Hk8nTc
                                                                                                MD5:21064FD5CAC8F583FBA95AA6953111F3
                                                                                                SHA1:158A51FC11058CFB003E8CB45545E66D2E7FD81F
                                                                                                SHA-256:DE9246A393815B14492002F3CC4D859F56FBC1CF9C49E06E075F4691D7CA021C
                                                                                                SHA-512:10A3196D8BFA2F343740C2DD8B3CE8F326CE275DEF5B361E79AC838C2F6CC2836C90184BBE5E17F10AF1161BBD8AA5FA6789F057CF378E3906ECDE494B2CDF6F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR..............2.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 10 x 10, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2837
                                                                                                Entropy (8bit):7.8661845192086775
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:8/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODWiYh:8SDZ/I09Da01l+gmkyTt6Hk8nTvYh
                                                                                                MD5:74EA6C1EC3302A30AC47AAEA7BA3AFD5
                                                                                                SHA1:7E3DE37638F605228D702FBF9AE275B2FFA2467D
                                                                                                SHA-256:26BAC352EEACB2139C645948DAF380FD54154B6E3473BAD6517412C736E47220
                                                                                                SHA-512:84C5C545CE6A8DF0FE228ECD4262AD3FCFDBD0CCF10327982E785C7A30B9A6274367B1078046890BF5470BBA531641F14B4E46E44F7A08BF281AD83AE89CCE0F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR..............2.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):3098
                                                                                                Entropy (8bit):7.882667962977238
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:bSDZ/I09Da01l+gmkyTt6Hk8nTAC5Beq2K:bSDS0tKg9E05Tb5wqR
                                                                                                MD5:C0F38553BDFD691A26D624AC3FEC0D1C
                                                                                                SHA1:50CFA6315550065669BD48912EC5CA34E837EFD8
                                                                                                SHA-256:2A18CABADF86772481B7A59F157255DF469494A50DDBEC37AE69F73A3B54C132
                                                                                                SHA-512:F8A78AE47FEF7C762E061E9B5D450AA201A85B0F50375F844A5174CE9BF1793E70AA27C3FD948BC1F564E272ED59FF31074055388A6C33BE13F97D383BFA93DB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................a....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 23 x 18, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):394
                                                                                                Entropy (8bit):7.193650253140461
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:6v/lhP4InDs1iXVul/QOLh+0LrKVISIs2fsenV5P8jImCWRagC2J0xOJngZbzxGm:6v/7QHEXM1QWjDVVZ7WJ0cJObAE9
                                                                                                MD5:EA3D34758ABB1A8D437DF38A005A371B
                                                                                                SHA1:67F6881C0542FA2BF316396984045F670CB36350
                                                                                                SHA-256:A9FA831F1A4BA646AE08DC38FC3F8E0C87AD5B5D2F60E83795FE4A3D33DD7B3F
                                                                                                SHA-512:2A97913834864DCE58C78CD84D9A82454CDFE1F329976FE8583EEF2B01423F04F462BBA2B737FFC516FB3F8C4927EBDE693F7AA98296802EC649708BD4C76875
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...............E.....tEXtSoftware.Adobe ImageReadyq.e<...,IDATx..=..0....b.....3.7.[X...{.K.. ......6....h#.n.....N...D..%....B_.4.I{E.....q..M...UUE?x.....].-I../..8..$...,+r].r{.u...EA..8>..s..1(n../.u.....b.......0..8.Y.,[.....B.4.9.A.m...c..m......8.....w4?.......a..Mg..-UU.M.2.sQ.#EQ<.l.e9b.0.o..i.......'........0..~...^P...........o...o.....$1....IEND.B`.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 27 x 18, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):3076
                                                                                                Entropy (8bit):7.877665076819138
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:x/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD6CpzYGCZN:xSDZ/I09Da01l+gmkyTt6Hk8nTBpzC
                                                                                                MD5:63EC748BA3EE9D5878A13517FC057B8E
                                                                                                SHA1:34433D0E95BF119F57AB9A4D655733F8B9979764
                                                                                                SHA-256:74C028A7D741885103571D493D69B1362083AD225957607EC8FE3473C9D9C6A3
                                                                                                SHA-512:5B86C7EA5BB33121433C41F72625D30E5FAC4E66858C49C59618B07BDFFF8DC37EE71AB80B260740317340F23B5AFDE63800FF0B7C57206F8AFE8F241EBE481C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR....................pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 23 x 18, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):480
                                                                                                Entropy (8bit):7.3467258325775875
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:6v/7QHHwMobOEQkkcoJHw55TQaTsybKLU0MlgFLciT:6BuDHwLdbKtMiHT
                                                                                                MD5:350CFCEC86B83D85A4A60C62D0B97F0D
                                                                                                SHA1:CDB19CE66B2C09BF3704DEE19B76090F251578B4
                                                                                                SHA-256:054A094D3D73DDDAAA46F2194000D5EE514D1F824EC554214BBBC4643E126718
                                                                                                SHA-512:8679F9EBEDBC995AEEB3F9C25A5F0399120C7B471C79CDF81B07F881DFDDD99873BDD601EB7AE040791E1A340D1955A5B3391D94240A8CC04952281D0314F401
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...............E.....tEXtSoftware.Adobe ImageReadyq.e<....IDATx.....@......,...1..br&..o..X.....K.@z..{..+Z.!....@...."...eA..$..v...fg...R.4....=.F..O..&..oZ.d2.[.%.Q....\...o.v.e......Uh.............\.... .ey.8....>.E.B..!.$.....t:W....I.E......x.$%}..=..8F...&a.{.bI=0+...x..adY....v.....p.u+.~.l6[......bI..<...d.,._..0|.........4-+.>p..o..w..k...........-.... .J8....q...j..R.O...[.s+{RW..z..j.z.....%.&...._..5/..^h..........a.....IEND.B`.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:TrueType Font data, digitally signed, 19 tables, 1st "DSIG", 23 names, Macintosh, Font data copyright Google 2011RobotoItalicGoogle:Roboto:2011Roboto ItalicVersion 1.00000; 2011R
                                                                                                Category:dropped
                                                                                                Size (bytes):160736
                                                                                                Entropy (8bit):6.406235756728495
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:rPfJaXF3u4IV+ejFFT5Y+E75LOiH6LuVZmxAHoShcZX/oV/B:rPBaXFhdx6LuHNIqcw5
                                                                                                MD5:93B13A58DEDEEBE519846555A543523B
                                                                                                SHA1:2A5AD885C7E58322832E6E651156FFC131E27F2E
                                                                                                SHA-256:470123C6FB5D6C0005431C0F5390742497C55087361A7636B7E82EB35635DED7
                                                                                                SHA-512:A0552548C6C0986EBB7B245AD0D4C147A6BD73FEFDCCB095DEA59423D203CF57556F33175984BD30E3F815504F2D581B31955D98B3D70773F88543B592A43C98
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:...........0DSIG......s.....GDEF.`.a...<...HGPOS.*`.........GSUB.&.....$....OS/2..)........`cmap..N4........cvt .T.q..j<..."fpgm...R..j`...%gasp......j4....glyf.e........cXhead......L...6hhea...4.......$hmtxn..........4kernwal}......0.loca.Mm...:.....maxp.4.~..C.... name7.&&..C,...4post..b...F`..#.prep.....s....M.........................4...$./...H.H...O.P...R.R...h.j.........................,..DFLT................kern....................K.T.p...w........<.B.H.............>.`.f.......&.L.r.x.b.h...................8.R.`.~...........j...N.`.v.............@.f......... .F.L.R.X.^.....,.J.h.................".D.f.........L.....N.l.~...............2.8.N.T.j.p.............6.X.^.......6.d...........8.Z...............................f.....8.Z.|.........................J.`.........:........ . B L!6!.!."0"6"X".".#.#.#B#X#r#.#.#.#.#.$.$.$.$P$f$|$.%p%.%.%.%.&.&(&v&.&.'X'z'.(J(x(.(.).)()v).).).*.*(*:+$+r+.+.,.,J,p,.,.,.,.,.,.,.-.-.- -6-X-r-.-.-.-......@.b.|............../ /B/././.0.0@0^0x1>1H2.2p2v
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):1489
                                                                                                Entropy (8bit):6.937783205392521
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:k1hpunQWwh82lYSKwg5F6KrVnT3ZyJ3VV5FPg5/G1DJkzRimgVO4nz7tpZugNG2Z:qitvnLJb/t0J37bIhQg4/VOgpbx
                                                                                                MD5:9B48C0BFDD449F486856313661EA6B65
                                                                                                SHA1:441EFA7E9CA9C297244C2755039A89ABC1461786
                                                                                                SHA-256:4D225F27C9976D1D83B81F6CE3A0BF5636715F7A48539E4CE730EF1AF7AD4D41
                                                                                                SHA-512:F2CA6CF4BA86A28AEAE3F5874D46AEBB1DF698F52B4E3516C0282E7B8EDCC5CFD7B54C94A1710876FCBAFF648C6E8E954B6B2157B265902CDADE82BF19B4C42E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR..............w=.....tEXtSoftware.Adobe ImageReadyq.e<...diTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:751DC2B63460E211AC65BF1B98CD7C88" xmpMM:DocumentID="xmp.did:B31057CD603711E2AE60E3892217AA0B" xmpMM:InstanceID="xmp.iid:B31057CC603711E2AE60E3892217AA0B" xmp:CreatorTool="Adobe Photoshop CS5 Windows"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:771DC2B63460E211AC65BF1B98CD7C88" stRef:documentID="xmp.did:751DC2B63460E211AC65BF1B98CD7C88"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..+.....IDATx..=,CQ...kK.T........X$.:X.b0...*F....I.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2812
                                                                                                Entropy (8bit):7.86184881742406
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODna:bSDZ/I09Da01l+gmkyTt6Hk8nTa
                                                                                                MD5:92BED1361E9D9153A03FC511E53200F5
                                                                                                SHA1:68A026D12742851DDBCC7857A299F9EAA311326E
                                                                                                SHA-256:66078DD3E9027C1C1B2806B5E61ECEA4C94FFA2443319FD57C946BAD6E100BD8
                                                                                                SHA-512:4934258571A8729AC839F792D1E83448DE876D71852883A92453A88EA49DDAE55890E3F1E17087632F23A4D9B1124C5A977D60E96806FE4348DC191F6A9BA802
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................a....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 1 x 1, 8-bit/color RGB, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2791
                                                                                                Entropy (8bit):7.8621000348376775
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:+s/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODM:+sSDZ/I09Da01l+gmkyTt6Hk8nTM
                                                                                                MD5:0EF0B9F99CF01B5651916855B573CA40
                                                                                                SHA1:836D500234DC72C3E1597C9FCC20FFA6874E4A38
                                                                                                SHA-256:C92F44352266051BC2F319BC3D1211646E71E88D00212C91933D6D441B00BE7F
                                                                                                SHA-512:097006D890983016B58D1E6F0BD0A899DA2E41BC73960D6B4A63F9938B9D2153DC72AD6CDADC3297FCA5BA30DD8CA546BCBE13A6C0416C1658209220922EFFFD
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR..............wS.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:JSON data
                                                                                                Category:dropped
                                                                                                Size (bytes):480
                                                                                                Entropy (8bit):4.946526263578106
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:CxK3ESXLSYoBXLMaHCfOOCkx4nOCr7fLrzZl/E9TsYyHQR:CkPX+Y0XfVOzxyTJl8aYr
                                                                                                MD5:089B05C0EB3300BCF271E2B54E3E2B5A
                                                                                                SHA1:FFA3FD953F7E0024DDAFDB0D58D9F354AC31E923
                                                                                                SHA-256:BC762E1495DB943541AB7A48B138BEB28ABBEDA67545AA46CD54ECB673748D9A
                                                                                                SHA-512:C2DDE046AA1CFD8F0B61F5BBC2F8662272F59DD0D4A7748249B01B21A583B172737C093E80ABE0A2F27CDA54CAF9E7A19618A3DF4154AE06064BF1E94B5F0642
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:{..."FileVersion" : 3,......"FriendlyName" : "Messaging Debugger",..."Version" : 1,..."VersionName" : "1.1",..."CreatedBy" : "Epic Games, Inc.",..."CreatedByURL" : "http://epicgames.com",..."Description" : "Provides a visual debugger for the messaging sub-system.",..."Category" : "Messaging",..."EnabledByDefault" : false,..."IsBetaVersion": true,....."Modules" :...[....{....."Name" : "MessagingDebugger",....."Type" : "UncookedOnly"....}...],....."CanContainContent" : false..}
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):1053
                                                                                                Entropy (8bit):4.955264747326076
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:CWsX+Y0Xe9EAcXBUVV/A4NVnY9ybrxIl8H9fD8Gv6vq0t:A66EAcXBUVV/A4NVKGH9fppo
                                                                                                MD5:2A3C034D75002CA9AD566D6BDE453A09
                                                                                                SHA1:CCAA60817A2C30C93A6EA94666AB69F2E6F0FD3A
                                                                                                SHA-256:0FCDBDAE1432456BF0B00B008BC716A5275E4A3006E9B50A3DF291463FA8B3A2
                                                                                                SHA-512:EA9A4640144CD76F3DF66B0EC042CFB93DCF6E7D82FC18D9B9B69E9F9C1373B09E369154C446B79F713B6B7C2D3F6C663D43A9944666420A6C57C5195F7081EA
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:{..."FileVersion" : 3,..."Version" : 1,..."VersionName" : "1.0",..."FriendlyName" : "UDP Messaging",..."Description" : "Adds a UDP based transport and tunneling layer to the messaging sub-system for sending and receiving messages between networked computers and devices.",..."Category" : "Messaging",..."CreatedBy" : "Epic Games, Inc.",..."CreatedByURL" : "http://epicgames.com",..."DocsURL" : "",..."MarketplaceURL" : "",..."SupportURL" : "",..."EnabledByDefault" : true,..."CanContainContent" : false,..."IsBetaVersion" : false,..."Installed" : false,..."SupportedPrograms" : ...[...."UnrealFrontend",...."UnrealMultiUserServer",...."UnrealRecoverySvc",...."UnrealLightmass",...."CrashReportClientEditor"...],..."Modules" :...[....{....."Name" : "UdpMessaging",....."Type" : "RuntimeAndProgram",....."LoadingPhase" : "PreDefault",....."BlacklistPlatforms" :.....[.....],....."WhitelistPrograms": [......"UnrealFrontend",......"UnrealMultiUserServer",......"UnrealRecoverySvc",......"UnrealLightmass
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:C source, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):7130
                                                                                                Entropy (8bit):5.426756168912859
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:zL4AqyUsMOuVYtz01RK3aaAO11jE5rk3mj:zL4phDVYteREaaAO38rk+
                                                                                                MD5:D208B31651C247CFEB156BC99B67C75D
                                                                                                SHA1:333DBD45D79179E7DA82598CE5E4CC8F94F1AFE8
                                                                                                SHA-256:A4E6AF7300AAC34098B68B4A0A2798221BF77E68941D1DB4D732351159486122
                                                                                                SHA-512:8BE8FAF775650B4942483BA2E7210BBDE04B90198F588E78CFBC9FA031BE26A2EAC8549B34F0B8183740D57F28F9AE82721F2A47E17F9DD2285EACFFF3585948
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:// Copyright Epic Games, Inc. All Rights Reserved.....// handle differences between ES and full GL shaders..#if PLATFORM_USES_GLES..precision highp float;..#else..// #version 120 at the beginning is added in FSlateOpenGLShader::CompileShader()..#extension GL_EXT_gpu_shader4 : enable..#endif....#ifndef USE_709..#define USE_709 0..#endif // USE_709....// Shader types..#define ST_Default...0..#define ST_Border...1..#define ST_GrayscaleFont.2..#define ST_ColorFont..3..#define ST_Line....4..../** Display gamma x:gamma curve adjustment, y:inverse gamma (1/GEngine->DisplayGamma) */..uniform vec2 GammaValues = vec2(1, 1/2.2);....// Draw effects..uniform bool EffectsDisabled;..uniform bool IgnoreTextureAlpha;....uniform vec4 MarginUVs;..uniform int ShaderType;..uniform sampler2D ElementTexture;....#if PLATFORM_MAC..// GL_TEXTURE_RECTANGLE_ARB support, used by the web surface on macOS..uniform bool UseTextureRectangle;..uniform sampler2DRect ElementRectTexture;..uniform vec2 Size;..#endif....var
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:C source, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):247
                                                                                                Entropy (8bit):4.772084734516376
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:4xMgm9LCpxDZhysjf0A/FBFTAVI2z6x4MjpOe6LS:4xMgmpCrys/TAKhmZegS
                                                                                                MD5:57CDB5700C86980027AEECBB438CF921
                                                                                                SHA1:68F34555F22616D10AA8D1444B363E6959D7D96D
                                                                                                SHA-256:56420086CE3D8A813F1F01C9A026AAFB46FB461B5BE0CBE2A826BB905A05B18D
                                                                                                SHA-512:494317BB8D2002387E67BEB77E269DD9BA441C8EAFE1314CA1312C4B14806858E50219A25B207686FCEEDFBDC58EB08B4C004ACC62A253502F48CCEA356F9733
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:attribute vec2 InPosition;....varying vec2 textureCoordinate;....void main() ..{...// We do not need texture coordinates. We calculate using position....textureCoordinate = InPosition * 0.5 + 0.5;.....gl_Position = vec4(InPosition, 0.0, 1.0);....}
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):24814032
                                                                                                Entropy (8bit):6.61377507951845
                                                                                                Encrypted:false
                                                                                                SSDEEP:393216:zOXVPufF3cxFp83+M4LAYaPEfCnxUQvXX//fHYU7vIFGvAtTMJL7zX3ZU7d:aJuWxFi+M4pWnxnn/3l71gT4Xod
                                                                                                MD5:52D1E3FA3C64EB023B5E2D0A14C582AC
                                                                                                SHA1:57B21E64028A7ABC9EC0939E0BE4A483B95C865F
                                                                                                SHA-256:FB5935F713A90F44E36268E7845233EEE431BF9D993B71369CAD0FF7B0118C30
                                                                                                SHA-512:CB100EEA7A4FDCD73D2B0CC02AEBDB228EA506637F6C6E9F164B76FF90A272F4E18D8F1C48F0F67B0D67E749DCFF29FB72532052F35B0C45071388168CCC8005
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...................................p...........!..L.!This program cannot be run in DOS mode....$.......R.4...ZP..ZP..ZP...P..ZPM._Q..ZP.Z.P..ZP.^Q..ZP.YQ..ZP.[Q..ZPM.^Q..ZPM.\Q..ZP._Q..ZPy..P..ZP..P..ZPM.[Q:.ZP.._Q_.ZPG.^Q..ZPy..P..ZPy.\Q..ZPz.^Q..ZP..[P..ZPy.[Q..ZP..^Q".ZP.._QN.ZP..^Q..ZP.._Q..ZP..ZQ..ZP...P..ZP..XQ..ZPRich..ZP........PE..L...z38e.........."......v....m...................@.................................m.{...@...........................W.......W.p.....|..............hz..9....}.0....]U.T....................]U.....8UQ.@...............,.....W.@....................text...J........................... ..`.uedbg..=n... ...p.................. ..`.rdata....;.......;..z..............@..@.data...`$%..`W......FW.............@..._RDATA...'....|..(...Dn.............@..@.rsrc.........|......ln.............@..@.reloc..0.....}......xo.............@..B........................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):17872
                                                                                                Entropy (8bit):7.153735246661642
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:mbWfhW7+Y3DGk8ZpH3GCJErK9LsS+Y3DGUGq8JN77hhcy:/+DGkiRBEYLsmDGt3hey
                                                                                                MD5:4B91D0429B73A1264196D33E68E34590
                                                                                                SHA1:3797ADBC0A7FA69C93E92F365A6C2752EB3159DA
                                                                                                SHA-256:8741EF421E17186E20EED219AE1C38999BD57BF655C69828C751ECC866F3C366
                                                                                                SHA-512:3EB4E8327587A3B9897B245C57EADEC72DF0A06564ECA6F3DD032289081B12E55EA3C8F29A1284FCD03A870F60BB9EAA55DDBB8EE41DD2F306B48A29C3EBD095
                                                                                                Malicious:false
                                                                                                Antivirus:
                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L...g..............!......................... ...............................0......e.....@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@....g...........;...T...T.......g...........d...............g.......................RSDSi?...e.t[l.W.Y.....api-ms-win-core-console-l1-2-0.pdb..........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02....................g.......................(...l...........&...I...k...................[...................,...Z...................=...^...................I...v...................K...r.........................................api-ms-win-core-consol
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):17360
                                                                                                Entropy (8bit):7.148717476886636
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:mXQWfhWPe+Y3DGk8ZpH3GCJEFxJo7+Y3DGEM98JN77hhuV:eBIaDGkiRBEaDG83hwV
                                                                                                MD5:8153A83C61B397EC05126E100C1EBC43
                                                                                                SHA1:44FDAD765281C9EFF2956A77AAE2F4918EC6D365
                                                                                                SHA-256:076B0C0FC207608E2866383A2E37EE8E876AFDD067B4CD2BDB32250764218835
                                                                                                SHA-512:920945108097B4B758AFD7A21BDEF58B6075B19F192C387C1885484F3FFCBA8F2F799395952AA6555574DE8E520E0C53135F2125C6EE8A8C5255080F24EB84A1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L.....1............!......................... ...............................0............@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@......1.........<...T...T.........1.........d.................1.....................RSDS..gi...R....7.....api-ms-win-core-datetime-l1-1-0.pdb.........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02......................1.....P...............(...8...H...................t.......................api-ms-win-core-datetime-l1-1-0.dll.GetDateFormatA.kernel32.GetDateFormatA.GetDateFormatW.kernel32.GetDateFormatW.GetTimeFormatA.kernel32.GetTimeFormatA
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):17360
                                                                                                Entropy (8bit):7.224137599556334
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:mPWfhWG+Y3DGk8ZpH3GCJEFxaD+Y3DGELOFG8JN77hh22:PtDGkiRBEyDGbFh3hA2
                                                                                                MD5:7C4F941EABFA3285C56B812C190D5A48
                                                                                                SHA1:1E316D51EEEF1467FD7DDF4BE55504A78239A148
                                                                                                SHA-256:78347E7862ADC452CDF178B06D1CCF7401162838D320BD74C6CE34FF1804EB95
                                                                                                SHA-512:DF3C343A252C44492DFD1F1DC9D048140788B4BE912A0792354EB37F5CE0188E5B5DDE63C4658B358F98005D98F93F6A8D6698FB7C8997F8D20B3BACCD4D2711
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L.................!......................... ...............................0............@.......................................... ...................9..............T............................................................................text...}........................... ..`.rsrc........ ......................@..@...............8...T...T..................d......................................RSDSD..H]F..$.JN..=....api-ms-win-core-file-l2-1-0.pdb.........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02...................................D...p...............#...P...................;...g...................<...m...............%...Z.........................api-ms-win-core-file-l2-1-0.dll.CopyFile2.kernel32.CopyFile2.CopyFileExW.kernel32.CopyFileExW.Crea
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):16848
                                                                                                Entropy (8bit):7.247430853810146
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:m4rGpWfhW8+Y3DGk8ZpH3GCJEFx5v394qxq+Y3DGEY8JN77hhelG:xGeXDGkiRBE9vN4q4DGu3hQlG
                                                                                                MD5:4AB8150E796F0CA19F4AD2FB64150646
                                                                                                SHA1:FF15AAEFF3DBC40129C467A135DDA60BF3117735
                                                                                                SHA-256:BB37792496D6BA917BEB211D3976A82D4F9DCCB6F6B9FB87F9491E0CA82BF947
                                                                                                SHA-512:5EF0EED7E6FEA932336C953D3A571091E73DA4D61C73B05380B2180C70E16D8DD34AF8E5D289B89CED43389E547C6CDB5693DB40CF76FCA22A094E15FE0EB381
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L....6.............!......................... ...............................0.......v....@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@.....6..........>...T...T........6..........d................6......................RSDS.E._).(.*R..&.......api-ms-win-core-rtlsupport-l1-1-0.pdb...........T....rdata..T........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.................6......F...............(...4...@...~...........l.................api-ms-win-core-rtlsupport-l1-1-0.dll.RtlCaptureContext.ntdll.RtlCaptureContext.RtlCaptureStackBackTrace.ntdll.RtlCaptureStackBackTrace.RtlUnwind.ntdll.RtlUnwind.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):18384
                                                                                                Entropy (8bit):7.103823239247684
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:m6Y3eRWfhWFI+Y3DGk8ZpH3GCJErS2B+Y3DGU8J8JN77hhAAB:pGCcDGkiRBExDGQ3hK6
                                                                                                MD5:4A643A9B6C4A6DC39C9BE0FED6792FAC
                                                                                                SHA1:00B071365192D22067C9A31E41F69B15B0DC1E64
                                                                                                SHA-256:C737F548852321F30520ABC558546CD62AB35AB101903D109CD369C49682ABDD
                                                                                                SHA-512:D9556388B146371F2E576205214AB640E81A5E98B6701C24A8A29C45B06A98DB4EB3613AE28826A1B022B2ECB4C2F7D7E87C1C6B6818C3D9E07B71B8CEBA50DC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L....-.............!......................... ...............................0.......x....@.......................................... ...................9..............T............................................................................text............................... ..`.rsrc........ ......................@..@v....................-..........7...d...d........-..........d................-......................RSDS..y....o.e(.........api-ms-win-crt-heap-l1-1-0.pdb..........d....rdata..d........rdata$zzzdbg............edata... ..`....rsrc$01....` .......rsrc$02.........-......6...............(...........c...................S.......................1...V...y.......................<...c...........................U...z...............:...u...................&...E...p.......................,...U...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):23504
                                                                                                Entropy (8bit):6.900379472394773
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:miZpFVhXWfhWS+Y3DGk8ZpH3GCJEr658R+Y3DGU+8JN77hhW2:b+NDGkiRBERPDGa3h82
                                                                                                MD5:E864FFC0D71C3EFBEA0BEC283BC0921E
                                                                                                SHA1:4D4BB35EC424DE6C54E20B94D2AE81F0A132525F
                                                                                                SHA-256:0FA1970365DE9B681A2025E33FB4A18EE509286FA6288EFD3265FC2F2AB98BBF
                                                                                                SHA-512:6A68749F8C5E8D60D127C19DF225AC3813199F7D45BEDA6256BB51756E4205A22F6DA27994BB485B8E6F5203998C0322905F7C3975B59A0390493F4DE3C21F14
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L...1.............!.........................0...............................@............@.............................a............0..............."...9..............T............................................................................text...a........................... ..`.rsrc........0......................@..@v...................1..........8...d...d.......1..........d...............1......................RSDS....i..y.FBW.}.....api-ms-win-crt-stdio-l1-1-0.pdb.........d....rdata..d........rdata$zzzdbg.......a....edata...0..`....rsrc$01....`0.......rsrc$02........1......^...............(....... ...................<...y...........)...h........... ...]...............H...............)...D...^...v...............................T...u.......................9...Z...{...................0...Q...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):23504
                                                                                                Entropy (8bit):6.886972961049936
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:mEiFMx0C5yguNvZ5VQgx3SbwA7yMVIkFGlTWfhWK+Y3DGk8ZpH3GCJEr96/reYrW:z6S5yguNvZ5VQgx3SbwA71IkFD1DGkiw
                                                                                                MD5:18422C38DEF645AD0486C1314BC0D5AA
                                                                                                SHA1:36CC7176357C418F01CC3AA9829E0C61AC4ECA7F
                                                                                                SHA-256:A5ED1A22EB5E3AC01780A50ABE4C6EAC33A13D07D9863CBDFB549EBD55CB18F1
                                                                                                SHA-512:52CF57B22ADAA77DBFF77ABB9C56C76346F429D1A268E286E149B3FE64236901B0DDCF9003AC3D41BDC7C5D7C991216D2F6F659FBB25DAC6FF2DCB6F4D9FDF5D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.PE..L...#............!.........................0...............................@.......6....@..........................................0..............."...9..............T............................................................................text............................... ..`.rsrc........0......................@..@v...................#.........9...d...d.......#.........d...............#.....................RSDS.Hx..iz.u..X..+)....api-ms-win-crt-string-l1-1-0.pdb............d....rdata..d........rdata$zzzdbg............edata...0..`....rsrc$01....`0.......rsrc$02....................#.....,...............8...........W...s.......................#...B...a...........................<...[...z.......................;...[...{................... ...A...b...........................<...X...r.......
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):248272
                                                                                                Entropy (8bit):6.687157681428619
                                                                                                Encrypted:false
                                                                                                SSDEEP:6144:Y2y3hhQZpA2C/VFuGEcL6hmDCYfM1+/e7VR8AocazlBQdSkIuVxRYy12z/VszBRA:At+zsM1+WkzRuVxRYPzS/o
                                                                                                MD5:8C5B8534B0C109DB8A5A5AB87D12694D
                                                                                                SHA1:EA90974A783DBED4A75C21B99B41D5CBB654F76F
                                                                                                SHA-256:CEA5D28EF647C7E92B7A2D4079467E7B398DD2657D661CCFFBA22E1E644FE7D1
                                                                                                SHA-512:85933C706FA19ABF1B5A8E373F8D9D41DD7281791A2C62EEFF56D46FD8C1DD9D00824EA762D3A3455F9024065AB6E8AF4DAE0AC56329FE3A3F51D9215D4DC588
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........HD...D...D..../..F...M.~.N.......A...D..........O.......C...............E.......E.......E...RichD...........PE..L....h.].........."!.........x...............0......................................p.....@A.............................K..<r...........................9.......+...;..8............................<..@............p..8............................text............................... ..`.data....4...0...2..................@....idata.......p.......N..............@..@.rsrc................`..............@..@.reloc...+.......,...d..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):171472
                                                                                                Entropy (8bit):6.8632776689309605
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:CZBtkzIR4IBNvjmKJ7VDoeRLaauW4OIU7bhI/D:CZjNvjmKAeRuauW4OIk+D
                                                                                                MD5:05963BB57765610B241F909C61222B54
                                                                                                SHA1:C8BE433CAEB7B40F43A293F0080ADAF361EC9CDA
                                                                                                SHA-256:3B8D61A4A9B13C073623D17E423763C89F76B76623818F22BD5CFC678717DEB2
                                                                                                SHA-512:E8B59F0672CF1E7D0E4ECFA109114672202DCC94D31CDA6D2E9A308E2E50B833AB827D80DB043889599E77F74DED66E7D54700BC96A6D1FC147A062C33E195A2
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......[..,.............p........g.......~......~........{.....~......~......~.............~....Rich............................PE..L....h.].........."!.....(...<...............@......................................w.....@A........................p1..@....Q.......`...............d...9...p..H....\..8............................\..@............P...............................text....'.......(.................. ..`.data... ....@.......,..............@....idata..`....P.......4..............@..@.rsrc........`.......B..............@..@.reloc..H....p.......F..............@..B........................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):267216
                                                                                                Entropy (8bit):6.588374771004298
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:bELZACU+1yBQ3lC9GDBKUW4m0CuQKD2gyZ2KMHWyKMvCyyOaHJ:b43sJZduQKDfKxjJ
                                                                                                MD5:8B0AC8B28ACFF4A4D2E73C81D1B87C07
                                                                                                SHA1:9D6F157A80F956AA2C1F4D56C8B639E64BEAF78E
                                                                                                SHA-256:C213D8F19D6E3646F89F57B35A117CD817D45E475DAE24022B1AA0A9A00500A2
                                                                                                SHA-512:43171085B51F974CEAA9F68CA8BCD91AE3017798857A9F104DF883359F2D8D68F802505AE2341AC4938BA25CD0C33E09ADAF3F2DF163D7C827E5F9F5749C67CF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............n.W.n.W.n.W..YW.n.WJ..V.n.WJ..V.n.WJ..V.n.WJ..V.n.W+.%W.n.W.n.W.n.WJ..V.n.WJ..V.n.WJ.5W.n.WJ..V.n.WRich.n.W................PE..L...$k.].........."!................................................................4)....@A.............................=...............................9.......T..pJ..8............................J..@............................................text............................... ..`.data....p.......n..................@....idata...............p..............@..@.rsrc...............................@..@.reloc...T.......V..................@..B........................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:Generic INItialization configuration [GatherTextStep0]
                                                                                                Category:dropped
                                                                                                Size (bytes):2536
                                                                                                Entropy (8bit):4.843153305065177
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:rB5TP7ZzQf1v1Y9aVfXwdwuPjRa+c1GYmTp1mTccXd:1dP9IduYGYmTpUTcct
                                                                                                MD5:182B94417A7CC0873EB923A6184106F7
                                                                                                SHA1:E9A2EEF7949931BD90D60577537EB6183E6EC3FD
                                                                                                SHA-256:D8EB752E6BBF0481025F1ABDEC7005775F12E0AF645350C9888ADD89E02D8D47
                                                                                                SHA-512:2E48184F21DDA5E3CB9CF64D6179B232AD3C3AE85C8B8AF486777300B95C63799B4F6BC36ED3C18A2D4B3AC1039F4FDF075A8088831855DABA0E7D6BD2ED02A6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:;Gather text from source code..[CommonSettings]..SourcePath=../Portal/Content/Localization/App..DestinationPath=../Portal/Content/Localization/App..ManifestName=App.manifest..ArchiveName=App.archive..PortableObjectName=App.po..NativeCulture=en..CulturesToGenerate=en..CulturesToGenerate=ko..CulturesToGenerate=ja..CulturesToGenerate=zh-Hans..CulturesToGenerate=zh-Hant..CulturesToGenerate=de..CulturesToGenerate=fr..CulturesToGenerate=es..CulturesToGenerate=es-ES..CulturesToGenerate=es-MX..CulturesToGenerate=it..CulturesToGenerate=ru..CulturesToGenerate=ar..CulturesToGenerate=pt-BR..CulturesToGenerate=pl..CulturesToGenerate=tr..CulturesToGenerate=th....[GatherTextStep0]..CommandletClass=GatherTextFromSource..SearchDirectoryPaths=../Portal/Source/..SearchDirectoryPaths=../Portal/Plugins/Online/..SearchDirectoryPaths=../Portal/Plugins/Social/Source/..SearchDirectoryPaths=./Source/Runtime/Online/BuildPatchServices/..SearchDirectoryPaths=./Source/Runtime/SlateCore/Private/Fonts/..SearchDirecto
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:Generic INItialization configuration [GatherTextStep0]
                                                                                                Category:dropped
                                                                                                Size (bytes):406
                                                                                                Entropy (8bit):4.8682639760409465
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:RYvafvWG/uyKFyxNW9tVkuAMrH1Cv/ly8CJd+oUuFuXo8uHMWuA6:avafuGGyeyxmRAMTcvNyV/Uy8o8sjuv
                                                                                                MD5:96EC04DB88ACDE6C03534BB21DC33C4F
                                                                                                SHA1:98802454B7954AA314AA31104157783CC4E188B5
                                                                                                SHA-256:48733147980A8C27DE86F56B8C08A8B4002D61911A45EC26BB3719418FB07BC6
                                                                                                SHA-512:92F58E034A7BFD88846DEBC107FDFB7C99E00298283A355AD72D0B75979623ABF4B061FD6EC003A1C53BE6A122AB9DCC807E34A073B69755BBC6914B70EE0A2D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:[CommonSettings]..DestinationPath=\\epicgames.net\root\UE3\Localization\WordCounts....;Write Text Localization Report for Launcher App..[GatherTextStep0]..CommandletClass=GenerateTextLocalizationReport..bWordCountReport=true..SourcePath=../Portal/Content/Localization/App..ManifestName=App.manifest..CulturesToGenerate=ko..CulturesToGenerate=zh..CulturesToGenerate=ja..WordCountReportName=LauncherApp.csv..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:OpenType font data
                                                                                                Category:dropped
                                                                                                Size (bytes):77068
                                                                                                Entropy (8bit):5.564962637120109
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:/xUQ7Pceijik1wQwVnJlxY7eA1qqjRNa:/x/rceijik1S1YKAtna
                                                                                                MD5:AFF3816458DB70AB4F77058C0E1C95E1
                                                                                                SHA1:3AE85C92BEE209D20076244DEEC96B837D40C25A
                                                                                                SHA-256:316E61D5DCAE18705AA4EA45544701D62F71B90C06D28124DD8D27E54362D3D2
                                                                                                SHA-512:8482574D9894951371AD015FD6A0A737B00F772A53405131C6E187C7F845EA6F1719DC9314ECD57560F3FA16F7B30760F8521853968223121DF065F65FED858C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:OTTO.......0CFF .dQf........GPOS.Z.v...p..o.GSUBlF.........NOS/28......L...`cmap K[w.......Phead...........6hhea.......4...$hmtx.olM...X....maxp..P.........name>..~........post...2..,.... .........BrutalType....+...................\.....L......."......................$.+.1.7.=.C.I.O.V.].g.q.x............................................... .'.-.:.G.M.S._.f.l.r.x.~......................................... .'.0.9.@.G.N.U.\.c.j.q.x............................................... .'...5.<.C.J.Q.X._.f.m.t.{...............................................#.*.1.8.?.F.M.T.[.b.i.p.w.~.............................................'.3.:.E.N.V.^.h.q.z.................................).8.G.U.a.m.y................................. .,.8.>.I.T.d.o.}.........................O.Znbspaceuni00ADAmacronamacronAogonekaogonekCacutecacuteCcaronccaronDcarondcaronEmacronemacronEdotaccentedotaccentEogonekeogonekEcaronecaronuni0122uni0123ImacronimacronIogonekiogonekuni0136uni0137Lacutelacuteuni013Buni013CLcaronlcaronN
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:OpenType font data
                                                                                                Category:dropped
                                                                                                Size (bytes):5598136
                                                                                                Entropy (8bit):7.43855846663227
                                                                                                Encrypted:false
                                                                                                SSDEEP:98304:k8e8gk6xZdQ7eCjC7S5Jy+MAwAkX5nFCSSrdP9JR7jUKINnUpcV3QSIZdtyV4tvQ:k8Zgk6xZ+POYJy+uFENx9P7jpG9B5Cd6
                                                                                                MD5:48C0572B995C73023FA5126531875F27
                                                                                                SHA1:53D84407546EAF3750E29C615BE922A635CDB34D
                                                                                                SHA-256:FD53D8A66A876179A3EC64C877253BC95F38676AA733A3AD8B102507AD2198D9
                                                                                                SHA-512:D25676FCA1B1774430D2C0706F093AD0D86C1B5ED5731AE069EBDF9E95C44C2C10C79668171D0BF07B3E8921CCA9D8D921FBE86BA4D7057704F83B092DCA48AE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:OTTO.......`CFF .........P..GPOS....S_x....GSUB.....T....%.OS/2.....Q....`VORG4....T%.....cmap.....Q....y9head..`t.P.....6hhea..Z..Q....$hmtx.J..P....D.maxpQ*P.........name..Z..Q......post...2.S_X... vhea..g..Uk....$vmtx3....T)...B...P.Q*...........NotoSansTC-Light....V....................*...w......q.................O........"....Q.......%..K...$................y.............$.<.V.n...............6.V.y..AdobeIdentityCopyright 2014, 2015 Adobe Systems Incorporated (http://www.adobe.com/). Noto is a trademark of Google Inc.Noto Sans TC LightNoto Sans TCNotoSansTC-Light-AlphabeticNotoSansTC-Light-AlphabeticDigitsNotoSansTC-Light-BopomofoNotoSansTC-Light-DingbatsNotoSansTC-Light-DingbatsDigitsNotoSansTC-Light-GenericNotoSansTC-Light-HDingbatsNotoSansTC-Light-HHangulNotoSansTC-Light-HKanaNotoSansTC-Light-HWidthNotoSansTC-Light-HWidthCJKNotoSansTC-Light-HWidthDigitsNotoSansTC-Light-HangulNotoSansTC-Light-IdeographsNotoSansTC-Light-KanaNotoSansTC-Light-ProportionalNotoSansTC-Light-Propor
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):184
                                                                                                Entropy (8bit):3.838633147388876
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:wq/AVBukKcIliWLo5/lAW07llzXlSL1SERoll/mVllAlm+SJWljt/ItELitldIt2:wKeVKlM5/lAbhl5EEbm+PmtEG6tE/
                                                                                                MD5:AE9ACD1FB33FC98E55DA1A9F92D9665D
                                                                                                SHA1:05BEFC38F6A42FA9F6020A083FB484AA6CC7C3DD
                                                                                                SHA-256:238C69B3A1C30530DBA8C1E9A9A9E44B99D41CAD2E1F4E26B660A59C881E4EDE
                                                                                                SHA-512:9846199C8E2FE67A1163D96A4AB0EA50B8EB070013B7E061269CBEB73739777C4D2B16D9EC1DC91938978EAEA8009975DABB6C9A4C537EB9A0E0D34C7994BB70
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:O.L.hHU.lLF.p.P|.....en.....en/App.locres.........ar.....de.....en.....es.....es-ES.....es-MX.....fr.....it.....ja.....ko.....pl.....pt-BR.....ru.....th.....tr.....zh-Hans.....zh-Hant.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):119333
                                                                                                Entropy (8bit):4.88211447225401
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:AQmafDGWrpfZp5WR5mRQGnAVIUFS58U0Y01EasWcyRZGEQ0x87XQtd9gs:FmafDVXp5o5mRQLVIUlpG74ZGE8qv
                                                                                                MD5:81DE46A9B58C43129003132F36004C35
                                                                                                SHA1:20E73629EB4AF646D37240B10BBC382B43A4B755
                                                                                                SHA-256:CB551780F80744B5D4F4F64C98B2539DB390253E912B0A94F7722D1ACA85E168
                                                                                                SHA-512:7B5779401CE831FCE66A92FD7EEEA32380C47FF87D0FFA0AFD4D25F45CBB0059FB62CB013C6F6A7A89535B08E58380091905463F4F06B018F8116DF9E38AB21A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..tugJ..J....7..........&...=............k......h....FriendToastAlreadyRequestedFmt..R.............FriendToastPlayerBlockedFmt.........b.......DownloadComponent_Required............)...SystemRequirement_ProcessorCoreCount_One..^X.....4...(...SystemRequirement_HddAmount_Recommended.@s.g....`wW.'...SystemRequirement_MemoryAmount_Sixteen..W.Z.....D.#...SystemRequirement_MemoryAmount_One.F.......E..^)...SystemRequirement_ProcessorCoreCount_Two.~.'T.......$...SystemRequirement_HddAmount_Minimum..Fo.......x.....LocKey2DAssets.............#...SystemRequirement_MemoryAmount_Two..5.......s.Z*...SystemRequirement_ProcessorCoreCount_Four.0..Q......+.$...SystemRequirement_MemoryAmount_Four.V..~....?9..+...SystemRequirement_ProcessorCoreCount_Eight....Z....v..%...SystemRequirement_MemoryAmount_Eight...{....W?tE....CabinedMode_MessageLink..{........l.,...RunningWithMissingSystemRequirementsWarning.N.=.....;C......ProjectFilePathTooLong...R.......Q&...FriendRequestNotification_Description....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):121870
                                                                                                Entropy (8bit):4.89970118059248
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:2QlYqCMWiQRv1dF19AiMXG9yeCBWVXCK+AHtKfArb/ixOsVJT:rlYD7RvXF19T9y4RUAnIr
                                                                                                MD5:C403A2BDE9FDCFA5C331031EDD65C2A5
                                                                                                SHA1:80A28C1CFD60F121B17FC6E39CB541B19BAEAA53
                                                                                                SHA-256:D57FABF9D27001EB040D171232AC7CF7CA6A02E033F23B1723B58C191C82D4DA
                                                                                                SHA-512:06AEF3C80E4B9F89FFCA0D594515BA546042E4AE2A92DB4070302C27ECFCFEA0CE85BFA29DAF3F112692C12DC26419D686635766E91A8DD030D7DCD34EFB9320
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..tugJ..J....7...".......A...>...................h....FriendToastAlreadyRequestedFmt..R.............FriendToastPlayerBlockedFmt.........b.......DownloadComponent_Required............)...SystemRequirement_ProcessorCoreCount_One..^X.....4...(...SystemRequirement_HddAmount_Recommended.@s.g....`wW.'...SystemRequirement_MemoryAmount_Sixteen..W.Z.....D.#...SystemRequirement_MemoryAmount_One.F.......E..^)...SystemRequirement_ProcessorCoreCount_Two.~.'T.......$...SystemRequirement_HddAmount_Minimum..Fo.......x.....LocKey2DAssets.............#...SystemRequirement_MemoryAmount_Two..5.......s.Z*...SystemRequirement_ProcessorCoreCount_Four.0..Q......+.$...SystemRequirement_MemoryAmount_Four.V..~....?9..+...SystemRequirement_ProcessorCoreCount_Eight....Z....v..%...SystemRequirement_MemoryAmount_Eight...{....W?tE....CabinedMode_MessageLink..{........l.,...RunningWithMissingSystemRequirementsWarning.N.=.....;C......ProjectFilePathTooLong...R.......Q&...FriendRequestNotification_Description....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):92529
                                                                                                Entropy (8bit):6.182706569771407
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:3vxBPg7imb9TFqZurLiY2xIIM4E+vxW+rCqmmkaheuVBFS5XFb1N:jPKP9po8LifbEpBmtheuVBFS5XFbH
                                                                                                MD5:59D496A88AAC240DFD07EBA428BB81F6
                                                                                                SHA1:E86A5BE876415E46B910986B4B9BE79BF1203596
                                                                                                SHA-256:68131D7805655542AAC873CE3563968F1531163216C267025AC0BA9738E1A4C3
                                                                                                SHA-512:8D29AEED681E49A76AEFB43C202588E97043269453916E8547E1CEF6D3C4EB22BC7965BADEFA30397EF00C8DBD165D3FEFFA99600E9CC3A710DF6050A71E983D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..tugJ..J....7..........+...<............f......h....FriendToastAlreadyRequestedFmt..R.............FriendToastPlayerBlockedFmt.........b.......DownloadComponent_Required............)...SystemRequirement_ProcessorCoreCount_One..^X.....E..^)...SystemRequirement_ProcessorCoreCount_Two.~.'T......x.....LocKey2DAssets..........s.Z*...SystemRequirement_ProcessorCoreCount_Four.0..Q....?9..+...SystemRequirement_ProcessorCoreCount_Eight....Z....W?tE....CabinedMode_MessageLink..{........l.,...RunningWithMissingSystemRequirementsWarning.N.=.....;C......ProjectFilePathTooLong...R.......Q&...FriendRequestNotification_Description..........WC"...SelfUpdateNotificationDescription..*vP....!.~."...NewEngineNotification_Description.io..........%...VaultNewItemNotification_Description.........%.......ProjectPathTooLong..g......z...&...LibraryMyProjectsTutorial_Description....".....$..#...RealIdVerification_VerifyIdCommand.........8.......RealIdVerification_Title..}.......|.%....AcceptEulaUserCommand_N
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):127055
                                                                                                Entropy (8bit):5.417477440001432
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:8SAaPqDPrGIuxlYqSGuYQVIP9KYuS39DoMXZqLGoeL8gXB:JAayDqIclYqLQVIP9hNDRpqLPeL8gXB
                                                                                                MD5:130C021FF0CD4E1FC3F75205078EAA90
                                                                                                SHA1:1B66E0B940F54F91D7B774B2D27348500FDC6814
                                                                                                SHA-256:AE737ADEE34C768E933C6830496B90CBA482F51110A7F3D98E74F5054ABDD298
                                                                                                SHA-512:5C1AF0FD3DFA66DFA91B4D5FFDB82503866A5F680EC0933D1291377FBA3FF6B852007E04D9208E9C7B57B73A8A20F7E7171DB777DC1BFBE645C011A8B9FB0943
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..tugJ..J....7...........:...:............r......h....FriendToastAlreadyRequestedFmt..R.............FriendToastPlayerBlockedFmt.........b.......DownloadComponent_Required............)...SystemRequirement_ProcessorCoreCount_One..^X.....4...(...SystemRequirement_HddAmount_Recommended.@s.g....`wW.'...SystemRequirement_MemoryAmount_Sixteen..W.Z.....D.#...SystemRequirement_MemoryAmount_One.F.......E..^)...SystemRequirement_ProcessorCoreCount_Two.~.'T.......$...SystemRequirement_HddAmount_Minimum..Fo.......x.....LocKey2DAssets.............#...SystemRequirement_MemoryAmount_Two..5.......s.Z*...SystemRequirement_ProcessorCoreCount_Four.0..Q......+.$...SystemRequirement_MemoryAmount_Four.V..~....?9..+...SystemRequirement_ProcessorCoreCount_Eight....Z....v..%...SystemRequirement_MemoryAmount_Eight...{....W?tE....CabinedMode_MessageLink..{........l.,...RunningWithMissingSystemRequirementsWarning.N.=.....;C......ProjectFilePathTooLong...R.......Q&...FriendRequestNotification_Description....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):119457
                                                                                                Entropy (8bit):4.8400705953091085
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:9a3oweT5TU24z73qnokLB6Hs2pHheUnafDVQFb:9a3of424fqnBKsQYi
                                                                                                MD5:B79BE4CFB5AC286876995C832210F30B
                                                                                                SHA1:69FEC01EF80E5D8916C25F9CD56A6472D7340853
                                                                                                SHA-256:537BBC99405DAF3533EF491BEAC34A9955F80085F3BFA036DC22EE0D0EE11649
                                                                                                SHA-512:FC0C5B38CD8B2DDEBE8B5732674EA8A93DF64FACEB983F27001B8FB0E70472B763CD7D08F52A28AEC52A2549DFF19528217FB5AC24C36A445CDFC630D5F0C134
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..tugJ..J....7....R......N...............S.C.l.o.u.d.S.a.v.e.C.o.n.f.l.i.c.t.R.e.s.o.l.u.t.i.o.n.I.m.p.l._.T.i.m.e...G..........S.t.a.t.u.s.S.t.r.i.n.g.F.o.r.m.a.t...G..........F.r.i.e.n.d.T.o.a.s.t.A.l.r.e.a.d.y.R.e.q.u.e.s.t.e.d.F.m.t....R..........F.r.i.e.n.d.T.o.a.s.t.P.l.a.y.e.r.B.l.o.c.k.e.d.F.m.t...............P.r.o.d.u.c.t.N.o.t.i.f.i.c.a.t.i.o.n.B.a.d.g.e.0...G..9........D.o.w.n.l.o.a.d.C.o.m.p.o.n.e.n.t._.R.e.q.u.i.r.e.d...............A.s.s.e.t.V.e.r.s.i.o.n.S.e.l.e.c.t.o.r._.N.o.V.e.r.s.i.o.n.S.e.l.e.c.t.e.d......s........N.o.t.i.f.i.c.a.t.i.o.n.B.a.d.g.e....@.i........O.n.e.C.h.a.r.a.c.t.e.r.O.v.e.r.L.i.m.i.t.F.m.t...$..........S.y.s.t.e.m.R.e.q.u.i.r.e.m.e.n.t._.P.r.o.c.e.s.s.o.r.C.o.r.e.C.o.u.n.t._.O.n.e....^X.........F.r.i.e.n.d.P.l.a.y.i.n.g.....R........S.y.s.t.e.m.R.e.q.u.i.r.e.m.e.n.t._.H.d.d.A.m.o.u.n.t._.R.e.c.o.m.m.e.n.d.e.d...@s.g........S.y.s.t.e.m.R.e.q.u.i.r.e.m.e.n.t._.M.e.m.o.r.y.A.m.o.u.n.t._.S.i.x.t.e.e.n....W.Z........S.y.s.t.e.m.R.e.q.u.i.r.e.m.e.n.t
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):84403
                                                                                                Entropy (8bit):6.163657449592362
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:wvAGLKHjLubVLugV4uBj2iIVxUsuyIBfR3DLWm8m:PGL8+b5us4qLIVxUsuDR3DLWm8m
                                                                                                MD5:3C92003E50D2B24B4A9A627B2F47E9FB
                                                                                                SHA1:17FD18C4FAD3C83C872E93A63D85E0D6DC67EA10
                                                                                                SHA-256:1EBE495E88B2B897EB5F84CD2E10598761F80803C4033CEDCDC86EA7C30B9223
                                                                                                SHA-512:5D5D017B9BD5E8869CD6ACA08C32FC188F37EDCCF00BAF9952532BD2E60E6E94DC5D93F4923D9D47CF8582578EA3FF95EFA3A319DEF4B05EF9698B93FFFC6F0F
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..tugJ..J....7...L.......?...A............}......h....FriendToastAlreadyRequestedFmt..R.............FriendToastPlayerBlockedFmt.........b.......DownloadComponent_Required............)...SystemRequirement_ProcessorCoreCount_One..^X.....E..^)...SystemRequirement_ProcessorCoreCount_Two.~.'T......x.....LocKey2DAssets..........s.Z*...SystemRequirement_ProcessorCoreCount_Four.0..Q....?9..+...SystemRequirement_ProcessorCoreCount_Eight....Z....W?tE....CabinedMode_MessageLink..{........l.,...RunningWithMissingSystemRequirementsWarning.N.=.....;C......ProjectFilePathTooLong...R.......Q&...FriendRequestNotification_Description..........WC"...SelfUpdateNotificationDescription..*vP....!.~."...NewEngineNotification_Description.io..........%...VaultNewItemNotification_Description.........%.......ProjectPathTooLong..g......z...&...LibraryMyProjectsTutorial_Description....".....$..#...RealIdVerification_VerifyIdCommand.........8.......RealIdVerification_Title..}.......|.%....AcceptEulaUserCommand_N
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 25 x 42, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):1308
                                                                                                Entropy (8bit):6.852237502717288
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:e/1hpunQWwjx82lY2T32HEVRzDZzLyJ3VuCzq3nz8GtT+8YxwEhraTSoH2:eNitNn2V/ZGJ3wwS8EY+qaXH2
                                                                                                MD5:4612417B04BD2AD36428505187C670B9
                                                                                                SHA1:ABFAD8FF9C2AC5B0CCC7891C3BD593C7C28918F1
                                                                                                SHA-256:8A2A175258525E35F3938F621342D6B3F0B6D4F4AD181C428C50D8F832F8A161
                                                                                                SHA-512:3BFC0A9B7F7C2A95966431E4E03AC6419F76D207C74AE412775CACC2F8B15E54DEF22CC2BFF5FC6FF9FD120774233E8FC77709D0BAB517093BD3457635441639
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR.......*.....F..`....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:7D505AAE216D11E4A91EE223E65513C3" xmpMM:DocumentID="xmp.did:7D505AAF216D11E4A91EE223E65513C3"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:7D505AAC216D11E4A91EE223E65513C3" stRef:documentID="xmp.did:7D505AAD216D11E4A91EE223E65513C3"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>........IDATx...GCQ....=......=..$z.!.S.Co...#..........}.1J).%..f.0.....9.....s...>v.....1&...(+...rI...0.!U.._/
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):1200
                                                                                                Entropy (8bit):6.522679056200555
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:b1hpunQWwjx82lY2T32HEV+bKdPLyJ3VOZiKnSbGHxpp2t7OCaFKhax:BitNn2VYQeJ3MZzkazMt46ax
                                                                                                MD5:15340F70A977D657E6254C6D459B558C
                                                                                                SHA1:6AD8615CF148BBE43E3777869A9861DA05FA2313
                                                                                                SHA-256:7F3E73F1EB832E8D2F0B6DFE1C284C62B979ADF1CAA3EBA518B5C75A718248CD
                                                                                                SHA-512:54ED8B528EABCB718CB67BF69803292377379A88A15BD8161187F8A61E7610257C92BD5852C5D958E91FEF3DB3387A19DAC8BD4F6E8D552FDE224987390D8E7C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR... ... .....szz.....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:B8C02CED643011E4AD80B6C79874A8A2" xmpMM:DocumentID="xmp.did:B8C02CEE643011E4AD80B6C79874A8A2"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:B8C02CEB643011E4AD80B6C79874A8A2" stRef:documentID="xmp.did:B8C02CEC643011E4AD80B6C79874A8A2"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>......&IDATx.b...?.@.&......u.....q..1..d/#..e.f..@.....s....`..f.......O.p...A..a. .HG...,...:...@.....b......ak .DC.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 21 x 21, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):1147
                                                                                                Entropy (8bit):6.441055684423205
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:+Ny1he91Wwjx82lY2T3ouVv6qyJ3VoPbNGFvrFESm59PZVcXomB:+NwqQNn2xeJ3+uRbmPPgXR
                                                                                                MD5:7885B14CE0D508431FD97F70FF163E19
                                                                                                SHA1:07BA0210373A4DAA9C9F48824434420280EE78AC
                                                                                                SHA-256:B0383F31C5E936A65B5BC9B319653183FF2FCE4D73EFC41AAB1A3CFBF42E4A99
                                                                                                SHA-512:3B2888E552ECB0591A0AE5E0AD774F1C4B92B38A2159CCDD9C9614856920FB2E66EEAD2DAFB189CC95460180E8F3F368DD825CB73B2681290F8EB667B363ADD0
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR.....................tEXtSoftware.Adobe ImageReadyq.e<..."iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS6 (Windows)" xmpMM:InstanceID="xmp.iid:724E60DBDCA311E8985EB71D4E896818" xmpMM:DocumentID="xmp.did:724E60DCDCA311E8985EB71D4E896818"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:724E60D9DCA311E8985EB71D4E896818" stRef:documentID="xmp.did:724E60DADCA311E8985EB71D4E896818"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>S.......IDATx.b....,......T. ....T4.......W(0..cdC/.......c01...:C......j... ..bAj.j.........{J.u..@|.....5....`,..@
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 41 x 41, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):229
                                                                                                Entropy (8bit):6.527961559934967
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:6v/lhPyWwX6Z6jYt11TnBvj1bx+TKlbllbp:6v/7EVYtbTnBvhbx+TKlBz
                                                                                                MD5:8A41D73F05DBFD9C896AD205B9FA3BD0
                                                                                                SHA1:8E331B99A4002DA9A90D3FD4DAEDF1E590CC2D46
                                                                                                SHA-256:C20DC130A6BF7B81EE61FA5DE42A811C65450B7B62DD4DD7A4A63F4AD8666BC3
                                                                                                SHA-512:46EB19D23B8196D8C8E98271B06836CADF4473CF5040EFF60EE1FE229A69BBACA75CBE681899E76D6514C1B44DDC078DAA79CE69642804BF6A1F91DBA1DA9CE6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...)...)......`......gAMA......a.....IDATX.....0.EQ.J.....I.}<O....7.n...Q...6.>...}}<.Z&...9Z.W?......c..9^.P...d.I(dDR.2.$.2")..G.......#...HJ@.BF$% .HB!#...y$...I..<.P...d...u.Qyy....i.d..m.....IEND.B`.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):230
                                                                                                Entropy (8bit):5.613616744686092
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:6v/lhPKwMDlM9RBNSZg7FJeFVD1rm4bbp:6v/7iwM5+BEcze1Pb1
                                                                                                MD5:F553CF85D9C29DAF80FCCA53A43C5AAE
                                                                                                SHA1:5936DE26F656CF3A44560215F7D4C7DC175E512D
                                                                                                SHA-256:F583EAA3F6579C19D0DE91DCCAB376324EA0BE5AB9DA5FDE5CDC303873338075
                                                                                                SHA-512:06E1B4187D70F71969C7E3EB23C13E5A9EAB980BDD2DF70F3B9961D1C40D2AF8FA223414E0295F16456BDC0BCE361CD8578F11EB4A927B45C374BAE2CB8BBA57
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR... ... .....szz.....gAMA....|.Q.... cHRM...........R...@..}y.....<.....s<.w....pHYs.................tEXtSoftware.paint.net 4.0.9l3~N...8IDATXG..1..0....`{m.o........$.I?PUw......................)n|N......IEND.B`.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 60 x 60, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):6262
                                                                                                Entropy (8bit):5.889952628677394
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:Yald1dRXtmgkrQR5a1jf6Ok0ISrwx4at2FiSaeg:Yk/Xtm7ooTkPLZSaeg
                                                                                                MD5:325118DE442B5F74B2345063434E9A96
                                                                                                SHA1:E14435404EC45ABC9DCED55681B819E7A4CA48EE
                                                                                                SHA-256:C934856C3B8C401C7CE6CE51AF18B789045CB7697D2A6DF012EF357F8D27BEB4
                                                                                                SHA-512:95567A22871E909045B772EA545C77BD8931535517B2EF7B40CC77D7B2DB042CA0B31B5FB4CB4DFE8B93519F3A86FFD7684C0AF065B7BD0B51300BA0C02D3297
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...<...<.....:..r...(zTXtRaw profile type exif..x..X[.#+..g.....@..y..........>..,'.$.........|.Y.YJUS..d..:5^.v...........!.......8=.\MCO>... ..,...tk..y......z@..vm+...q.}].......o.........`.Ni1q.=q..`.R....N\11rE...]oa..3.....;+..}1.F..;....`..t..m.....v.X.e\.mUo .w.Y....]..H...c+......yMq.|..r..U....|..;.AF..l.4..u.A.*.RA...Q>V.$K.a.../..........MO].kg.A..O..D.Fx#.....KA{.......z%w.......@......q...W..r`..`....n.r;.C4c...|....".-P...D%.R.%.B..+.i.T.4....I.Z....9....w...I.5...".....3......)....d.Q)R.)kVQ...Z..-..b.U..J.Zj..j.d..(.V..YkX.Ar....Z.s.]...k....g.!CG.5..m...qb.,.N.m.)..d.*..[m..6.e...n..........F...a.'.'kx.....p"...K..xq.`..9..rN..s.%x.$h)N.$g...EI6=...s/.......`.8u.....}...}...p7"...........T.'.o..W_.+.?&h..%c.e.4...xpB....I5.;.!.T....J2..oB..{..7\D3.}Ju#..V..p.,..:.......5By.Z.^esFD..O.D.k..x,...^N...66..H..+!#..3.9{..@)...).ge.................Q,|...*..T.....v.EC..kl..}..{.]Pj...x.pF..,..@....6....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 14 x 21, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):1061
                                                                                                Entropy (8bit):6.266755375918276
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:K1hpunQWwjx82lY2T32HEVm5Y06yJ3VRQhm/GEJq/4A2:oitNn2V2rBJ3YM/S/u
                                                                                                MD5:140D150202BC33B3353A233A5DFC6950
                                                                                                SHA1:E8353A4C3FD5F36BFE45023E2E1DC194A3EB0771
                                                                                                SHA-256:0BF3ACA3A64423B475B2A6FF1CAAC44E842E5122303A391F5E4EA2106DEDBD4C
                                                                                                SHA-512:91A348DF2CD684E3839B2F06767F26D3892A00A1AEDE12C3A828A6499D51619BC90D6F5D5388C863A047E18965AE5249F8E7D0959FF107E27D819D6D9B194A8E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR.............vY.....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:8543B8555E2411E4B6B68E73DD3D623E" xmpMM:DocumentID="xmp.did:8543B8565E2411E4B6B68E73DD3D623E"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:8543B8535E2411E4B6B68E73DD3D623E" stRef:documentID="xmp.did:8543B8545E2411E4B6B68E73DD3D623E"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.%'I....IDATx.b....8.3..A..T......1.9.A`/....n...9.A...[....~.q.9.a..\. ..=......X... p..9A.......8....yD...[-R.x..o.j\
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2775
                                                                                                Entropy (8bit):7.898602525619176
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:2ldHE8+JjpMNNa3OjboViS4nXsAYdPd3F58ZpiU54SN775OBf/6I8:2XHt+JcNgOSiS4XsAYNpf2ESNwSI8
                                                                                                MD5:D6DA7897790EA93A092E333368EB0247
                                                                                                SHA1:EA7EC2E57641A207D7A86EFFA8F724E9F8B3342A
                                                                                                SHA-256:6AEBBE8C5B9B75FA909E82C916FABD64BB6E815A3938C58D9BC74440F8F784C7
                                                                                                SHA-512:88F67FEEB53A74A4D7ADEA649E22E24DD67A35C43FF1FAC43F98BBFB1C67E1A8AFA81F6BCB00CA89A6C1E093747DD3096107D22CF87899A3915AA6D0DC0BBC35
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................a...9iCCPPhotoshop ICC profile..H..wTT....wz..0.R.....{.^Ea..`(..34.!...ED."HP..P$VD...T..$.(1.ET,oF.........o......Z..../...K......<....Qt.....`.).LVF._.{......!r._...zX..p..3.N....Y.|......9.,...8%K.......,f.%f.(A..9a..>.,....<...9..S.b...L!G....3..,....F.0.+.7..T.3...Il.pX."6.1...."....H._q.W,.d..rIK..s...t......A..d.p....&+..g.].R.......Y2...EE.4...4432..P.u.oJ..Ez...g.........`.j..-....-....b.8....o....M</..A...qVV....2.....O.....g$>...]9.La.....+-%M.g.3Y.......u..A.x....E.....K.......i<:...............Pc...u*@~..(.. ...]..o..0 ~y.*..s..7.g...%...9.%(....3........H.*...@...C`...-p.n.......V..H.....@....A1....jP..A3h..A'8..K....n..`.L.g`......a!2D..!.H... .d..A.P....B....By.f..*...z....:....@..]h...~....L.............C.Up.......p%....;...5.6<.?.........."....G..x...G.....iE..>.&2.. oQ...EG..lQ..P......U..F.Fu.zQ7Qc.Y.G4....G......t...].nB../.o.'.1.......xb"1I.....>L...f.3...b..X}..........*.Q.Y..v...G...p.(..........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):1470
                                                                                                Entropy (8bit):7.021929820030502
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:b1hpunQWwjx82lY2T32HEVh706ynyJ3VhJ0wMzAG9YbCB7zyKmrpCx+uJdGXSC38:BitNn2Vr7iyJ3rJ5OArFA4uJdIpu5
                                                                                                MD5:F22AE42B558FE179842B476FA6253FDD
                                                                                                SHA1:6682961EE769C50D28D0C8BD4AE6FE969F1BB566
                                                                                                SHA-256:EF078450D1673A559D16016EF68C01A1DFDBFFF5D7414A1CD69B01F9D675BB68
                                                                                                SHA-512:0FFE68CB85E164BC22E6134673C49845C4F0B0C5FD4E36A40C9872A62269780DC34FCB462D079A2062AA269E3E86B50CBD7956D01C668D5DE6B4B0D26FE6647E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR... ... .....szz.....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:1E46F869B62A11E49DFA9DEA806E1BF9" xmpMM:DocumentID="xmp.did:1E46F86AB62A11E49DFA9DEA806E1BF9"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:1E46F867B62A11E49DFA9DEA806E1BF9" stRef:documentID="xmp.did:1E46F868B62A11E49DFA9DEA806E1BF9"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..^....4IDATx....KTQ....J.C..G.EAd-l!H."n...E......]B....;....\....!-LJ.A..7b..?.5...^8...;.M....G.s....w.3.y^.<#.9..4
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 54 x 58, 8-bit/color RGBA, interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):1595
                                                                                                Entropy (8bit):7.857832835145131
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:5EITRneJp7WkNY6N1CWRxRoAAM+xyyQa5:LTku6N1CWxnq4yJ5
                                                                                                MD5:9AFA3988952640A2B3B8FB76D67D316B
                                                                                                SHA1:5E5C351DE9DBFCD4F3C353EFA31207D7BA3DE1BC
                                                                                                SHA-256:54C817007F95EEF76F0AD04F439A45BC4D390DC6D7E81F9F85476247C5FAE0AC
                                                                                                SHA-512:D30BA91B287945AA7B783DF0DACE8B54D1FFDC5361D8673E1828814CA371C98306AA0FEBA627019A562A976B13FD2B123B7F8022B9EAB3B62B662B945F3C6B6C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...6...:........0....gAMA......a.....IDATh..k..U....|..v..$..D.(E*.......=.p.....(H......I.%..B.....Z .`.A...V...<....>g.=3{..x6,...._k.3{.....i.F.!..=.>....(.N..K..G..`(.4.DL.!...1.lZ..U.....X.)....B..6.oY6....c{p.q......7h...!......c.H...-..8.C.N.])i.o5..B..X..EFv.H. ...D....g..brgX.F..t.s.....j&. ..$...u....s...t"...(..R0MB.74n...^A..).......$[:........c.t.-S.(.}.<..qR."V.Xf.B.A+`..)..z9.L.v.`...6u.;...:h.=.}!.A6.......N|H4....`.8.3..<....U...Em;.C...lh....D..ek4.....^[".n....>.d.6...-.(......S..B..Y.h.j..UN...8.p........s.5....0.>.l6.z.K,.a.56...h.......+.3.*..Y}.K8.x2)JJj.......$|[.-...*.lj...:.......x..k...../.%;.h...T..........f<..`;..}.h.n...;K7+.%G..k.P^...8.....J}PD.G..~.9K@.k.0.......o.H.=..~VL....=6.C.Bk...N..GzXo.../.f..Pd...0..".>[.k..m.'/".c.....`z...T...(.=rm.m......k.-..v..g[.-.1G.....[.#.....2^h.....z..^....6.y...R....m..S..l...c"...P....D..T.<\L.UyUE...X.z..i...s.4..m].`..i.....:.Qq...p^2....-..eT.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 94 x 19, 8-bit/color RGBA, interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):1676
                                                                                                Entropy (8bit):7.848625343220426
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:nZWHX5qIjr++shQUQ6mLiGJEiAAy0VqPm4SW8Rme9apoaN1/o6Y/ktJr2HyzJLp4:ZOs+sWUxxGJEHxz0megp1g6RnSHOJvx0
                                                                                                MD5:5A3AA6D5FD9C8C443E826359E816ADC1
                                                                                                SHA1:0F4F3D89372A577C11BF1342A29B3C214F5C9F6F
                                                                                                SHA-256:56938F614AE3F54A4525DEE3FC5C0CFA0FEE4EF362E051FA0CBDE164AD27CCA8
                                                                                                SHA-512:962871E2853FBE60310CA5E99FD8717EBAD68BB09D5E115921B2DB464A9DECD3672186727AA5FDFC647C1AEBA5F9BC2653A116997ABAC6BA5EA4156DBE65185E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...^.........n..J....gAMA......a....CIDATX..[.UU..=j.%HiE>T.......`.L....T....EX!i=.......B!.b&.F^(H2..HS.Q....c.W.?...=.\..c...c.1...c.5.........o..xZQ.7...O..Fz..G.<WZ......dl.z.C.wR..!.x.?,...RW...c.&<a1MI..P.q.$........_`.............Ne..((....l.pr.\v...G..._qP.7.n....d....Vs.;T....q..1|N..g...h..a...6.n..b........uAl........t.4Q.]...L;.b..Ic}..].,.=6.FAwB.dp..?..G.u..H.........t..%...5*.GNy.&..[..Pg&.7..5.$./&o.V..5..uu.e..Qk..[.....:.i.q.f..%..&.u/.....O.z$...~I@U].0A..g.w..Z.o .U>..E.$..o..2>..[.".L..."z.0n...r.uK..q=..y....Ekp.8.]`=:...?.G.-.m-.Y..dg.;q......;Z..'uzZSX?.]..~3......\..u9g.juy..sM....|E:.... B...&......#..<.^Q.J..p.#i....nOI.!.,...TkK\..v.E].i......V...<.(,.^..P."F.w...R?.8...r..4.w2.K...);p.F..G.:.!z....}.q=.;M{..'YlmJ.....@..G'|..q....??....n.s6.ol.i.O......j.......7.@.Zbx.W...V....h_.d~...@...M.....[/.y.os..>....I8@.M.....>....ZE.x...S.!.6j.2.X.......&;.M..9.qC..+.x]N.7...\.vz...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 8 x 8, 8-bit/color RGB, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):15605
                                                                                                Entropy (8bit):1.8831790296550144
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:mSZEZkIt+WsNXrNXpdns6l2sc5GvqRtmLvI:mSmkd5CRtmLI
                                                                                                MD5:FC5FA847162FC6C31CFC24BB049BA84A
                                                                                                SHA1:DB6D23032621FD0CBC63BCD5ECD87268A7E77332
                                                                                                SHA-256:4A8A8525313022197A961D3B7A5950AEE6CC414EA1D8DCD7DA8508ED714DD740
                                                                                                SHA-512:86A699D552C8CC132952A12DF3E3CCCA8D734C4660015882C36DE1D9C563DA6F8B86D5A64D254094ED2398281AC54436150FACA786768926684B0E5F957848B1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR.............Km).....sRGB.........pHYs.................tIME.....3..,:a....tEXtFile Name.White.png4}.<..<.iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 4.2.2-c063 53.352624, 2008/07/30-18:12:18 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:xmp="http://ns.adobe.com/xap/1.0/">. <xmp:CreatorTool>Adobe Photoshop CS4 Windows</xmp:CreatorTool>. <xmp:CreateDate>2014-02-21T18:19:21-05:00</xmp:CreateDate>. <xmp:ModifyDate>2014-03-01T14:51:08-05:00</xmp:ModifyDate>. <xmp:MetadataDate>2014-03-01T14:51:08-05:00</xmp:MetadataDate>. </rdf:Description>. <rdf:Description rdf:about="". xmlns:dc="http://purl.org/dc/elements/1.1/">. <dc:format>image/png</dc:format>. </rdf:Description>. <rdf:Description rdf:about="". xmlns:photoshop
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 100 x 100, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):1458
                                                                                                Entropy (8bit):6.951576515675073
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:D/1hpunQWwjx82lY2T32HEVfaEyJ3VZbGenjZwxp1/BL0SppYJrgi65:hitNn2VAJ3rxnjGb1/Rorgia
                                                                                                MD5:F5AE6ED4F6477623346760A551C76F9B
                                                                                                SHA1:59A3650F3646F76B5208EABC90659EE430FEFAEB
                                                                                                SHA-256:E816E9578481D8AEF3B1E2AE31C90ACD079CF3E72D1664F65E52078AE09A581D
                                                                                                SHA-512:5105246489A77C24D55480E9742E47757767E3D8A08436DEF391EBBE47A1F067B98A61CBBA74495E48B83CFA594C6AA2571D173ED4724EA2578B620A9002795E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...d...d.....p.T....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:D0176B67855D11E49C40B2CFB7253C4C" xmpMM:DocumentID="xmp.did:D0176B68855D11E49C40B2CFB7253C4C"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:D0176B65855D11E49C40B2CFB7253C4C" stRef:documentID="xmp.did:D0176B66855D11E49C40B2CFB7253C4C"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.#)....(IDATx...j.Q...{u..bcaa.+../`..m.......y..e+.46..@j....a.;73..FL.........V..?....:..I)e.`].Q.Q.Q.Q..........5.|
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 79 x 92, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2930
                                                                                                Entropy (8bit):7.894013269883458
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:SjhaZ1LxErX1lq2Eu2cCjQV7rxrCzwNKf1D9OXJyD85sN7frZpLBCDDI3Gfix3VV:GEZ1LxErl8O2caEAzz1OyD1Rd3Gaxd/d
                                                                                                MD5:7CE7ECD66E505D97AA06DE25E065FD03
                                                                                                SHA1:E6EEB2A1AF70189C6D0D082CC85E4B356C2C6A49
                                                                                                SHA-256:F17427E900568571D18373B9BA80B7492F08A98F2D26F551CE670378B8A4C29E
                                                                                                SHA-512:0D1E9C4DE8A484D58DB820261F86648743C61F5773E87FF70E9F86173F5A50FD59A86281F6939B596E00010874F01B03025898F6BE0E6D81B859E1E5E03E7F5E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...O...\...../v.....sRGB.........gAMA......a.....pHYs..........o.d....tEXtSoftware.paint.net 4.0.9l3~N....IDATx^.yTU...is.G.s........(.+.....[\R!Q\..T..*.'..b..1Q.K.V..5*....Q......qWx...;.;.e.].{*...|X..f..;3w.wg...v...~.....z/q.xL....+.....7.1..dO..U........La..y........+.A.^....(..)3P8...."..K...TW..xe.@.-..)...*.!.J.d..gH..x!....%^....*+...v..M..;wX..'.w.g.........u.....eHm4....RS..iS...v..'O.y..k.X.!]....};K.<...6a..6`........86rd:;z.%..<....Y.z.wMvv.....]j..?v...w.!..s.X.z$%.lP...m..F........pC...tHH.MLK.x..Zl........q......T..$..z.6.-6n.4.]...^.x..y......7nd..I..4..;w.%...Dsq..G...Q....&Mb..l0""^.fM..2v........qe.....(....o.....5...$..;-.h.....6..`.......;;"".......7k.L..W_m..F>|...;..y.&K8..O.?.6......._2..Q..+,.o...B..N.m../Kx...fk6.vy...._R..P.).x...x.Q.=....22.Z..TogG...UUqO..}.$^$..x...o.N..".W.'.......n...K....F..oFV...b...O......8q.J<....C.Q+.C.$C...U.%K..4j.x..U..(.;..s.[}..+./...x.c[.h..z..;f.......6l.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 32 x 37, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2676
                                                                                                Entropy (8bit):7.660170969036157
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:NccNn2yHNeJ3nJ42kg4UohoVoGMHM1K1VQQJCyGZMN8XS3KhHq2y:qk2CMJ42kg49hoCHIK1VQQJJDuX22y
                                                                                                MD5:B8CFEAA877203C1CC390786ABCD22452
                                                                                                SHA1:06BB5673D5C91EFEA71A291CA67E237B51E3711C
                                                                                                SHA-256:3BD7790E029BEFE06EA7FFC09F5914D8040E5DC8334AE1BEA0042C8A96351AB9
                                                                                                SHA-512:5052F9C409F59E1952F8E66FBA2360DEDA3C8F04A5602CB10981EE2C01A657B29CE0041374B0C88D1CE071E56134BFF948EBD9AB111E1F310E0496887C0CEAE4
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR... ...%.....#..G....tEXtSoftware.Adobe ImageReadyq.e<...&iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC 2014 (Windows)" xmpMM:InstanceID="xmp.iid:8F7C94E368AF11E79E4FB3067E1DA3FD" xmpMM:DocumentID="xmp.did:8F7C94E468AF11E79E4FB3067E1DA3FD"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:8F7C94E168AF11E79E4FB3067E1DA3FD" stRef:documentID="xmp.did:8F7C94E268AF11E79E4FB3067E1DA3FD"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>..x....IDATx..WiLTW..f...a...d..T.M.iR.Q.-DZM......&X5U.T....V...[.RKj..VP...i.T.b,K-e.....,.....3<d.4........Y.L0
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 22 x 30, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):1099
                                                                                                Entropy (8bit):6.358430554429135
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:Z1hpunQWwjx82lY2T32HEVy8CiyJ3V9j5GI4F1006Bhd/sq:nitNn2VEJ3X5Q0lBhf
                                                                                                MD5:3BA7A8430C74F454FA4EBAAA9677EC93
                                                                                                SHA1:A75BD23C71BAFC60A0E579F964409E527A39BE93
                                                                                                SHA-256:D5B2EDCD835D6CC7FCD584249ECDBFD49DD9DA12EB3F58A440AEFD1B0F3BF991
                                                                                                SHA-512:1BF6D8663B64BDD555F85C91CD0CBE4F3BB40D82D8F8B74B23D3D27C86F42451ADB08EEDCBBBAE77AA5DD24016391895E6B82C5D002DFBE38C4F610FC7273650
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR.............(..V....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:2E7F084A5AF611E4BC4491B51F92CE1D" xmpMM:DocumentID="xmp.did:2E7F084B5AF611E4BC4491B51F92CE1D"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:2E7F08485AF611E4BC4491B51F92CE1D" stRef:documentID="xmp.did:2E7F08495AF611E4BC4491B51F92CE1D"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>>.......IDATx.b....[...@|.....JF.......ie..Z.....6.-.....$.P. Fh.x... ..c.*&..P...i.w....c.....&*..i ...i.AN.q..r.rZ...V
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 15 x 15, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):1091
                                                                                                Entropy (8bit):6.337161164733769
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:C1he91Wwjx82lY2T3o5VrTmHaikyJ3V4Pg9GDt9avM:AqQNn2q1mrXJ3KI9KPavM
                                                                                                MD5:4512DB0BD5BFE6B3F2ABEEB72A9308A9
                                                                                                SHA1:F90E36F57CD93EEDA1E644EFB6D985DAAE230B12
                                                                                                SHA-256:F829592A3039EB2D4F8C88881BA2595FD3BC13B44CB7B34E862CDBFC194E4968
                                                                                                SHA-512:E8B72F5A7DE7B145036CD36A8F90BE6507EA9D76CA9C736EC67048BF00AB95A0CBD4E04E1135686355B8C58D62285E876846D9313685AD42BF9FADE49FB00E0D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR.............;.J....tEXtSoftware.Adobe ImageReadyq.e<...$iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS6 (Macintosh)" xmpMM:InstanceID="xmp.iid:95E501AE0B1311E6A5CA9034D96D6F9C" xmpMM:DocumentID="xmp.did:95E501AF0B1311E6A5CA9034D96D6F9C"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:95E501AC0B1311E6A5CA9034D96D6F9C" stRef:documentID="xmp.did:95E501AD0B1311E6A5CA9034D96D6F9C"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>6..]....IDATx..... .....;..x.1F.#(x(.'.2.m.6...I..zD.y;.....RJi#.j....A.8^p.}V .}!B.....S..\.H`c...x..1.'..... ...
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 25 x 25, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):341
                                                                                                Entropy (8bit):6.932688186850299
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:6v/lhPfiCCCtdoRg7NStAkIdh7mBkCuTQdn5qJ0T9nFysXrvEp:6v/7xjtSUVieCumn5/9n82C
                                                                                                MD5:716B15F76294EE5D320BA95F66246340
                                                                                                SHA1:DB1098FE9B1E13C7339F35F3BC646907F1B21A63
                                                                                                SHA-256:6FB23EC5112544188534C03191DA2A5F7148D574FEE3DFEB353AC28EE176A7DC
                                                                                                SHA-512:0811F5EE3AF9FCCF8110A32A440A2170984597A98657C06AEB42C011B4A69BF9F2FE82F5384B2FDE78C1292FF2172D23762571E986D70AC22B23E56E7A50C5FC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...............c....gAMA......a.....pHYs...........k.....tEXtSoftware.paint.net 4.0.134.[z....IDATHK..M..0..9....p...3.y...a......X.....m...-.iB....8.....I.v....)6..N.&~..._4{k.[q...8.YE..].x....v.!..y..0..XS.s.L..B.&....O"o.I..v.0..zL..l....UXi..\n_.2'....:qY.`.w......I..dL............{Wh...>..a.....IEND.B`.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 25 x 25, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):404
                                                                                                Entropy (8bit):7.129516318048457
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:6v/7xjtSUmm5bJarDxRprObP/JnfCD/hZZJX8UA7/7:LUmm4pabP/ZfCRJXBAT7
                                                                                                MD5:C18550E54ED02DEE988F2DE8DD6C89B9
                                                                                                SHA1:28F406C9F407355D7283A69C9FE670569DEBB980
                                                                                                SHA-256:8A0E652F20FDC33EA57510243A09E1BE1F9B815721D698D03C50385AC0311A43
                                                                                                SHA-512:5849732BE1CF0FDEDB8798A50C5A72783C61AEA989DEDA6578377BF8B5EDF2CD401FDF9C85E29050846353F48374BB34F84DDA7DE750DB18E67CE3D1E6050306
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...............c....gAMA......a.....pHYs...........k.....tEXtSoftware.paint.net 4.0.134.[z....IDATHK..1..0....L....\=.&N....g/..\..x..eR.......h..$...{.'..TU...X..8.Rpp..N...zC.((.....:.8W....#..fo....X...A...Q....8.QM.........$.5.....?...c..m.-..g..wbm..._s.T.D..#.....V.&...F.fV...9.B....|..,.n&.....k.'...I...(_W.y.e.C......|?q......x.c..o..E-.....U.._...8....IEND.B`.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 11 x 11, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):226
                                                                                                Entropy (8bit):6.332146371456583
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:6v/lhP8AMtCCtdo1qZg7FJemT053Wmw3jKmt403zuk9qIup:6v/7kAMtjtS1qczemTC3Wmw3jPR36WS
                                                                                                MD5:EF97004AEB78915DF8FC2509655D9B40
                                                                                                SHA1:2FDEF07F5D0623E2F48EAA18805665B9A220E939
                                                                                                SHA-256:DC016C4E75500448FC20A3BD80134B940C9E916817A8B224ABF3ED84A6826009
                                                                                                SHA-512:CB42527F0D7DBB22E31FA7F88ACEE696DE8A9206928C0C81D453E5835B2AE8B906455D1B9F18F926D23F7058FCFCCB0FFB0E2484C460ADDC13800C2F233E2963
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...............w&....gAMA......a.....pHYs...........k.....tEXtSoftware.paint.net 4.0.9l3~N...`IDAT(S.....0.......1..1.;..-......r..u.H7.t.H7.......'\.C...,..w|.;..S.........e.=...^....p.\-.x.X....IEND.B`.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 232 x 80, 8-bit/color RGBA, interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):9638
                                                                                                Entropy (8bit):7.97984865518991
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:q00fpcg1tIjiNXtqdkZ84SGZsvLG9MuA9rTklsVIq1QY:qjOogWfsvLG9hA9rej2n
                                                                                                MD5:B65E130901B97F54980D8055E9DCFF71
                                                                                                SHA1:E97E74874E177DCF8475B26187AF99D6708E1266
                                                                                                SHA-256:B8F3E5291052D9B2B898B4174D1712D89A94CE05179EBC6792CDE1F64BF28B1A
                                                                                                SHA-512:C52D3B9156207B826CA5466180F90568CF81FDF3B2A7DF62625660B707822242D1B22EB2D8FA1E7102D6BE2D0A81EE54C7BB5F3845CF7CE9E942E018D4D0AD57
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR.......P.....d7......gAMA......a...%]IDATx..]......nF....2$Q.&1..58.....&...1.1...\ r.o..;..0........lL4..c n....c"...TT.............g....tU..{......Q....]Ck..j_....1Y....U.m....;.NfM....Bk.M.w....".........+.&..Q.>.1....M.KZ.......j.E..1H...-..kL...j....s}..V&...8Z.:..g..r....s.k...i.k,my.X..p..1.......%..C5.w._.|...[@.....].n..F.....=....H......@......5.e.<.......'..z.....f...0..E...YF.3..*.X....L...?/U.....IsV.7.L..T.+<..g..t.._C.LV.^i7.u....PTM..>.T#.A..6...L....i......S).6B.W...I.o.....r|.\..].QM..5.]..~w........{...)Z....L...dL....n..ud..l...o~.."..>._5.V.....*..hIK.I;u....{.....V....o..*kX....=..6..!......@.waeO...7...o.Lf..To...k..je.W.4.h..S+p.^ip....q..z.yu..c.j....H.D3 B3..MU9R^4k.....*./..t.EaE...*f.........,b......^I.KY.%..7).....H@.....N..E..8?+...UE7b.r..g....b...~.1+.J+...2.0*8..r.....X.$.(.C5R.....W]..[.x]..N..G.'.4....:H..h....R...{.o.....[~W5..V..xZZ.ll.9."...........m..%L.l..E...|.{..K..q..U.GFUy.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 40 x 56, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):1796
                                                                                                Entropy (8bit):7.2909105950211135
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:HccNn2yIJJ3AYbHf01zb6ccKosNc/iZeFiGSS:8k2RQYz0posNCgfS
                                                                                                MD5:06667BC5035AB4BD576F2AA987059C93
                                                                                                SHA1:2D461E6A63550AF494893B3E15E4CDCE30982F26
                                                                                                SHA-256:9D997C1CC41716A8B51327469E916911FF9230F25792F9ACD1304B7092A4045E
                                                                                                SHA-512:0DB20F85F64A995BDC37B44B2435566141F8C58988DC2094732D599164DAE17C23811915A20180F1D3902E767491558911999FB44861B0FC03E75F91F963267A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...(...8......(......tEXtSoftware.Adobe ImageReadyq.e<...&iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c014 79.156797, 2014/08/20-09:53:02 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC 2014 (Windows)" xmpMM:InstanceID="xmp.iid:D48E426597F511E7875EEE6D51C54119" xmpMM:DocumentID="xmp.did:D48E426697F511E7875EEE6D51C54119"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:D48E426397F511E7875EEE6D51C54119" stRef:documentID="xmp.did:D48E426497F511E7875EEE6D51C54119"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.......tIDATx..Mh.A..g'$i.c.l6i.~!*.(b.[... TQ{.x.7....*..<.....k.......E(~P.MR.X.i>.....%.l......L6..~....7..5i.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 25 x 42, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):1301
                                                                                                Entropy (8bit):6.818805785142685
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:e/1hpunQWwjx82lY2T32HEVbdasTyJ3VbGcsiGxq57M4QvkZZszWCd17a:eNitNn2V7uJ31OqRM4RsiCd1O
                                                                                                MD5:61A07C61B0A7F5D8856627004FE5AFD9
                                                                                                SHA1:3CA74E975FBF1C973FDDB40CE4DFD46001AB96A3
                                                                                                SHA-256:3CC78C47AC81B5C11440A0CD59DB42AAFC8426247FA891250FA3DE35EDB4B330
                                                                                                SHA-512:A030F0C14A74A11D0E2B4B8EAA9E628E707BCB05E8B361E7C18A8092C4D06A036F4181B515EBC83D1AB419A187A5F0D69021F3067877F51B85357F162D1FFAA5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR.......*.....F..`....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:683151C6216D11E49CF79C9CE451AAB7" xmpMM:DocumentID="xmp.did:683151C7216D11E49CF79C9CE451AAB7"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:683151C4216D11E49CF79C9CE451AAB7" stRef:documentID="xmp.did:683151C5216D11E49CF79C9CE451AAB7"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.DZ.....IDATx...G.Q...v#".e.N.bY..?.-.K..5:..K,KD.@DD.(E...#.t-R.D........3........;...{;..cF\.#sH.. ...^.Af.'3X.H....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 170 x 50, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2023
                                                                                                Entropy (8bit):7.834061182418166
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:M/692kQRqvL0hBxYK72hJuljpeznCfJFhlyFyYTipBfbO3OFaq7B:MS92krLgB6K72AgnoFaFPipBTO3C1
                                                                                                MD5:71AEA71E6562718453676AE12E76A216
                                                                                                SHA1:FD5B6EEC17E7F88C8CBAA7E0C81875BEF6F8BF4D
                                                                                                SHA-256:FC88BB54D0C35C746AC948FAB79FEFA948D50B120F02DD2B486495E7954397F0
                                                                                                SHA-512:3E95F77E81E9F5E1314A9CFDC321B4E244D4CCB9580926A5F2FC5D579E93F95B70C80E71AFD0AAF0B14457F99BD44F298E1335D54C085202F9C19F0B5473E589
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR.......2......C@.....bKGD..............pHYs.................tIME......2...S....iTXtComment.....Created with GIMPd.e....KIDATx..]..E.....J"h...........z..Y..E.9z.-...!.....=H..C.BP<h..uM.Dw.}..<...~..s>^.n.`yo.kz.....US3..T.....p..)....BBc.;..|..o..[C......'...GO>vz...^{.d....$.J.T....._......\&....{..........A..C.(.F...= .....%.........^...E.prkkr....g.~..[.0...%.........$......|...../.{...../....Y........).OZ^...^8.....E.'.>..75V..J._`...s.}..B.@..{.4..q..o...lm.Hk`g'...d..WJ..} .x..vYK4..Szn.~....M...*.42......qLj..`f.Z.(.......>.40\x>.(3......~y.s.X%.......PO..*.63C..W...|..k..@.%......."......,kN)`.... .#.^c..p.......P...u..D-.....%.......;V*...D...h...TNw.|.........7O;3.....*0...%..ic.]@k......~r.\.N....e.ASl.K....8:......K..5..5...U...B.v...#.V.B2k.7...0a..@....4.q.).r....bY..|.s.RG.....\g...YA..N....-:....]......`....e+.".@......c.....`-.]g.c.F....!...pf..jW&k2cx.A....X..#7V...X.......g@)...$.h{a.....z....4.l]..<....TGA.t.FDKvz..6...%s.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 14 x 21, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):1265
                                                                                                Entropy (8bit):6.6923871242246245
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:K1hpunQWwjx82lY2T32HEViKM2yJ3VhKSRGKVy1ay3U2yiqvOz:oitNn2VqtJ3zRZVCprqE
                                                                                                MD5:B516A54C270BCB33D7B4CC9964D0BFE1
                                                                                                SHA1:F61C2C2F0D53F14FA0918D3A8177004669C2A08A
                                                                                                SHA-256:37CC7014F8EB6EA19EB50F341D201B6942F7BE6A7DD124059B25C02374EAD7CF
                                                                                                SHA-512:1DA4B4472CC0555B676D981DD7E5AC29CF4987A70709F61FDF16517DBEFCD767EF3B4E61AF20E8B6F87DF582A18DA6FB71384513ADB102182652F06136C28A61
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR.............vY.....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:B32C2196E1FA11E38320E0B36410DCA1" xmpMM:DocumentID="xmp.did:B32C2197E1FA11E38320E0B36410DCA1"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:B32C2194E1FA11E38320E0B36410DCA1" stRef:documentID="xmp.did:B32C2195E1FA11E38320E0B36410DCA1"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>/......gIDATx.b.}{%.......1..31...........@...@.L.F.8x..%!!.p......1.Q.A........N..bV f$...^.x.....(e...@.U..,..O.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 21 x 14, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):16219
                                                                                                Entropy (8bit):2.1042793888679574
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:WSAvZkIt2sc5GhUq3tmtY+WsNXrNXpDu53:WSCkg3tmv5fe
                                                                                                MD5:AF79FE5D16459D24C7550C43C2A408ED
                                                                                                SHA1:30762B9758AD3421409710E7A573B98AD86C85BA
                                                                                                SHA-256:EE9D8DD0AE1F8042B4676BA6170F6E22BD401E5C2FDD43B9B96BFCE235EABDDC
                                                                                                SHA-512:D66F47DA6EE0116FF52D5C032942544CDBBB66845A56A02F4F8948661C3A77E3945EDF424298CF0D4D11F91506B4DBE68361D34A0EAA032601A940458DE52303
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...............W.....sRGB.........gAMA......a.....pHYs.................tIME.....)..p......tEXtFile Name.Untitled-9.{I=..=.iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 4.2.2-c063 53.352624, 2008/07/30-18:12:18 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:xmp="http://ns.adobe.com/xap/1.0/">. <xmp:CreatorTool>Adobe Photoshop CS4 Windows</xmp:CreatorTool>. <xmp:MetadataDate>2014-02-19T19:41:01-05:00</xmp:MetadataDate>. <xmp:ModifyDate>2014-02-19T19:41:01-05:00</xmp:ModifyDate>. <xmp:CreateDate>2014-02-19T19:41:01-05:00</xmp:CreateDate>. </rdf:Description>. <rdf:Description rdf:about="". xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/". xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#">. <xmpMM:InstanceID>xmp.iid:8
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2993
                                                                                                Entropy (8bit):7.8772256764796005
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODlV6woaD:bSDZ/I09Da01l+gmkyTt6Hk8nTX8K
                                                                                                MD5:8499A79EF6AE4A4141EFB1EDD8B817B4
                                                                                                SHA1:912DB9D9FCDBB8D9DE42C6E5D7F6589154B57733
                                                                                                SHA-256:C41F3C8D6E3209C94FC5E1F810F3C2F70F4865419D521BA45EBE3136C237E936
                                                                                                SHA-512:BAA4E39B0A473B1549740905E8CFF0FDFF2058D1A1CF5D7E5474D77A9719F638DF216C70689394072965D25459003A9768039D08B980A3F727C17B683FE263F7
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................a....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2994
                                                                                                Entropy (8bit):7.875356862974214
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD1NpBe:bSDZ/I09Da01l+gmkyTt6Hk8nT1NC
                                                                                                MD5:71F2DF5FE99973C6C439F4294D83A649
                                                                                                SHA1:22E22248D76017A72D35AD555E474FE3CC6873BA
                                                                                                SHA-256:20541025FA64693A6C0B5A239CAAC07750EA725801F04D5C7CAFC2338C23428B
                                                                                                SHA-512:B8C4B08B286E7A70CE3B1F0BAB67BC7E6DA9EF031244F6EC4E07A8FBA9B1D1F9C4AC7E06EF1C26F831DB9A4AA3381E9E56E0BBD7279D02798070952561B49EF0
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................a....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2863
                                                                                                Entropy (8bit):7.864822850364644
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODvk61z:bSDZ/I09Da01l+gmkyTt6Hk8nTHz
                                                                                                MD5:26CE126750DDF2E232D02BF82E55F712
                                                                                                SHA1:199DE9CA76A8B3A658BFD11A30A67FB4C7DD3F53
                                                                                                SHA-256:68F82DA5DABDA6C5A1CFD4A65891A474B47D9F6D4D85DA0462591DA6499FD0FB
                                                                                                SHA-512:48D9926C119E6EDC5992D9B8957D3AFF8C4B686D56AD89B033F86C3AFE223541BB8E9853B14ABD541D64BC93176C14B3D773C94CC75A94EF4CB17387A9780E1D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................a....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 75 x 82, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):8388
                                                                                                Entropy (8bit):7.951991915149804
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:vSDS0tKg9E05Tbry8xUDmJ91Zgg08BvMR0FI0h:aJXE05e8xUDA91ZgwERWI0h
                                                                                                MD5:61326F602C5CC055EFBEC7959827DC54
                                                                                                SHA1:A65D8C517EED8A336C2401F855BF4CFEA361D093
                                                                                                SHA-256:6D9A0BB61108D6D0D2FB6435E65755291B66FF3B00A122DB113600A2BF2263C3
                                                                                                SHA-512:691AF215EB05794D7B6FCE07DCFCD60A5CA54AD6CA67F71B44AD59A4D612099A838919B595B7BBB240C1D36F6D3BEC38E054FEA69C594E524E5AFCCCEC34782C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...K...R.......).....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 6 x 6, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):16078
                                                                                                Entropy (8bit):2.0132983735678143
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:oS7QZkIt2sc5GPqFtmD+WsNXrNXpvu1Fz:oSYkVFtm25ruD
                                                                                                MD5:C4BD0AAB6788955E3F24F3DBBDA38221
                                                                                                SHA1:ACEB88345153DFC1A3E90DF261CDB42DEB3ADB37
                                                                                                SHA-256:B9BCCB151679EECD9E797F8E948580BF915A5365CE1EE1669802A3C18BAA37D5
                                                                                                SHA-512:AA08ABCBFF38119862D73A6FD4E7A8ACB7B6F293ABDF25A4EF32D31BC01F9415C11F4210CFF3460A3ACAF9B84F829483FA0120E7455A404F514135671D4EE90A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................H....sRGB.........pHYs.................tIME.......w-.T....tEXtFile Name.Untitled-1......=.iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 4.2.2-c063 53.352624, 2008/07/30-18:12:18 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:xmp="http://ns.adobe.com/xap/1.0/">. <xmp:CreatorTool>Adobe Photoshop CS4 Windows</xmp:CreatorTool>. <xmp:MetadataDate>2014-02-07T13:24:05-05:00</xmp:MetadataDate>. <xmp:ModifyDate>2014-02-07T13:24:05-05:00</xmp:ModifyDate>. <xmp:CreateDate>2014-02-07T13:24:05-05:00</xmp:CreateDate>. </rdf:Description>. <rdf:Description rdf:about="". xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/". xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#">. <xmpMM:InstanceID>xmp.iid:1E82D5062590E311A
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):1553
                                                                                                Entropy (8bit):7.047413266797472
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:t1he91Wwh82lYSKwVo4RjVx2R4T3cyJ3VKRVPGPesT+quUcBww3DDhbxXidO0s2T:TqQvnL8tNrJ3QfPW7ydl3xT0N
                                                                                                MD5:C07B05FB66B8B1145CEB5AC5588B61A5
                                                                                                SHA1:C0D875E10C20E9A0ACEAB4F012FBC58A7F01BA88
                                                                                                SHA-256:8F0FDB24AAECA8B9C174A7DC4240E13D675B85F91BB2FD3FCEC98650AF304B5B
                                                                                                SHA-512:E187885AD1B817E2F184BA6D8218DD1BA81F69D7F28399BD21092363768056BFBAC3EC31715F9317F9E5EEE38D9A634D72C9F4D76CC2D5EDCE9CC8AE7D1C3778
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...(...(........m....tEXtSoftware.Adobe ImageReadyq.e<...diTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:50864549699EE311B092B6E4A26229C8" xmpMM:DocumentID="xmp.did:58D53F481AA911E69AB8D7F29C951D96" xmpMM:InstanceID="xmp.iid:58D53F471AA911E69AB8D7F29C951D96" xmp:CreatorTool="Adobe Photoshop CS4 Windows"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:50864549699EE311B092B6E4A26229C8" stRef:documentID="xmp.did:50864549699EE311B092B6E4A26229C8"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.......CIDATx...+DQ......#....`!.?"...Y..+.....B
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 44 x 96, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):309
                                                                                                Entropy (8bit):6.054343807264034
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:6v/lhPgXOudn+Hgvd+qgv5m9p+qgv5m9p+qgv5m9p+qgv5m9p+qgv5m9p+fdZdp:6v/7ADWgcv5KAv5KAv5KAv5KAv5K6dZz
                                                                                                MD5:E03F1F2D51299D73D9502ADDE9BD807A
                                                                                                SHA1:86671DB9619755E2D54165DAF1A7929354A73AF9
                                                                                                SHA-256:32D88811543A4EBEB4ACDACCF2349C4EC68993A803E7AA4925B59FFAF2166E2D
                                                                                                SHA-512:937EAFB8E21AF9FF662510449A71182397931433C331668744D8B4C589E8705042FAA2E49C1273F05CC1775C17F5A91BF474A9855CFDCF63789B2E2694A4C9FF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...,...`.....f.......gAMA......a.....IDATx...1..0..Q......c.0v.|.....}...A.~.v../.p.........L. z&..b0a..N.....g.:)........L. z&..b0a..N.....g.:)........L. z&..b0a..N.....g.:)........L. z&..b0a..N.....g.:)........L. z&..b0a..N.....g.:)........L. z&..bp...J..9.`......IEND.B`.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 48 x 96, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):1322
                                                                                                Entropy (8bit):7.704908908918472
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:bGYPEgtf9Z+rRqi6cSAYEp5+1hIvUR80zXYbwe21rWymNgpg:HcgtVUFqJkp5+1VFD1rWPNig
                                                                                                MD5:6BEDC4F5BCEF662B66747C1D6136BECB
                                                                                                SHA1:3ED98FAB84B91EEA4DEC0360B330E4153DB0BE02
                                                                                                SHA-256:B983DE30371551C28ADC7590B74DF194DEF2DC0A0AB6FFE0F114AEA0837CD191
                                                                                                SHA-512:932802DFCA0D7EA4121398ACE2343DB3DD1D07A5EA52647B60160DD56CD45F7DBF227654FC79F0EBB8EAED86D5AD0F5B20F9618F57A014CF11A572BA40992A95
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...0...`.....[..p....gAMA......a.....IDATx..M..G...U...W........DDe=$AH..x0`4...?@.'%...@P.&.@.......!$...D=(&..8...zZ..5d7;U/..Zk9.;.3............z]=......B5....D*.......Z.uM.P.........A.f.@......O.aX..9...7.\7.g.h.B@.,uAi}<.]x..?.k<.[.[.....I.........;@s...o..6./.,s.#.E....i..+..Q.'..r..>....A....QjDG.n....N..._........fP...~.X....H..^..yt....;%.}O...B..............k.N(".5w.:.q.R.......XTk.....=.....@.FT.....W.m..4..M.}..~..E...Q*@..T..=.*D...!h.e...NA.8KXk~....H .O@..<!6(.....N..z....!h......HRo..&.3X.e..,.7.E.t..4.......\^.4..p.F..7...<.?O.p.k<.)J....E...s..'b.X8(.?..",..4r]fn...u.......O.~~z......:Py.....|.y...V.|Q.H....C...B..u.^39.I,@"..-...71~q!C.s!.M...ck...pk....d............v..oqUd..F.~......0..V6.(..@~$..._....@4..!...-....Mv...-...]&.@..8.O..89Q4...j..8-T4....GJN...@.?...r.(..G1b.fR.....SRm..X.p.K>..B.t.F...8.3...p..../..I..k~*E.P...s.<...xnB...1..9.<..o}......i.)D....l....a..6'.@.1'G.........@.._G.......4.....Q'6.......p
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 96 x 96, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2310
                                                                                                Entropy (8bit):7.874330739799925
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:sem5iGBcCQYZIOpAGX5kUHf6yAhyfIOFmW0g9q:oM4coZIK5PHfso7OZ
                                                                                                MD5:01157878409C7BFB56F939526F193E55
                                                                                                SHA1:D3BAFA45C7BAA27E085DBFFB6C5F68A3F781261E
                                                                                                SHA-256:F26CDED0E564ACA99C3AAB16E0399326E75F8094944A1572349889CAED6CFED4
                                                                                                SHA-512:D53E9853A09BEE08468418E7BC1172AAC4341A015F251A56871694348A761D0151653769B34E3FA8DB10ABEB07D848E6CBD61208300291D17190A3CFEB6F0490
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...`...`......w8....gAMA......a.....IDATx..O..D..g&[..n.....a....z..`..ET...H....z.E.}V..K=...J...E.<.P...).+,..A=...[qK7...y/K^..$/o...L`I.&3..|~3.I2..I1...zR....`Z.=-...R.!.......k1...q...Z...Z.YO.Yq...qqn..*.E).X.B..L..M ..`....-l.........q!.N......8.+....{.?.u....P.7...7.~..>Z.)..!o|....J...6.-..Z...=..z...)........b^hyLy.K.{.')Q.J.J3..f...qt..wQ..J,cfQ.q^{.C..-...G......p....}Y.`'j....ZZR...Z....[.(....@7...|.......(.p.).{C6.~..mGV..@7&W....0.x.....Q...@y...n.!.s.m...G...Dp.......2?....zU....5..O./..>.....l*8lya.._.Y.C......Y1.n........>lC...C..Z.M6...T....[.!..?.zPeF)=FJ....,?.qf... .1.y.....>....`0....X..!..Pdb..F9-.N.d....nA.(u...1.B...D.`Q/....K....m.5_.ei...<@..C.xh...r.e.v..{~mo;Ip.1_C....9..8....g..$)Q.sft..o.:D....!..|.?.z..a.f.W.....?g?..CV.ji....0K...SoA|.....y.r..'H....T...u..wG....x.fK......s2L*w...J.....f....0T_.z-.;..........F..D...Ww5.?#..d....u....m.a.............G.3b.p.rL.d.M.%.`....n....'`&%ti.K...#.x
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 96 x 96, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2316
                                                                                                Entropy (8bit):7.872496758109341
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:SK+T7zVjMzF+5xM203a9PGnwH+6lbMKFCdUVL:X+PzVAzF+5xM73RjxeyUVL
                                                                                                MD5:56F6845916419B9EA942D801A7254079
                                                                                                SHA1:F70A746CC36C8942B8522AF21FD9678C46214627
                                                                                                SHA-256:2BBC4703A2F7F851AA110BF6371200E6FBFF0E06543DBC03FC9E0CAB0C222F87
                                                                                                SHA-512:035041A5F7A98CEDCD65D5028F8E92E23EA45DFC8D042F8A9C987EC79AE76D5F8944B9627860EC78CD8EB25A9C3E2FC95B41E11ABBCF5028227493585B16D751
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...`...`......w8....gAMA......a.....IDATx..O..D..g&[Z....U. .....zPY..."*.ZD....I=.".>+H. x.U.H-.-..B..Z.T.......n.?[.....{..e...^&.{/.x$y...7._&3If~?).t.....f'. ..BO.-&..7K-../\S.-......k..o..BN{JM..&....A,....tc.*!f..@o....s...haA&..8..WJ..b.l.y.B...R.~...n.../o.A.,......7.^.C.}.SB...UG.K...o3m....E.k....;..j-V.,P.yI)..'?.{.....B.Ki..o.._.m.~..Jxg.e.,.0.kO.....|......7......v.j.-.....ZqA...k..E..P....}....+~}i.,...s..^....,f.U!...5...~t>...Bd.....(.".R..;ecn.(.p.n.@..q.Ym[.*....J...^.+.zX3..p.......y.....zI....;.K?^.......[....T.{m(5.yHq.S.....yu.m...M.\....5y.....S.Qzl.|..<z.<'........|2c.M.. ......{.]....<...,;..E.....D.R...{.._h..../X.3c{......l.s../.n...8@^.C.#xh...r.d.V..{~mo;ip.0...ys/.sf.....W..IS...L.H-.......C....~....+0.Z.L...8.nm...P.....Y.t8....w;....W)I..A...w.k*5.[.=.....(U[.V./.l)T.|..|D.i.N5._).6Ro5.`.>.......s.h.~L.....#.....a..:.........H..........L....D........3b.p..M.d................A...`..8t.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 8 x 8, 8-bit/color RGB, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):937
                                                                                                Entropy (8bit):5.8104438047679
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:Hh1hpunQWwjx82lY2T32HEVDTutTAyJ3VgcTTTTRGCJ:vitNn2V5ODJ3aMzRr
                                                                                                MD5:607D9123BB070B183B2B1BDB47AC2AD3
                                                                                                SHA1:31919F6F61DEECC4C030D95F75F70ED0519660AB
                                                                                                SHA-256:23B16838B590D437FACA83378E751CB9F06389105F8AEA291C28818901DD367A
                                                                                                SHA-512:F33C8E2095BFF47334B9738E76438AA2B65682865938F5CC420CC017728A436703E96B4B95E5A5FE736FCC68137A724398AD290A04A8F74063141CC0C2E10FDD
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR.............Km).....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:283C04ADE21B11E391C2B262ECC9B134" xmpMM:DocumentID="xmp.did:283C04AEE21B11E391C2B262ECC9B134"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:283C04ABE21B11E391C2B262ECC9B134" stRef:documentID="xmp.did:283C04ACE21B11E391C2B262ECC9B134"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>.z......IDATx.bd``...?.*`dddb...T.'..0.O...2.......IEND.B`.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 12 x 12, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):15727
                                                                                                Entropy (8bit):1.9617442510888667
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:+2SylZkIt+WsNXrNXpd2sc5GcqvtmXgep:XSyLkd5vvtmwep
                                                                                                MD5:994A9E0DE7C47B99AFB9FCCC5778C274
                                                                                                SHA1:041F2B6FC406534E267A04B2E9E3EC6BF104F994
                                                                                                SHA-256:6FD368FF0D52E2E810801E889C600A085A4FA3CEF27DE663973C2DFDA92BC7FA
                                                                                                SHA-512:D01FD92BE927109902EB37286CE3212BB2DA852ACFC47EDC708342E492019EEB343DC810E29542619D7A3FB98030A2065FF63231BCDD7FB1778C6A1B6F56AD75
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR.............Vu\.....sRGB.........pHYs.................tIME.......n1.....tEXtFile Name.PatchButtonCancel.png._[...<.iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 4.2.2-c063 53.352624, 2008/07/30-18:12:18 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:xmp="http://ns.adobe.com/xap/1.0/">. <xmp:CreatorTool>Adobe Photoshop CS4 Windows</xmp:CreatorTool>. <xmp:CreateDate>2014-03-11T17:34:55-04:00</xmp:CreateDate>. <xmp:ModifyDate>2014-03-13T17:03:06-04:00</xmp:ModifyDate>. <xmp:MetadataDate>2014-03-13T17:03:06-04:00</xmp:MetadataDate>. </rdf:Description>. <rdf:Description rdf:about="". xmlns:dc="http://purl.org/dc/elements/1.1/">. <dc:format>image/png</dc:format>. </rdf:Description>. <rdf:Description rdf:about="". xml
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 9 x 19, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2939
                                                                                                Entropy (8bit):7.8751350252382
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:1/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODGp:1SDZ/I09Da01l+gmkyTt6Hk8nTGp
                                                                                                MD5:FBD05AC80ACDB9D854E7D30E9EFE74C4
                                                                                                SHA1:1A2A6B66B193E93FAF49D8DA1328350D9D326A14
                                                                                                SHA-256:5F1542E96AD465E0C8C2586AB7449C715DA47EFEEB7BF3C31649433197E8982E
                                                                                                SHA-512:1762732D863AAB5A1A1B19A6873947ED2464500FF35EE8F44C571E013D80DA3FEA3DDE2E80D4B90B27EBBB2E124D9535DF371D0825F9E359119AB5ED8339460B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR.............B.'.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 9 x 19, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2926
                                                                                                Entropy (8bit):7.90648535434529
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:EldHE8+JjpMNNa3OjboViS4nXsAYdPd3F58ZpiU54SN775OBf/6b3hvIypSB:EXHt+JcNgOSiS4XsAYNpf2ESNwSFE
                                                                                                MD5:FE1B0FA672066528158E0F0B34D73D45
                                                                                                SHA1:AB6A8C25A0449F5C4E9CB3EE302B6C50F0DFD18A
                                                                                                SHA-256:9FE680DF2A49D71A72609B6DD97EBF0329149B8720C9BDF45C5A92468075247C
                                                                                                SHA-512:2A9E68F270CF146BF08EF20F255A6AF5745393D11ADA0256371764C32C131110D00AE08211A32AAB2D697EA82509C6B7EADAEA7B89799FB67D111D912381C9E6
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR.............B.'....9iCCPPhotoshop ICC profile..H..wTT....wz..0.R.....{.^Ea..`(..34.!...ED."HP..P$VD...T..$.(1.ET,oF.........o......Z..../...K......<....Qt.....`.).LVF._.{......!r._...zX..p..3.N....Y.|......9.,...8%K.......,f.%f.(A..9a..>.,....<...9..S.b...L!G....3..,....F.0.+.7..T.3...Il.pX."6.1...."....H._q.W,.d..rIK..s...t......A..d.p....&+..g.].R.......Y2...EE.4...4432..P.u.oJ..Ez...g.........`.j..-....-....b.8....o....M</..A...qVV....2.....O.....g$>...]9.La.....+-%M.g.3Y.......u..A.x....E.....K.......i<:...............Pc...u*@~..(.. ...]..o..0 ~y.*..s..7.g...%...9.%(....3........H.*...@...C`...-p.n.......V..H.....@....A1....jP..A3h..A'8..K....n..`.L.g`......a!2D..!.H... .d..A.P....B....By.f..*...z....:....@..]h...~....L.............C.Up.......p%....;...5.6<.?.........."....G..x...G.....iE..>.&2.. oQ...EG..lQ..P......U..F.Fu.zQ7Qc.Y.G4....G......t...].nB../.o.'.1.......xb"1I.....>L...f.3...b..X}..........*.Q.Y..v...G...p.(..........
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):3379
                                                                                                Entropy (8bit):7.900810931888687
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:lldHE8+JjpMNNa3OjboViS4nXsAYdPd3F58ZpiU54SN775OB78jpcmzBBk:lXHt+JcNgOSiS4XsAYNpf2ESNg8jpzz4
                                                                                                MD5:3FE8B20F355CA9CCC770C228B94081F1
                                                                                                SHA1:31C1AD0D7E8351940FB766019D2C90D17A8F832E
                                                                                                SHA-256:C7CA4B6FFC563D91481509D5F504BCA07CB2F534C470019CD6BD33B4EB621778
                                                                                                SHA-512:F3D3F57AC993BCD361109F4DB0DD933F6473F055E40C444AC3F76061F4F02C3883E6AB9D889C57912408B6D57D94F47F4832F8F86C45F397576A96438E018323
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR... ... .....szz.....gAMA....|.Q.... cHRM...........R...@..}y.....<.....s<.w...9iCCPPhotoshop ICC profile..H..wTT....wz..0.R.....{.^Ea..`(..34.!...ED."HP..P$VD...T..$.(1.ET,oF.........o......Z..../...K......<....Qt.....`.).LVF._.{......!r._...zX..p..3.N....Y.|......9.,...8%K.......,f.%f.(A..9a..>.,....<...9..S.b...L!G....3..,....F.0.+.7..T.3...Il.pX."6.1...."....H._q.W,.d..rIK..s...t......A..d.p....&+..g.].R.......Y2...EE.4...4432..P.u.oJ..Ez...g.........`.j..-....-....b.8....o....M</..A...qVV....2.....O.....g$>...]9.La.....+-%M.g.3Y.......u..A.x....E.....K.......i<:...............Pc...u*@~..(.. ...]..o..0 ~y.*..s..7.g...%...9.%(....3........H.*...@...C`...-p.n.......V..H.....@....A1....jP..A3h..A'8..K....n..`.L.g`......a!2D..!.H... .d..A.P....B....By.f..*...z....:....@..]h...~....L.............C.Up.......p%....;...5.6<.?.........."....G..x...G.....iE..>.&2.. oQ...EG..lQ..P......U..F.Fu.zQ7Qc.Y.G4....G......t...].nB../.o.'.1.......xb"1I.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):500
                                                                                                Entropy (8bit):7.31879354458995
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:6v/78jtS1qcjoe+nPhXSHeokvjllumaWZdcctAl5JnfVf/weB:M1VceGhCHmRlRa4Al7fVHweB
                                                                                                MD5:E395AB024BD6659DD1836A7B3680EC84
                                                                                                SHA1:2FAE4B7F06993AE051CA5326DB87BC2C2D78621E
                                                                                                SHA-256:03A1D7BB9899BEF75EEDA31216F00AF96D840EA65E49E2A6D0C1A70133685E9A
                                                                                                SHA-512:F065F414A3CDAFDC7E031000C3B95556B018EF9DBBA8059CB7AB2FE93B5F2B1628BD4A04495012D8F4D40D620E21E0D993CDEB888CBF39556BA52D785E78AC31
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................a....gAMA......a.....pHYs...........k.....tEXtSoftware.paint.net 4.0.4.......rIDAT8O.R].AQ.=....H>..$.../$..<8......99w.{..5..5...3c.0`.6b...&....X,b>.c...u]..cd2...E..f.......b..j....q.Z....PS.T.x<.0.J......n.*\(...O..l6..v.D".....b2....'.z=...b4...a....,.....Az...8..H$...9+..k..Az`...&......z.^.K.L.v.x>.h4..G.a.x.E8{N...N..=..f..}.....F1..q>...b...<........j...L&Q......d...1.~B...Pd.\"...............&..N..c..j..C..X*..e.....=]s......IEND.B`.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):344
                                                                                                Entropy (8bit):6.9415609943303895
                                                                                                Encrypted:false
                                                                                                SSDEEP:6:6v/lhPUC8qZg7jUUjtUogkr6TwrZok4aKZyNE+bF7q34fgOhSt3/p:6v/785qcjU6tUogvwrP4bZUzbtq3/t3R
                                                                                                MD5:3C92EB6C3D0C1C7E69DE13A360EC8F51
                                                                                                SHA1:4860E6E417042E488C2568BBC266F393C6A514C5
                                                                                                SHA-256:C1407F66383A475F2D2EA6DE60E8F450FF9D3D8137FC7BC3050198685D619C76
                                                                                                SHA-512:C0CD061175C77A5F9194405C934E5EC5D3DA021C5ED74121720DC098C3023B0AE8DCBC6E94ECFE2967650471EA0F7C39BA07219E8A525F7775545032F9E0F341
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................a....gAMA......a.....pHYs.........8.S$....tEXtSoftware.paint.net 4.0.4........IDAT8O..=.D@...d...%. "r...'P....|._W.bk7..u{?c..yH..G..X..XEQ(M...........,5M...Q........S..u....<..JQ......#.zV.<.0..M...k7....O.<.p.$I.q.-.......u8:>.s.p.....m......F@.e...F...:..=.n.k....._.>..'.....=.B..o..\`....IEND.B`.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2871
                                                                                                Entropy (8bit):7.873501464866857
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:tocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcOD4ec:tZ/I09Da01l+gmkyTt6Hk8nTo
                                                                                                MD5:FBE16D3046C26D6BFC803B7E78212B95
                                                                                                SHA1:449077DBB28FC080E005776DD932A7D72E46E024
                                                                                                SHA-256:81B6282737DA4599961B793F09CD25DF54F0A00E245E736C6C6760D0F709C3E7
                                                                                                SHA-512:CABE78CDF343D920AECFEE54A3205A9D3E60BFEF87E7DFC421BFB0A4C965056F942143C28669069EDD4825306CF919876D40A33FBD7DB017302068FE5E90D0AC
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................a....pHYs..........d_....OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):1131
                                                                                                Entropy (8bit):6.494156472593123
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:K1hpunQWwjx82lY2T32HEVzz1oqW/iyJ3VzzJRq4PGQkcr1fTfMN:oitNn2VFzbyJJ3Fze+df4
                                                                                                MD5:2F547E30E5CFDA6AD08E987324D4CD32
                                                                                                SHA1:E12197FF0BDBD4E6801296E3AE1D2C26E80CBF27
                                                                                                SHA-256:FED07830EA14A3A936077CE362F28DDC08FE6B229CE95DCCFB5D2F1DF8ED455E
                                                                                                SHA-512:C10B4F8955BD8C7D86E6A06846E6CE365C2302B8B94017132752D1E63F786F009D0AA742D15B56141FA63AF035639EC221D49AB355F6E6BD984F961784D86D77
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................a....tEXtSoftware.Adobe ImageReadyq.e<... iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS5 Windows" xmpMM:InstanceID="xmp.iid:0DE7F551E21311E3BD759F77B7E8F236" xmpMM:DocumentID="xmp.did:0DE7F552E21311E3BD759F77B7E8F236"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:0DE7F54FE21311E3BD759F77B7E8F236" stRef:documentID="xmp.did:0DE7F550E21311E3BD759F77B7E8F236"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>........IDATx..?..P..om.....Oh.........."...1...|.ii=.H............9W.@...#.2Y....B.].;..Lk..x.B...x..@.ZC..b..\.'
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):2928
                                                                                                Entropy (8bit):7.876985727119462
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:b/6DocieftI9G9f6A+FIDOWu0lDl+gm7QyTtctIInQSy6IVpqlnBcODjhpfN:bSDZ/I09Da01l+gmkyTt6Hk8nTj7fN
                                                                                                MD5:78939BC95532D22DDA513D6CB7C6415F
                                                                                                SHA1:447CF0A5795F615DBEAA36FFC5F5C69D47247CDE
                                                                                                SHA-256:F0F1F9AA994449E519FF3AD9D36ED73600CF2A7281E4E1FB6C32D172FCE8E096
                                                                                                SHA-512:F7E086AD2FD29CBC1EB10131E76B0713A420A66ED3E9FFEB8A04714ACAF278F6AFCC2F1E9CC8B42B20EE2AD8FDF0A879C6FB6BA46DCB26C9B29EDEE9658615F1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR................a....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):1101
                                                                                                Entropy (8bit):7.717092617414279
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:TiV6+Y4Yw34ufd161Fyvuu48aNwEYiZGNxYmOH3xU/mBbQa1uoVuJ7:e6n4YCNdVvuuW7YyIxk3C/wVM
                                                                                                MD5:3BCAC9EAB5FAC148F87450892A1195FA
                                                                                                SHA1:7C5E593884A93392AF2357DB85A20AD2CFC30F58
                                                                                                SHA-256:1605DFDE1844F4506ED1246C5C233590DC798D01F72DFC8726690643224CBF98
                                                                                                SHA-512:00D973A895A293A9727111C6A5A0721D4959188331113DC390172562B8317256C47B3809C9B58ADB205B8D07BD8FB8CC95892F8476DABD40CBA8AD0A12C25FF3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR...(...(........m....pHYs...........~.....IDATX...J#A..kZ.GGXX.t.^.."...0o`...{.7....y...:{...}......ftY....?vK;.....I.tW}]]=]]:.s*"...ADU"*..u..M|^.Q..:...Bv..:...Q.1.%...Z.v.......{.....!.......`.nw.1v.E.W"js.Ck...jD..{..........G.S0.c...........@...y^.1...:...1.......O..%.:..6.."V.......U..6D\..b..y.F..........L.k.J..~...PQ.-.m#.x.q.e....!.T*|ccc"@................l~~>V.8...NNN...T.`....p.....J....i.lBA...N...~...S#...p...<.....0.^..kfy/.94....a.wwwc..../6U.....o.X.M.........,". y.......g.................].\NM&..6...['.....7.[2.1.X..8..@.Z.>..w:..<...>.F..{...`.....H.1......7....`r.%F.i....?.(U.S...%i.ZS.#..eul4....J...vG.J."....p8|...^..}&.....yM.L._.t".........8...gxUmmm..[0.2.y..{.XK.cH$p<!{.s..~.).....d...........:.m..!`.w..T.w.S"...=..K'`...j2........\ i.....,i)...tV.|.f..O..1..g.....c.2q.T*.X..L.TA..}m.U......}......'.H..I.<...^.j.....S..UT`.6.wbS..I...$l..h.-.50+..|Q.n.F..[.q...[.1.tA....e.........q;.(.B.X.#.*k&...k..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 30 x 30, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):3365
                                                                                                Entropy (8bit):7.909660916770975
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:NXHt+JcNgOSiS4XsAYNpf2ESNEwuOVgi7+F+pFDA:RoONgOLPXsAYnibgi7wyA
                                                                                                MD5:E467C881C1075F4AA958D3D98C417F08
                                                                                                SHA1:BC562BBB8EF2A8F5378B07860F6CC937695E00E9
                                                                                                SHA-256:225485D29794CC53C206FE475809921AA7B36744E8A63CD64678B8A42424915D
                                                                                                SHA-512:BDDA2A6AE90E1116336D54165229D59110EA5E2C7187C94480ED71E1253D6909D3503120F23D36883D637848A6852897E3D946121D8695532103975B06B40019
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR.............;0......gAMA....|.Q.... cHRM...........R...@..}y.....<.....s<.w...9iCCPPhotoshop ICC profile..H..wTT....wz..0.R.....{.^Ea..`(..34.!...ED."HP..P$VD...T..$.(1.ET,oF.........o......Z..../...K......<....Qt.....`.).LVF._.{......!r._...zX..p..3.N....Y.|......9.,...8%K.......,f.%f.(A..9a..>.,....<...9..S.b...L!G....3..,....F.0.+.7..T.3...Il.pX."6.1...."....H._q.W,.d..rIK..s...t......A..d.p....&+..g.].R.......Y2...EE.4...4432..P.u.oJ..Ez...g.........`.j..-....-....b.8....o....M</..A...qVV....2.....O.....g$>...]9.La.....+-%M.g.3Y.......u..A.x....E.....K.......i<:...............Pc...u*@~..(.. ...]..o..0 ~y.*..s..7.g...%...9.%(....3........H.*...@...C`...-p.n.......V..H.....@....A1....jP..A3h..A'8..K....n..`.L.g`......a!2D..!.H... .d..A.P....B....By.f..*...z....:....@..]h...~....L.............C.Up.......p%....;...5.6<.?.........."....G..x...G.....iE..>.&2.. oQ...EG..lQ..P......U..F.Fu.zQ7Qc.Y.G4....G......t...].nB../.o.'.1.......xb"1I.
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced
                                                                                                Category:dropped
                                                                                                Size (bytes):3124
                                                                                                Entropy (8bit):7.882755127540766
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:xSDZ/I09Da01l+gmkyTt6Hk8nTFWl2bc8xb:xSDS0tKg9E05TYl2bcw
                                                                                                MD5:154D346E7F49F54761D70F4F10F6D717
                                                                                                SHA1:8A34C0FD811A407E68A1001C13298254C98550E5
                                                                                                SHA-256:9CAB1DEEF6EB7D0BAE297CAF94376AA7CF95339C098C5A693BA041ABD96B9675
                                                                                                SHA-512:325BF20B14D7CC2D69B4C3EAAC072B49824DA2864818F069808D16A017C8471A277BCA0F88454B0F0C1C34189EDAE74D666F94A617BB520F981A5AC887AEB88B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.PNG........IHDR..............w=.....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (469), with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):202962
                                                                                                Entropy (8bit):5.692836311112738
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:CiP0VAPqExoHgmUqteN0Jx+MRTCSRlr1istBBJaKs:GG/keNimCMsPBcKs
                                                                                                MD5:7DA75C1E61B690E74A85613AF05EFAF8
                                                                                                SHA1:1F029CACC3796C3E1011FD61E1E57209E49C1974
                                                                                                SHA-256:3697F143C7354F92311121579C7E7D0118FF8953AFE607E1E5C1E7687291D679
                                                                                                SHA-512:21221B5D770923E1E59A348B2CA6D2B9E6D38F54A58B2657B8CB9CE89563903CB4019B65F2478D468B5A53FDA47DA7DC7802273A62C59EFCD1D6C964893B84DA
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.{.. "Messages" : [.. {.. "Codes" : [.. "SU-1001".. ],.. "Title" : "Self Update Failed",.. "Title_translate" : "true",.. "Descriptions" : "Failed to create an installer.",.. "Descriptions_translate" : "true",.. "Title_zh-CN" : "......",.. "Descriptions_zh-CN" : ".........",.. "Title_ja" : "..........",.. "Descriptions_ja" : ".................",.. "Title_fr" : ".chec de la mise . jour automatique",.. "Descriptions_fr" : ".chec de cr.ation du programme d'installation.",.. "Title_de" : "Selbstaktualisierung fehlgeschlagen",.. "Descriptions_de" : "Installer konnte nicht erstellt werden.",.. "Title_ko" : ".. .... ..",.. "Descriptions_ko" : ".... ... .......",.. "Title_it" : "Auto-aggiornamento non riuscito",..
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:JSON data
                                                                                                Category:dropped
                                                                                                Size (bytes):2346
                                                                                                Entropy (8bit):4.711690635503979
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:aliKHMu4oGzcm2HxQS7IOrGPzmtYWELxQqoCyhFmA:aDMuMGXaxarmA
                                                                                                MD5:42A7FB43C1A33B4B1CCF1C665647C77B
                                                                                                SHA1:8ADDAE3C4E238F23A60B2013E4655A384211BDCE
                                                                                                SHA-256:74F7FDDB5FB3EA3CE2856140A690C25AED3FEBD2256ABFDB261ABE2B87025E7E
                                                                                                SHA-512:76136714AA040196A782FBAED92D4708BF84FF4203D0080A384BE4604370567193A788E6596A09B136EF4E1E3F9F16FAE7CAE4C87BA713F720F3FEAA4E2C91A2
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:{..."BaseUrls": [....{....."Name": "epicgamesnext",....."BaseUrl": "https://launcher.store.epicgames.com"....},....{....."Name": "epicgames",....."BaseUrl": "https://epicgames.com"....},....{....."Name": "storeweb.epicgames",....."BaseUrl": "https://store.epicgames.com"....},....{....."Name": "epicgames.epicgames",....."BaseUrl": "https://epicgames.com"....},....{....."Name": "launcher.epicgames",....."BaseUrl": "https://ue-launcher-website-prod.ol.epicgames.com"....},....{....."Name": "accounts.epicgames",....."BaseUrl": "https://accounts.epicgames.com"....},....{....."Name": "accounts.launcher.epicgames",....."BaseUrl": "https://accounts.launcher-website-prod07.ol.epicgames.com"....},....{....."Name": "forums.unrealengine",....."BaseUrl": "https://forums.unrealengine.com"....},....{....."Name": "unrealengine",....."BaseUrl": "https://www.unrealengine.com"....},....{....."Name": "publish.unrealengine",....."BaseUrl": "https://publish.unrealengine.com"....},....{....."Name": "help.epic
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:JSON data
                                                                                                Category:dropped
                                                                                                Size (bytes):71868
                                                                                                Entropy (8bit):5.325421920474391
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:+ibcLjEmiqrXUeontgigNm7ReMBSvfE3OuEsl:+ibrMkCigNaS0
                                                                                                MD5:7B3736FBFD3E14C718F65BB0E9AE8E2D
                                                                                                SHA1:F82C46D79BF853FFEFAA4E122DDB63D3AB974E31
                                                                                                SHA-256:E6185D198759C2BF85AE7A579C13FFDEBED082C1E48F2119F376D85031B90CA4
                                                                                                SHA-512:57B2372D3DC808ED38A4261179F1BBA2273EFFCA0F6C4E3FA66581ABDBEDE1FA7AE44003688ABB9CC7F17C1FBB2FC10F0AD6A002A610F092168D348A9C1F6FC4
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:{.. "Links" : [.. {.. "Name" : "Launcher_No_Longer_Supporting_MacOS_10_9",.. "URL" : "{epicgames.epicgames}/help/en-US/epic-games-store-c5719341124379/launcher-support-c5719357217435/epic-games-launcher-no-longer-supports-macos-10-9-or-10-10-a7535371800475".. },.. {.. "Name" : "Launcher_No_Longer_Supporting_MacOS_10_10",.. "URL" : "{epicgames.epicgames}/help/en-US/epic-games-store-c5719341124379/launcher-support-c5719357217435/epic-games-launcher-no-longer-supports-macos-10-9-or-10-10-a7535371800475".. },.. {.. "Name" : "Launcher_No_Longer_Supporting_Older_MacOS",.. "URL" : "{epicgames.epicgames}/help/en-US/epic-games-store-c5719341124379/launcher-support-c5719357217435/epic-games-launcher-no-longer-supports-macos-10-9-or-10-10-a7535371800475".. },.. {.. "Name" : "Launcher_No_Longer_Supported_Without_EOS",.. "URL" : "{epicgames.epicgames}/help/epic-games-store-c73/epic-online-services-a
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):1600
                                                                                                Entropy (8bit):5.105123752764663
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:PeA9ahcEvSLkzmZ4dx1hyBTWz9LSNWuv+78hPPR9c:PeA9aSEv2gmmddSWJ2WaK8h3w
                                                                                                MD5:D06139530BCC99514B3DF585C587D57F
                                                                                                SHA1:5F3797F1D7EAED98EB5A4A552A67F98F23F38A99
                                                                                                SHA-256:5F291BF36E8EBE726ED442863969717668DA34B61FFFDE1F8FC604CD85BD8308
                                                                                                SHA-512:C0938EA8B3A760225501EF9EA875C65CFA1CD75D8BA14E2CE0DD8A9B788B1E914EC5B539934842F99D84AFB6AEAC15F378CA1BAD25E96676CD51473B662294CA
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:;========== PORTAL - CODEREDEMPTION SERVICE ==========..[Portal.OnlineSubsystemMcp.CodeRedemptionServiceMcp Prod]..Domain=coderedemption-public-service-prod.ol.epicgames.com....;========== PORTAL - FULFILLMENT SERVICE ==========..[Portal.OnlineSubsystemMcp.OnlineFulfillmentServiceMcp Prod]..Domain=fulfillment-public-service-prod06.ol.epicgames.com....;========== PORTAL - DATA STORAGE SERVICE ==========..[Portal.OnlineSubsystemMcp.OnlineDataStorageServiceMcp Prod]..Domain=datastorage-public-service-liveegs.live.use1a.on.epicgames.com....;========== PORTAL - LIBRARY SERVICE ==========..[Portal.OnlineSubsystemMcp.OnlineLibraryServiceMcp Prod]..Domain=library-service.live.use1a.on.epicgames.com....;========== PORTAL - REGION ORIGIN SETTINGS ==========..[Portal.Origin Prod]..NextInternalOrigin=launcher.store.epicgames.com/....[Portal.Origin Stage]..NextInternalOrigin=epicgames-stage.ol.epicgames.net/....[Portal.Origin GameDev]..NextInternalOrigin=epicgames-gamedev.ol.epicgames.net/....[Port
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Epic Online Services, Author: Epic Games, Inc., Keywords: Installer, Comments: This installer database contains the logic and data required to install Epic Online Services., Template: Intel;1033, Revision Number: {0AC89065-FDDB-45C2-88AB-02315AA8B5F5}, Create Time/Date: Wed Aug 2 20:37:38 2023, Last Saved Time/Date: Wed Aug 2 20:37:38 2023, Number of Pages: 405, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 4
                                                                                                Category:dropped
                                                                                                Size (bytes):134049792
                                                                                                Entropy (8bit):7.997723606903335
                                                                                                Encrypted:true
                                                                                                SSDEEP:3145728:6W+lu8efwAXA7FLjCt1Ond3xSQHVYX2ja6pBaWO5JZIwlnBaZ:6tcw8oFfie750+a6pF
                                                                                                MD5:1B44609A0998BAE367A4700EA7F5D6B2
                                                                                                SHA1:CD62B2C1B379A0B18ED14CECDAA4A1787DE20966
                                                                                                SHA-256:AE27108F40EC5DBB135CFF6F6FDBA238FF11C1DFD0F914A901BFCFD24DC79E0B
                                                                                                SHA-512:FE2FF76DF94A9E60C0BBB33698C03471C50D4ABD7DD6C5956050520B8E17F1E9C8C2E5E30D0A49C082FB6B83D71C81074B02DD09E5F58A55FEF480DD71A664D3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:......................>................... ................................................................ ...$...(...,...0...4...8...<...@...D...H...L...P...T...X...\...`...d...h...l...p...t...x...|..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):24016
                                                                                                Entropy (8bit):6.6592188895559685
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:bgaflz35DQD+Y3DGk8ZpH3GCJEFxExNG+Y3DGE1Fw8JN77hhFiB:bgaN5DIDGkiRBExDGyT3haB
                                                                                                MD5:4A3181A2E93579124799A9B81263768E
                                                                                                SHA1:33C8C8EBD802C3D802133AD10475F1DB0E5194C3
                                                                                                SHA-256:1130E54261ADD0069C5B700555631B780E950A3040E20F3AD6CC984F0251730E
                                                                                                SHA-512:50B1C8A4766E8C83382A5DF10DCA451F8FADD3B012CC2C82DEC9CFDB48D3B8F6DCAD26D8BAAD9C31426A3E04C6AD672EB599AB6A4EA1FB3A4188E622EAEA5B2E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...\58e.........."...0..............6... ...@....@.. ..............................q.....`..................................6..O....@...............$...9...`......H5............................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......."..............@..B.................6......H........"..T............................................................0............i./.r...p..i.....(....s....z....(.....(....,.r&..ps....z....(.....rW..p(......r...po....,..(....-.(......(....,; ........s.......r...p....(....,.r...p.(....(......o.....+........(....s.....(.........o.....(....,.r#..pr...p.(....(....(....+9.(...... ......(....&..(........r...p...o....(....(........o .......,...o!........(.....(....-\.("...,Dr0..p....i.1-...+.......r2..p(#........X......i2...
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):190928
                                                                                                Entropy (8bit):5.969693507588729
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:6GfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01Kymka5M9:8zMRLkR6joxfRPoM9
                                                                                                MD5:735AC22B2774C06F1D46B6BF968B1B52
                                                                                                SHA1:DC003AD2EA8B9FA616E4F2189A0E4D0282174AF2
                                                                                                SHA-256:23376C15D8B1AC063E69251088081B879C575E133CBA252574B0CCFE81F289F2
                                                                                                SHA-512:B042E74082DF0AB2BF9A92559EC6A602C5E05CCA7F3B98562FF7CD53DDBE0893F105C1E0DD0A78EDC72E2B14FC635D9455B21ECB95EAADDBE4B3B52AC9CE055C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ..............................aq....@.................................(...O........................9.......................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:Certificate, Version=3
                                                                                                Category:dropped
                                                                                                Size (bytes):1413
                                                                                                Entropy (8bit):7.480496427934893
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:yYvJm3RW857Ij3kTteTuQRFjGgZLE5XBy9+JYSE19rVAVsGnyI3SKB7:PL854TTuQL/ZoXQ9+mrGVrb3R
                                                                                                MD5:285EC909C4AB0D2D57F5086B225799AA
                                                                                                SHA1:D89E3BD43D5D909B47A18977AA9D5CE36CEE184C
                                                                                                SHA-256:68B9C761219A5B1F0131784474665DB61BBDB109E00F05CA9F74244EE5F5F52B
                                                                                                SHA-512:4CF305B95F94C7A9504C53C7F2DC8068E647A326D95976B7F4D80433B2284506FC5E3BB9A80A4E9A9889540BBF92908DD39EE4EB25F2566FE9AB37B4DC9A7C09
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:0...0..i.......9rD:.".Q..l..15.0...*.H........0{1.0...U....GB1.0...U....Greater Manchester1.0...U....Salford1.0...U....Comodo CA Limited1!0...U....AAA Certificate Services0...190312000000Z..281231235959Z0..1.0...U....US1.0...U....New Jersey1.0...U....Jersey City1.0...U....The USERTRUST Network1.0,..U...%USERTrust RSA Certification Authority0.."0...*.H.............0..........e.6......W.v..'.L.P.a. M.-d.....=.........{7(.+G.9.:.._..}..cB.v.;+...o... ..>..t.....bd......j."<......{......Q..gF.Q..T?.3.~l......Q.5..f.rg.!f..x..P:.....L....5.WZ....=.,..T....:M.L..\... =.."4.~;hf.D..NFS.3`...S7.sC.2.S...tNi.k.`.......2..;Qx.g..=V...i....%&k3m.nG.sC.~..f.)|2.cU.....T0....}7..]:l5\.A...I......b..f.%....?.9......L.|.k..^...g.....[..L..[...s.#;-..5Ut.I.IX...6.Q...&}.M....C&.A_@.DD...W..P.WT.>.tc/.Pe..XB.C.L..%GY.....&FJP...x..g...W...c..b.._U..\.(..%9..+..L...?.R.../..........0..0...U.#..0......#>.....)...0..0...U......Sy.Z.+J.T.......f.0...U...........0...U.......0....0...U
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):250
                                                                                                Entropy (8bit):2.966267825516145
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:kkFklNlyTuslfllXlE/lQcjT18tlwiANjpU+plgh3VEkax3QbaLU15lqErtd9lyt:kKnT+QAbjMulgokaWbLOW+n
                                                                                                MD5:6F3EE29795BF8CF76232C7007CB6CECC
                                                                                                SHA1:626571442D738E54B75044F885B135BD4419A82B
                                                                                                SHA-256:6921B2E066D6E3184E10DEFF2095A8D12B92BE0D5FA642AA09070D736803CC66
                                                                                                SHA-512:85F428E99B8C9E08101B5960041556B4A21CE9B25095CEAA3B25F8944185B8389E482B3611019B197ABB691F1E29A872B3CE632A4B1F721D8722129746F28362
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:p...... ....h...6.V.....(....................................................... .........(.f...@8..................h.t.t.p.:././.c.r.t...u.s.e.r.t.r.u.s.t...c.o.m./.U.S.E.R.T.r.u.s.t.R.S.A.A.d.d.T.r.u.s.t.C.A...c.r.t...".5.c.8.6.f.6.8.0.-.5.8.5."...
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:CSV text
                                                                                                Category:dropped
                                                                                                Size (bytes):651
                                                                                                Entropy (8bit):5.343677015075984
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhaOK9eDLI4MNJK9P/JNTK9yiv:ML9E4KlKDE4KhKiKhPKIE4oKNzKoM
                                                                                                MD5:7EEF860682F76EC7D541A8C1A3494E3D
                                                                                                SHA1:58D759A845D2D961A5430E429EF777E60C48C87E
                                                                                                SHA-256:65E958955AC5DBB7D7AD573EB4BB36BFF4A1DC52DD16CF79A5F7A0FA347727F1
                                                                                                SHA-512:BF7767D55F624B8404240953A726AA616D0CE60EC1B3027710B919D6838EFF7281A79B49B22AB8B065D8CA921EF4D09017A0991CB4A21DAF09B3B43E6698CB04
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):2106216
                                                                                                Entropy (8bit):6.4563314852745375
                                                                                                Encrypted:false
                                                                                                SSDEEP:49152:DpX9JVeE9HP6Zpy9KyhMI50Du8LljslNsHSHFUq9OiapbbO5Akb:H3P9HP6Zpy9KyhMI50Du8LljslNsyHiS
                                                                                                MD5:1C9B45E87528B8BB8CFA884EA0099A85
                                                                                                SHA1:98BE17E1D324790A5B206E1EA1CC4E64FBE21240
                                                                                                SHA-256:2F23182EC6F4889397AC4BF03D62536136C5BDBA825C7D2C4EF08C827F3A8A1C
                                                                                                SHA-512:B76D780810E8617B80331B4AD56E9C753652AF2E55B66795F7A7D67D6AFCEC5EF00D120D9B2C64126309076D8169239A721AE8B34784B639B3A3E2BF50D6EE34
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\.h...;...;...;..];...;...;...;.._;...;..h;0..;..i;'..;..X;...;..l;D..;?M.;...;..Y;...;..^;...;Rich...;........PE..L...92.K...........!.........d...............................................p .....O. ...@.........................@.......@...P..................... .h............................................i..@............................................text...S........................... ..`.data....~.......B..................@....rsrc................(..............@..@.reloc..D............,..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):6796
                                                                                                Entropy (8bit):7.242703752909775
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:Dm9WkVDPDaD9D743Ss/kPnE8UADPDaMm/D743bM5DODs+5cxzRWolNDPDaZD74oB:69VEQKPnEtObMacxc8hjXHUz1Tr2QRZ
                                                                                                MD5:11BC389F7A75423CEFA205BF3A404CE2
                                                                                                SHA1:3883969A816DB884A79E1B1ED8D2EC075D48F985
                                                                                                SHA-256:32000BAC9D162035751FE9016FC580D0CC0A643563C0F563D86D5FB83329E65F
                                                                                                SHA-512:0AC8F8FE65A449DBE175CA3B5A9269C7FAA65C852BCD41322FB0DA1B2FA2E52B468589399043C05070E57966559DB6F03D21270DCB26A7BEE0D09B2222905E6E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:0.....*.H.........y0..u...1.0...+......0.....+.....7......0...0...+.....7.........C..O..'..]G...100602115423Z0...+.....7.....0..L0..&.RA.0.D.C.F.D.F.1.0.4.C.6.F.9.2.5.F.4.D.E.E.D.8.3.B.3.1.B.1.C.9.E.4.A.D.1.B.E.F.B...1..0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...............%......J..0....RE.A.5.D.8.B.B.B.F.1.3.1.3.4.3.D.D.0.D.D.B.2.0.7.3.D.C.B.B.7.6.3.4.E.6.B.C.E.C.C...1..0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........]...14=...=.cNk..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}........0..0,..+.....7.....0....S.p.L.e.v.e.l........0...0D..+.....7....604...S.p.A.t.t.r........2.0.0.5.0.2.0.1.0.0.0.0.0.0...0....+.....7....x0v...O.S.A.t.t.r.......`2.:.5...0.,.2.:.5...1.,.2.:.5...2.,.2.:.5...x.,.2.:.6...x.,.2.:.7...x.,.2.:.8...x.,.2.:.9...x......10..`0..L...........
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:Windows setup INFormation
                                                                                                Category:dropped
                                                                                                Size (bytes):801
                                                                                                Entropy (8bit):5.488673383707369
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:tsXnoqJhoaj2jt4sV3dGn8rZVI8h8rs37OL:2XthoaqjtV3dGnw+kOL
                                                                                                MD5:90785E792EDCFA7D43DE9DF2D1AC884D
                                                                                                SHA1:EA5D8BBBF131343DD0DDB2073DCBB7634E6BCECC
                                                                                                SHA-256:8F68CCDD8CE1ACFAA5C4AFAC6B2E96E23B7B532FBCBE9375709326083A134E85
                                                                                                SHA-512:A2D15DF6148B811AD5658D9692A737924A3CE3AE1007CD86B6AD994922D95D839258DD18D785425609970EFA8A39CA79FA61512F7908891CF51CD0EEB6AD2B15
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0..Provider = %MSFT%..Class = %ExceptionClassDesc%..ClassGUID = {F5776D81-AE53-4935-8E84-B0B283D8BCEF}..CatalogFile = D3DCompiler_43_x86.cat..ComponentId = {C4F89AB5-99E9-4CD6-A760-F75EA57D0673}..DriverVer = 06-02-2010, 5.3.1.0904....[SourceDisksNames]..99 = %DiskName%,"JUN2010_D3DCompiler_43_x86.cab",0,,-1....[SourceDisksFiles]..D3DCompiler_43.dll = 99....[DestinationDirs]..DefaultDestDir = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..D3DCompiler_43.dll....[DirectX_SysWOW64]..D3DCompiler_43.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX JUN2010"..DiskName = "DirectX JUN2010 cab"....
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:Windows setup INFormation
                                                                                                Category:dropped
                                                                                                Size (bytes):572
                                                                                                Entropy (8bit):5.262759700206673
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:tsXnoHqqlaydGTFBngTrWgprCpt8e49pt8rs37O1B:tsXnoK0dGn8rZVI8h8rs37OL
                                                                                                MD5:269EE8EAE0AEB992621E80A3F1B2C501
                                                                                                SHA1:C1F1031B04E243F44C63AD762217D61D1FC41E58
                                                                                                SHA-256:EADF4D9537F17BB65FB811B7FD1C5248D6AE08DB5CF0F17E500F5CF73D685CCC
                                                                                                SHA-512:91003527430C9F15478ECA6FC950ACE7DB9156D38B172484C133601B18D5BF7FEE89F9B36379E723BF408F831B2860E39A1BC03F48C831615CE53CB521D20A87
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0....[SourceDisksNames]..99 = %DiskName%,"JUN2010_D3DCompiler_43_x86.cab",0,,-1....[SourceDisksFiles]..D3DCompiler_43.dll = 99....[DestinationDirs]..DefaultDestDir = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..D3DCompiler_43.dll....[DirectX_SysWOW64]..D3DCompiler_43.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX JUN2010"..DiskName = "DirectX JUN2010 cab"....
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:Windows setup INFormation
                                                                                                Category:dropped
                                                                                                Size (bytes):1670
                                                                                                Entropy (8bit):5.353827430841304
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:0+KXIIO6eK/2FgBrW2F3BLO2F+n2FZZ2Fre2FtW2FO:iXIj6eK/2Fg82F3NO2F+n2FZZ2Fre2FK
                                                                                                MD5:1A86443FC4E07E0945904DA7EFE2149D
                                                                                                SHA1:37A6627DBF3B43ACA104EB55F9F37E14947838CE
                                                                                                SHA-256:5DD568919E1B3CBCB23AB21D0F2D6C1A065070848ABA5D2A896DA39E55C6CBBF
                                                                                                SHA-512:C9FAA6BB9485B1A0F8356DF42C1EFE1711A77EFA566EEE3EB0C8031ECE10FFA045D35ADB63E5E8B2F79F26BF3596C54C0BD23FEA1642FAAE11BAF2E97B73CF5E
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..; ---- Common sections ----..[Version]..Signature = "$CHICAGO$"..AdvancedINF = 2.0..Provider = %MSFT%..SetupClass = BASE....[Strings]..MSFT = "Microsoft"......; ---- Windows 2000 ----..[4.09.00.0904.00-4.09.00.0904.00_Win2K]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..D3DCompiler_43_x86_xp.inf, x86_Install......; ---- Windows XP ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..D3DCompiler_43_x86_xp.inf, x86_Install......; ---- Windows XP 64bit ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP@64]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..D3DCompiler_43_x86_xp.inf, x64_Install......; ---- Windows Server 2003 ----..[4.09.00.0904.00-4.09.00.0904.00_Srv2K3]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..D3DCompiler_43_x86_xp.inf, x86_install......;
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:Windows setup INFormation
                                                                                                Category:dropped
                                                                                                Size (bytes):1635
                                                                                                Entropy (8bit):5.347501446123384
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:0+KXIIO6eK/2AgBrW2A3BLO2A+n2AZZ2Are2AtW2AO:iXIj6eK/2Ag82A3NO2A+n2AZZ2Are2AB
                                                                                                MD5:CF70B3DD13A8C636DB00BD4332996D1A
                                                                                                SHA1:48DD8FC6FA3DAE23CB6CA8113BC7AD837B4570D7
                                                                                                SHA-256:D5200B332CAF4FFF25EB3D224527A3944878C5C3849512779A2AFCFEAE4C3CA1
                                                                                                SHA-512:AE31A9E20743A2052DEEC5D696A555460A03D400720679ED103759241B25D55E2FBC247170DA3C0C0891F32B131AB6A6845DE56C2D3387AD233AA11DB970B313
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..; ---- Common sections ----..[Version]..Signature = "$CHICAGO$"..AdvancedINF = 2.0..Provider = %MSFT%..SetupClass = BASE....[Strings]..MSFT = "Microsoft"......; ---- Windows 2000 ----..[4.09.00.0904.00-4.09.00.0904.00_Win2K]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dcsx_43_x86_xp.inf, x86_Install......; ---- Windows XP ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dcsx_43_x86_xp.inf, x86_Install......; ---- Windows XP 64bit ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP@64]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dcsx_43_x86_xp.inf, x64_Install......; ---- Windows Server 2003 ----..[4.09.00.0904.00-4.09.00.0904.00_Srv2K3]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dcsx_43_x86_xp.inf, x86_install......; ---- Windows Server
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:Windows setup INFormation
                                                                                                Category:dropped
                                                                                                Size (bytes):1635
                                                                                                Entropy (8bit):5.334993389233006
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:0+KXIIO6eK/2ngBrW2n3BLO2n+n2nZZ2nre2ntW2nO:iXIj6eK/2ng82n3NO2n+n2nZZ2nre2ns
                                                                                                MD5:53A24FAEE760E18821EF0960C767AB04
                                                                                                SHA1:4548DB4234DBACBFB726784B907D08D953496FF9
                                                                                                SHA-256:4D4263CBB11858C727824C4A071F992909675719BE3076B4A47852BF6AFFD862
                                                                                                SHA-512:8371471624F54DB0ACA3EA051235937FC28575C0F533B89F7D2204C776814D4CD09EE1A37B41163239885E878FB193133AD397FE3C18232AD3469626AF2D2ED1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..; ---- Common sections ----..[Version]..Signature = "$CHICAGO$"..AdvancedINF = 2.0..Provider = %MSFT%..SetupClass = BASE....[Strings]..MSFT = "Microsoft"......; ---- Windows 2000 ----..[4.09.00.0904.00-4.09.00.0904.00_Win2K]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dx10_43_x86_xp.inf, x86_Install......; ---- Windows XP ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dx10_43_x86_xp.inf, x86_Install......; ---- Windows XP 64bit ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP@64]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dx10_43_x86_xp.inf, x64_Install......; ---- Windows Server 2003 ----..[4.09.00.0904.00-4.09.00.0904.00_Srv2K3]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dx10_43_x86_xp.inf, x86_install......; ---- Windows Server
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:Windows setup INFormation
                                                                                                Category:dropped
                                                                                                Size (bytes):1635
                                                                                                Entropy (8bit):5.3452018288502385
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:0+KXIIO6eK/2wgBrW2w3BLO2w+n2wZZ2wre2wtW2wO:iXIj6eK/2wg82w3NO2w+n2wZZ2wre2w5
                                                                                                MD5:FB5D27C88B52DCBDBC226F66F0537573
                                                                                                SHA1:2CBF1012FBDCBBD17643F7466F986ECD3CE2688A
                                                                                                SHA-256:3925C924EB4EC4F5A643B2D14D2EDA603341FBBD22118CDD8AE04AAA96F443C0
                                                                                                SHA-512:8AA2200F91ECA91D7EE3221BC7C8F2A9C8D913A5D633AA00835D5FB243D9CB8AFA60FE34A4C3DAA0731A21914BC52266D05D6B80BFC30B2A255D7ACDF0D18EB5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..; ---- Common sections ----..[Version]..Signature = "$CHICAGO$"..AdvancedINF = 2.0..Provider = %MSFT%..SetupClass = BASE....[Strings]..MSFT = "Microsoft"......; ---- Windows 2000 ----..[4.09.00.0904.00-4.09.00.0904.00_Win2K]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dx11_43_x86_xp.inf, x86_Install......; ---- Windows XP ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dx11_43_x86_xp.inf, x86_Install......; ---- Windows XP 64bit ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP@64]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dx11_43_x86_xp.inf, x64_Install......; ---- Windows Server 2003 ----..[4.09.00.0904.00-4.09.00.0904.00_Srv2K3]..NumberOfFiles=5..Size=1503 ;approximately total file size (Size * 1024 bytes)..CopyCount=2..d3dx11_43_x86_xp.inf, x86_install......; ---- Windows Server
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:Windows setup INFormation
                                                                                                Category:dropped
                                                                                                Size (bytes):1431
                                                                                                Entropy (8bit):5.359559696538983
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:M5+gJXIIO6eUBrH2q9vxBLP2q9vnE82q9vLzO2q9vJf2q9vjH2q9vs:0+KXIIO6eUBrWQxBLOQEnQ3ZQJeQjWQs
                                                                                                MD5:E188F534500688CEC2E894D3533997B4
                                                                                                SHA1:F073F8515B94CB23B703AB5CDB3A5CFCC10B3333
                                                                                                SHA-256:1C798CB80E9E46CE03356EA7316E1EFF5D3A88CCDD7CBFBFCDCE73CDED23B4E5
                                                                                                SHA-512:332CCB25C5ED92AE48C5805A330534D985D6B41F9220AF0844D407B2019396FCEFEA7076B409439F5AB8A9CA6819B65C07ADA7BD3AA1222429966DC5A440D4F7
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..; ---- Common sections ----..[Version]..Signature = "$CHICAGO$"..AdvancedINF = 2.0..Provider = %MSFT%..SetupClass = BASE....[Strings]..MSFT = "Microsoft"......; ---- Windows XP ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP]..NumberOfFiles=5..Size=487 ;approximately total file size (Size * 1024 bytes)..CopyCount=1..xinput1_3_x86_xp.inf, x86_Install......; ---- Windows XP 64bit ----..[4.09.00.0904.00-4.09.00.0904.00_WinXP@64]..NumberOfFiles=5..Size=487 ;approximately total file size (Size * 1024 bytes)..CopyCount=1..xinput1_3_x86_xp.inf, x64_Install......; ---- Windows Server 2003 ----..[4.09.00.0904.00-4.09.00.0904.00_Srv2K3]..NumberOfFiles=5..Size=487 ;approximately total file size (Size * 1024 bytes)..CopyCount=1..xinput1_3_x86_xp.inf, x86_Install......; ---- Windows Server 2003 64bit ----..[4.09.00.0904.00-4.09.00.0904.00_Srv2K3@64]..NumberOfFiles=5..Size=487 ;approximately total file size (Size * 1024 bytes)..CopyCount=1..xinput1_3_x86_xp.inf, x64_install......; ---- W
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):1868128
                                                                                                Entropy (8bit):6.25014757191993
                                                                                                Encrypted:false
                                                                                                SSDEEP:24576:/j0ZXvi+of1/z+uQ5Da3Qx1fF4dEQMtqVC43ux:/A9i/f1/z+Zce4dpMATe
                                                                                                MD5:83EBA442F07AAB8D6375D2EEC945C46C
                                                                                                SHA1:C29C20DA6BB30BE7D9DDA40241CA48F069123BD9
                                                                                                SHA-256:B46A44B6FCE8F141C9E02798645DB2EE0DA5C69EA71195E29F83A91A355FA2CA
                                                                                                SHA-512:288906C8AA8EB4D62440FE84DEAA25E7F362DC3644DAFC1227E45A71F6D915ACF885314531DB4757A9BF2E6CB12EAF43B54E9FF0F6A7E3239CABB697B07C25EA
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........$...E...E...E....$..E...E..]E....&..E.......E....!..E.......E......E.... ..E....'..E..Rich.E..........................PE..L....1.K...........!.........f......Mf....... ............................................@.........................0...X.......<....`...............j..`....p......P................................d..@............... ............................text............................... ..`.data....3... ...0..................@....rsrc........`.......8..............@..@.reloc...,...p.......<..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):6796
                                                                                                Entropy (8bit):7.257834337832179
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:3zm3VkWkVDPDaD9D743Ss/kPnE8UADPDaMm/D743bM5DODs+5cxzRWolNDPDaZD9:a3VkVEQKPnEtObMacxc8hjeyveCXEt
                                                                                                MD5:AAED60FCF2BCF700D8F17500DAD6DC95
                                                                                                SHA1:DAC96B0992E12298F17067DD9FA8C50EDCBC2297
                                                                                                SHA-256:7F8A33984E71CFD932417DD3081C71B798B31A57DEC96CA2D5982584A0B69728
                                                                                                SHA-512:13B8F5BD490D51F22A8234D089A9913756AD00AECD3A25E1C1CBE220B341FF65148B8ADC37EF64DEE203883E727CA3840E12D589E17F4A4ADEE728BA9CE2F1D7
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:0.....*.H.........y0..u...1.0...+......0.....+.....7......0...0...+.....7..... .e\(..I...E.]x@..100602115423Z0...+.....7.....0..L0..&.R2.C.5.3.0.F.E.1.6.A.C.7.2.D.D.8.9.6.8.1.B.A.6.B.1.9.5.1.B.E.4.4.9.D.3.8.F.D.D.2...1..0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........,S..j.-...k.Q.D.8..0....RF.F.3.2.9.6.9.8.0.7.4.9.6.5.4.9.3.1.2.8.E.6.2.7.F.7.7.0.B.9.B.3.E.4.4.4.F.8.1.3...1..0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........2...IeI1(.'.p...D..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}........0..0,..+.....7.....0....S.p.L.e.v.e.l........0...0D..+.....7....604...S.p.A.t.t.r........2.0.0.5.0.2.0.1.0.0.0.0.0.0...0....+.....7....x0v...O.S.A.t.t.r.......`2.:.5...0.,.2.:.5...1.,.2.:.5...2.,.2.:.5...x.,.2.:.6...x.,.2.:.7...x.,.2.:.8...x.,.2.:.9...x......10..`0..L...........
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:Windows setup INFormation
                                                                                                Category:dropped
                                                                                                Size (bytes):776
                                                                                                Entropy (8bit):5.483347321437731
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:tsXnoqJhoaj1FsVCdJn8rZVI8h8rsg7pL:2XthoahiVCdJnw+xpL
                                                                                                MD5:DDBFC2923DF1263BD87AC1BDBA534D4A
                                                                                                SHA1:FF329698074965493128E627F770B9B3E444F813
                                                                                                SHA-256:48EC353B9C9FBF9EC8692C5D6462C7E4FDB726E7A0B0ABD734F33F9E5F0ACE56
                                                                                                SHA-512:F10220C3F33CF1DA56C4FF580DA322923B5CDAC25BD1C8D0B4F8F0BF456397A4DD32A21E7B731306ED5E01A2B832ACEC7044D7337911E7F4649CDB6F6D37F603
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0..Provider = %MSFT%..Class = %ExceptionClassDesc%..ClassGUID = {F5776D81-AE53-4935-8E84-B0B283D8BCEF}..CatalogFile = d3dcsx_43_x86.cat..ComponentId = {6D337D2E-C4CC-454A-B384-939F934DDD72}..DriverVer = 06-02-2010, 5.3.1.0904....[SourceDisksNames]..99 = %DiskName%,"JUN2010_d3dcsx_43_x86.cab",0,,-1....[SourceDisksFiles]..d3dcsx_43.dll = 99....[DestinationDirs]..DefaultDestDir = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..d3dcsx_43.dll....[DirectX_SysWOW64]..d3dcsx_43.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX JUN2010"..DiskName = "DirectX JUN2010 cab"....
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:Windows setup INFormation
                                                                                                Category:dropped
                                                                                                Size (bytes):552
                                                                                                Entropy (8bit):5.261658761807364
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:tsXnoHqqlWdGTFkngTrWgprCpt8e49pt8rsg7p1B:tsXnoKrdJn8rZVI8h8rsg7pL
                                                                                                MD5:0AE2ECCF1418E98849B2973C4225AEB5
                                                                                                SHA1:78C4661DCC0DA0C7DFC6B67A50F11E54CFE72B78
                                                                                                SHA-256:2CA1181A9E4D4610557C4203C513D1EBD26D8EC9E0C2366271816044E3CDCAB6
                                                                                                SHA-512:4CED16CD9A097F19DE3C3E0E58B2F83EC2EA7D88E5A3AA6867AAC3168D3A176D6645B74FE76135E8A5F294256E0F72F7E537563327F47FA91CB95B90B5F78FFB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0....[SourceDisksNames]..99 = %DiskName%,"JUN2010_d3dcsx_43_x86.cab",0,,-1....[SourceDisksFiles]..d3dcsx_43.dll = 99....[DestinationDirs]..DefaultDestDir = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..d3dcsx_43.dll....[DirectX_SysWOW64]..d3dcsx_43.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX JUN2010"..DiskName = "DirectX JUN2010 cab"....
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):470880
                                                                                                Entropy (8bit):6.715347536118646
                                                                                                Encrypted:false
                                                                                                SSDEEP:12288:cFUDOgwNvArf8r3bK9s3kW3CG3vQ3sad/QNbubxu:5DOgw6fYbK9s3kW3CG3vQ3snputu
                                                                                                MD5:20C835843FCEC4DEDFCD7BFFA3B91641
                                                                                                SHA1:5DD1D5B42A0B58D708D112694394A9A23691C283
                                                                                                SHA-256:56FCD13650FD1F075743154E8C48465DD68A236AB8960667D75373139D2631BF
                                                                                                SHA-512:561EB2BB3A7E562BAB0DE6372E824F65B310D96D840CDAA3C391969018AF6AFBA225665D07139FC938DCFF03F4F8DAE7F19DE61C9A0EAE7C658A32800DC9D123
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......o..?+.nl+.nl+.nl+.ol..nl...l .nl...lk.nl...l$.nl...l*.nl...l{.nl.S.l*.nl...l*.nl...l*.nlRich+.nl........PE..L..../.K...........!.................9.......................................@...........@..........................v..%....k..x.......................`........0.....................................@............................................text....~.......................... ..`.data....].......V..................@....rsrc...............................@..@.reloc...9.......:..................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):6796
                                                                                                Entropy (8bit):7.254765641833245
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:NbVvVEQKPnEtObMacxc8hjXHUz1Tr2K4ms6W:L9ELXci2jXHU7s7
                                                                                                MD5:4B9EDAB17511C7AD0D4753E215160C0A
                                                                                                SHA1:DBCE3E783F5C24A611D3025155381264D840CAE3
                                                                                                SHA-256:EB374DB35DF2DE925C71B3AFFA8D9248D68E6005B2015BACC6A6E5A13EE4B046
                                                                                                SHA-512:D8B97FBEEAE38FE80439CD7589C574FA7FFB81C94494CA507ECDE3F7F5DA948EB54DCA63FD0A633B966494E00B7B8EE3C4F7826F681768C735E04EF97907D6BF
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:0.....*.H.........y0..u...1.0...+......0.....+.....7......0...0...+.....7..........[.H.....A.j..100602115422Z0...+.....7.....0..L0..&.R4.9.8.6.2.E.C.6.9.E.A.9.7.2.B.E.4.8.9.5.5.0.B.C.2.1.C.C.D.D.5.4.E.A.B.6.B.5.5.9...1..0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........I....r.H.P.!..T.Y0....R6.9.8.7.0.C.9.1.E.5.9.B.0.E.A.C.C.4.E.8.8.B.D.2.D.4.F.9.5.E.7.5.6.1.F.6.3.0.F.E...1..0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........i...........^ua.0.0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}........0..0,..+.....7.....0....S.p.L.e.v.e.l........0...0D..+.....7....604...S.p.A.t.t.r........2.0.0.5.0.2.0.1.0.0.0.0.0.0...0....+.....7....x0v...O.S.A.t.t.r.......`2.:.5...0.,.2.:.5...1.,.2.:.5...2.,.2.:.5...x.,.2.:.6...x.,.2.:.7...x.,.2.:.8...x.,.2.:.9...x......10..`0..L...........
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:Windows setup INFormation
                                                                                                Category:dropped
                                                                                                Size (bytes):776
                                                                                                Entropy (8bit):5.486519677108282
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:tsXnoqJhoajifNsVJd6tn8rZVI8h8rspN7O5L:2XthoaefaVJd8nw+KIL
                                                                                                MD5:24338A297E69E534524A71CD5AD543C3
                                                                                                SHA1:69870C91E59B0EACC4E88BD2D4F95E7561F630FE
                                                                                                SHA-256:ED1429A15B15A28F2E6A92DA669A205594D09625CBFCDBF0159516A813A6F5D4
                                                                                                SHA-512:8BB4AE9C72909C6B8BEB6CA675C007317903869BA56F549D9C2FF48A1FB50923B98B6F748E99BFD56B4B068E14C8773E9BF4DCDF5EB6CCB8B0EDD6A0B16DECC0
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0..Provider = %MSFT%..Class = %ExceptionClassDesc%..ClassGUID = {F5776D81-AE53-4935-8E84-B0B283D8BCEF}..CatalogFile = d3dx10_43_x86.cat..ComponentId = {F191D5F9-6D74-445e-9100-64D61DCD95CA}..DriverVer = 06-02-2010, 5.3.1.0904....[SourceDisksNames]..99 = %DiskName%,"JUN2010_d3dx10_43_x86.cab",0,,-1....[SourceDisksFiles]..d3dx10_43.dll = 99....[DestinationDirs]..DefaultDestDir = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..d3dx10_43.dll....[DirectX_SysWOW64]..d3dx10_43.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX JUN2010"..DiskName = "DirectX JUN2010 cab"....
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:Windows setup INFormation
                                                                                                Category:dropped
                                                                                                Size (bytes):552
                                                                                                Entropy (8bit):5.278909977985311
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:tsXnoHqqltdGTFUMtngTrWgprCpt8e49pt8rsmMN75M51B:tsXnoKgd6tn8rZVI8h8rspN7O5L
                                                                                                MD5:C6F443FD35C24CFCD2E9E906CA19B6B6
                                                                                                SHA1:2B74782DDDDFE4878319AF93B03CC5DB35EFDF83
                                                                                                SHA-256:74F3CC9F80A479FCB4954813DF9AC71085BF407E7B8B447B7ACE3C30E08E6F85
                                                                                                SHA-512:9C529C7DCA0A4F1C18B394AB4D7AA956B3B154889485C2D9F0D65C4CD45A2F040237512AF2BF61EF155724E0D7401BE4B09CBA96614A493DEFB738028637797D
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0....[SourceDisksNames]..99 = %DiskName%,"JUN2010_d3dx10_43_x86.cab",0,,-1....[SourceDisksFiles]..d3dx10_43.dll = 99....[DestinationDirs]..DefaultDestDir = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..d3dx10_43.dll....[DirectX_SysWOW64]..d3dx10_43.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX JUN2010"..DiskName = "DirectX JUN2010 cab"....
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):248672
                                                                                                Entropy (8bit):6.540646534165038
                                                                                                Encrypted:false
                                                                                                SSDEEP:6144:8K0GaAtQlDJCSB4MvfIeDRI9Z7IJItblSwJ7FnH4fa1wlMjb5:eGjQlDkSB4MvfIeDRI9Z7IJIRlfJ7N4w
                                                                                                MD5:8E0BB968FF41D80E5F2C747C04DB79AE
                                                                                                SHA1:69B332D78020177A9B3F60CB672EC47578003C0D
                                                                                                SHA-256:492E960CB3CCFC8C25FC83F7C464BA77C86A20411347A1A9B3E5D3E8C9180A8D
                                                                                                SHA-512:7D71CB5411F239696E77FE57A272C675FE15D32456CE7BEFB0C2CF3FC567DCE5D38A45F4B004577E3DEC283904F42AE17A290105D8AB8EF6B70BAD4E15C9D506
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t.c.0..Z0..Z0..Z.Z9..Z0..Z...Z.Z9..Z.Zp..Z.Z1..Z.Z...Z.6sZ1..Z.Z1..Z.Z1..ZRich0..Z........PE..L....1.K...........!.....6...|......F........P............................................@..........................<..E...T5..d.......................`.......`...................................`...@...............P............................text...%4.......6.................. ..`.data....S...P...R...:..............@....rsrc...............................@..@.reloc...".......$..................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):6796
                                                                                                Entropy (8bit):7.252886544623485
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:RSzM5EQKPnEtObMacxc8hjXHUz1Tr22SM:NELXci2jXHULb
                                                                                                MD5:8731DC141C5F490C84DE170F78D122C7
                                                                                                SHA1:99D83EA9BDDDB7636E926811700973FDBAC501CA
                                                                                                SHA-256:ACA973753DACD00F19A10733F900CD4A0CE6F6A202B4CD82B02A06D6EA8D92F8
                                                                                                SHA-512:CC1F2F0C8DF1AA87D01D86946AA1312D7A737790A2ACC1A3770F8066D9B34B6CD492EA8B5DA16D68ED2F8E6DA190E7B64AC4C65AC88C1B45D9660BE5F78C1649
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:0.....*.H.........y0..u...1.0...+......0.....+.....7......0...0...+.....7..........(A.&n|.....100602115422Z0...+.....7.....0..L0....R2.E.3.F.0.4.2.2.E.8.8.D.6.D.B.E.A.F.8.2.1.1.D.7.D.C.E.7.B.3.8.D.3.0.4.8.C.4.3.3...1..0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........?.".m.......0H.30b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0..&.R3.E.A.C.F.B.B.6.7.0.F.6.6.5.3.4.9.C.0.A.2.1.6.9.7.E.2.3.E.4.0.7.4.9.B.9.C.0.4.E...1..0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........>...p.e4..!i~#..I..N....0..0,..+.....7.....0....S.p.L.e.v.e.l........0...0D..+.....7....604...S.p.A.t.t.r........2.0.0.5.0.2.0.1.0.0.0.0.0.0...0....+.....7....x0v...O.S.A.t.t.r.......`2.:.5...0.,.2.:.5...1.,.2.:.5...2.,.2.:.5...x.,.2.:.6...x.,.2.:.7...x.,.2.:.8...x.,.2.:.9...x......10..`0..L...........
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:Windows setup INFormation
                                                                                                Category:dropped
                                                                                                Size (bytes):776
                                                                                                Entropy (8bit):5.5085250435289606
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:tsXnoqJhoajRkN+GsVadhn8rZVI8h8rss7BL:2XthoaNkExVadhnw+ZBL
                                                                                                MD5:5F043E62B5CC2F3D578E8F58AAA09FBA
                                                                                                SHA1:2E3F0422E88D6DBEAF8211D7DCE7B38D3048C433
                                                                                                SHA-256:025CFD736326445F5D98D8DFC8584189F8EEBB2D5F3E3CD25A6F386BC2496958
                                                                                                SHA-512:D1AF12375E5169525464DD17DEC6F6EC437B6A35DB6C425D508FA694B506F302B8A72E3F2222467E2CD98346F017A83B5149B80FC8C06B06320EC9E265280680
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0..Provider = %MSFT%..Class = %ExceptionClassDesc%..ClassGUID = {F5776D81-AE53-4935-8E84-B0B283D8BCEF}..CatalogFile = d3dx11_43_x86.cat..ComponentId = {948C45ED-E04A-48A8-A895-EEC45A7D221B}..DriverVer = 06-02-2010, 5.3.1.0904....[SourceDisksNames]..99 = %DiskName%,"JUN2010_d3dx11_43_x86.cab",0,,-1....[SourceDisksFiles]..d3dx11_43.dll = 99....[DestinationDirs]..DefaultDestDir = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..d3dx11_43.dll....[DirectX_SysWOW64]..d3dx11_43.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX JUN2010"..DiskName = "DirectX JUN2010 cab"....
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:Windows setup INFormation
                                                                                                Category:dropped
                                                                                                Size (bytes):552
                                                                                                Entropy (8bit):5.277146898626137
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:tsXnoHqql+dGTFULngTrWgprCpt8e49pt8rsm37571B:tsXnoKXdhn8rZVI8h8rss7BL
                                                                                                MD5:6984C5F943AF5FCE6FD432A4F4F74259
                                                                                                SHA1:A785B65C7E0E1166A5E43DE4AEB13E5441E8898B
                                                                                                SHA-256:F2DBCB36E32847488C27792CD391E3E17DEBA31FF1F0FEB002A2E9A7EDBA6376
                                                                                                SHA-512:61C79578BEEB811F744C6EF97DDC2B8D357956AA16F2E5F0ABC1271A65390B160135B105756836B528F1C0EF16AB4B106B064B7C7A71E1C0F30CC42FC4477904
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0....[SourceDisksNames]..99 = %DiskName%,"JUN2010_d3dx11_43_x86.cab",0,,-1....[SourceDisksFiles]..d3dx11_43.dll = 99....[DestinationDirs]..DefaultDestDir = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..d3dx11_43.dll....[DirectX_SysWOW64]..d3dx11_43.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX JUN2010"..DiskName = "DirectX JUN2010 cab"....
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:Windows setup INFormation
                                                                                                Category:dropped
                                                                                                Size (bytes):66865
                                                                                                Entropy (8bit):5.567626982635727
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:Wn+OeDyG6lG9CVGQM6UP8XUUkw8KlNxLkPkjdARflPp0VZRTBM9oZPFASJu71N1F:V
                                                                                                MD5:B36D3F105D18E55534AD605CBF061A92
                                                                                                SHA1:788EF2DE1DEA6C8FE1D23A2E1007542F7321ED79
                                                                                                SHA-256:C6C5E877E92D387E977C135765075B7610DF2500E21C16E106A225216E6442AE
                                                                                                SHA-512:35AE00DA025FD578205337A018B35176095A876CD3C3CF67A3E8A8E69CD750A4CCC34CE240F11FAE3418E5E93CAF5082C987F0C63F9D953ED7CB8D9271E03B62
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..[Version]..Signature=$Chicago$..DisplayName=%SetupTitle%..MinFileSize=2000....[DirectX]..SectionType=Group..Priority=100..DisplayName=%DirectX%....[DXUpdate_Feb2005_x86]..DisplayName=%Feb2005%..Details=%DirectX_Desc%..SectionType=Component..Platform=NT5..Group=DirectX..Size=990,0..GUID={44BBA855-CC51-11CF-AAFA-00AA00B6015C}..URL1="Feb2005_d3dx9_24_x86.cab",3..Version=4,09,00,0904....[DXUpdate_Feb2005_x64]..DisplayName=%Feb2005%..Details=%DirectX_Desc%..SectionType=Component..Platform=NT5..Group=DirectX..Size=1220,0..GUID={44BBA855-CC51-11CF-AAFA-00AA00B6015C}..URL1="Feb2005_d3dx9_24_x64.cab",3..Version=4,09,00,0904....[DXUpdate_Apr2005_x86]..DisplayName=%Apr2005%..Details=%DirectX_Desc%..SectionType=Component..Platform=NT5..Group=DirectX..Size=1055,0..GUID={44BBA855-CC51-11CF-AAFA-00AA00B6015C}..URL1="Apr2005_d3dx9_25_x86.cab",3..Version=4,09,00,0904....[DXUpdate_Apr2005_x64]..DisplayName=%Apr2005%..Details=%DirectX_Desc%..SectionType=Component..Platform=NT5..Group=DirectX..Size=1317
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):177152
                                                                                                Entropy (8bit):6.549767948531931
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:KU6LKKnw8i/9S7BLGKm/nuFV3uNgosUBxr+2y97CqGIpHtWMeJnQRLj+bTHyKaY:Iw8aIMrfuFVeNgosUBxra4rIZsqq
                                                                                                MD5:7ED554B08E5B69578F9DE012822C39C9
                                                                                                SHA1:036D04513E134786B4758DEF5AFF83D19BF50C6E
                                                                                                SHA-256:FB4F297E295C802B1377C6684734B7249D55743DFB7C14807BEF59A1B5DB63A2
                                                                                                SHA-512:7AF5F9C4A3AD5C120BCDD681B958808ADA4D885D21AEB4A009A36A674AD3ECE9B51837212A982DB6142A6B5580E5B68D46971B802456701391CE40785AE6EBD9
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............M...M...M.CM...M...MJ..M...M...M...M...M...M...M..KM...M..zM...M..{M...M..JM...M..MM...MRich...M................PE..L......M...........!.....j...n............................................................@.........................pw..V....j..........8.......................X...p...................................@...............8............................text....h.......j.................. ..`.data....:...........n..............@....rsrc...8...........................@..@.reloc..0&.......(..................@..B........................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:Windows setup INFormation
                                                                                                Category:dropped
                                                                                                Size (bytes):12848
                                                                                                Entropy (8bit):5.071095411173453
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:eXTiDxtV0xxmBxbD6Ys7s6xHOJYwYdDxAp8xXZyUxIJM:eXiM
                                                                                                MD5:E6A74342F328AFA559D5B0544E113571
                                                                                                SHA1:A08B053DFD061391942D359C70F9DD406A968B7D
                                                                                                SHA-256:93F5589499EE4EE2812D73C0D8FEACBBCFE8C47B6D98572486BC0EFF3C5906CA
                                                                                                SHA-512:1E35E5BDFF1D551DA6C1220A1A228C657A56A70DEDF5BE2D9273FC540F9C9F0BB73469595309EA1FF561BE7480EE92D16F7ACBBD597136F4FC5F9B8B65ECDFAD
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..; ---- Common sections ----..[Version]..Signature = "$CHICAGO$"..AdvancedINF = 2.0..Provider = %MSFT%..SetupClass = BASE....[Strings]..MSFT = "Microsoft"....[MDXDLLs]..Microsoft.DirectX.AudioVideoPlayback.dll..Microsoft.DirectX.Diagnostics.dll..Microsoft.DirectX.Direct3D.dll..Microsoft.DirectX.Direct3DX.dll..Microsoft.DirectX.DirectDraw.dll..Microsoft.DirectX.DirectInput.dll..Microsoft.DirectX.DirectPlay.dll..Microsoft.DirectX.DirectSound.dll..Microsoft.DirectX.dll......; ---- Windows 98 ----..[4.09.00.0904.00-4.09.00.0904.00_Win98_Feb2005_d3dx9_24_x86.cab]..NumberOfFiles=4..Size=2178 ;approximately total file size (Size * 1024 bytes)..CopyCount=1..d3dx9_24_w9x.inf....[4.09.00.0904.00-4.09.00.0904.00_Win98_Feb2005_MDX_x86.MSI]..NumberOfFiles=1..Size=1788 ;approximately total file size (Size * 1024 bytes)..CopyCount=1..Dependencies=feb2005_d3dx9_24_x86.cab..Feb2005_MDX_x86.MSI......; ---- Windows ME ----..[4.09.00.0904.00-4.09.00.0904.00_WinME_Feb2005_d3dx9_24_x86.cab]..N
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):81768
                                                                                                Entropy (8bit):6.4167890753768395
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:TVeqvNS6T6jxeEsU6b0xZtDDVb9X8u9JA7zitdrz/R8cy/FaeBD:TVeqvNOeFgxZ9DVVtRBy/EeD
                                                                                                MD5:77F595DEE5FFACEA72B135B1FCE1312E
                                                                                                SHA1:D2A710B332DE3EF7A576E0AED27B0AE66892B7E9
                                                                                                SHA-256:8D540D484EA41E374FD0107D55D253F87DED4CE780D515D8FD59BBE8C98970A7
                                                                                                SHA-512:A8683050D7758C248052C11AC6A46C9A0B3B3773902CCA478C1961B6D9D2D57C75A8C925BA5AF4499989C0F44B34EAF57ABAFAFA26506C31E5E4769FB3439746
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........M..i#Y.i#Y.i#Y.i"Y.i#Y.f~Y.i#Y.f,Y.i#Y.f|Y.i#Y.f.Y.i#Y.fCY.i#Y.f}Y.i#Y.fyY.i#YRich.i#Y........................PE..L...5S.F...........!.........F....................@..........................`..................................................d....0..................h%...@..8....................................&..@...............\............................text...j........................... ..`.data....+..........................@....rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):10392
                                                                                                Entropy (8bit):7.308938023050865
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:Hu8+s9dsGEo6opz+Hz+ehjuOu39DKmHj70dpQ:b+sfhnhu1jRaeWb
                                                                                                MD5:D0C1F2FB476CDDA4CCE9DEB7856500DA
                                                                                                SHA1:05365C782FCA083F03C5714C5067ADA547B44CAC
                                                                                                SHA-256:784FC9D9F071130803E34792755CA68B5D0CA3F509F265B109A533EBE0E5314A
                                                                                                SHA-512:CB7F47DE766ADD6FA3C37F738BB562B352CB7EF89EB637417FDDD8235D86C503D7037713B0B5AF0C82A6BF4EC816CDE28A90418DC7ECB1E731B64EEE839B8AE4
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:0.(...*.H........(.0.(....1.0...+......0.....+.....7......0...0...+.....7.......A.n..K..VU..6C..070405015813Z0...+.....7.....0..L0....RE.8.6.C.F.5.3.0.F.E.0.0.C.0.F.A.2.A.1.0.7.6.8.4.A.1.9.8.B.3.7.E.9.7.B.9.C.E.7.6...1..0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........l.0....*.v....~...v0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0..&.RF.7.7.0.E.2.4.2.9.A.D.8.A.C.D.3.8.0.F.7.7.2.5.C.7.6.C.E.B.2.E.1.9.6.6.9.E.6.F.7...1..0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........p.B....r\v..i......0..0,..+.....7.....0....S.p.L.e.v.e.l........0...0D..+.....7....604...S.p.A.t.t.r........2.0.0.5.0.2.0.1.0.0.0.0.0.0...0....+.....7....x0v...O.S.A.t.t.r.......`2.:.5...0.,.2.:.5...1.,.2.:.5...2.,.2.:.5...x.,.2.:.6...x.,.2.:.7...x.,.2.:.8...x.,.2.:.9...x..... .0...0..............
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:Windows setup INFormation
                                                                                                Category:dropped
                                                                                                Size (bytes):783
                                                                                                Entropy (8bit):5.506417721060717
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:tsXnoHKJhm+eajQ3YKVmHwXdwXqdRl2qGTF4ngflLgprCpt8e49pt8rsE7x16Zw:tsXnoqJhoajgjzdKqhnUMVI8h8rsE7xH
                                                                                                MD5:E16C94EDC4B577B7ABE7B06E31376884
                                                                                                SHA1:E86CF530FE00C0FA2A107684A198B37E97B9CE76
                                                                                                SHA-256:BA212AA1514DF6509474A46C7B2FA07C210D249B524BF7D47D058461009A75C1
                                                                                                SHA-512:5405F6936E05E1260A3778D86D76145D2853A345AFA156BA6E0A7CF4BC9267CD4CBB5CD32878ADDA3C6130721218FB899FC896BF823CD63C32C7086B18CFE9DB
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0..Provider = %MSFT%..Class = %ExceptionClassDesc%..ClassGUID = {F5776D81-AE53-4935-8E84-B0B283D8BCEF}..CatalogFile = xinput1_3_x86.cat..ComponentId = {8B594EEF-4FAF-4C62-A647-04CA85E5AB00}..DriverVer = 04-04-2007, 5.3.1.0904....[SourceDisksNames]..99 = %DiskName%,"APR2007_xinput_x86.cab",0,,-1....[SourceDisksFiles]..xinput1_3.dll = 99....[DestinationDirs]..DirectX_System = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..xinput1_3.dll....[DirectX_SysWOW64]..xinput1_3.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX 9.0 APR2007"..DiskName = "DirectX 9.0 APR2007 cab"....
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:Windows setup INFormation
                                                                                                Category:dropped
                                                                                                Size (bytes):559
                                                                                                Entropy (8bit):5.278451695211352
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:tsXnoHqql2qGTF4ngflLgprCpt8e49pt8rsE7x16Zw:tsXnoKhqhnUMVI8h8rsE7xH
                                                                                                MD5:1B4A9360253BBBF4FF2DC1F8F3C0005C
                                                                                                SHA1:BC639A35D965C579A7DDA8D60748D7482F737F66
                                                                                                SHA-256:576AD2F8CC0F371D0E061F4A407153BD90E48841FCE7A8F7EF1FF3FDD4138C99
                                                                                                SHA-512:C0390CAB5DB06A5930EE563055C29EA10B6751049A77B33C9DD89F4016A3887D4D49670CF66D1F395EDC00A3E127864129EC57CBB4AF21B0D67ED6855950EDE3
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:..[Version]..Signature = "$Windows NT$"..AdvancedINF = 2.0....[SourceDisksNames]..99 = %DiskName%,"APR2007_xinput_x86.cab",0,,-1....[SourceDisksFiles]..xinput1_3.dll = 99....[DestinationDirs]..DirectX_System = 11..DirectX_SysWOW64 = 10,SysWOW64....[x86_Install]..CopyFiles = DirectX_System....[x64_Install]..CopyFiles = DirectX_SysWOW64....[DirectX_System]..xinput1_3.dll....[DirectX_SysWOW64]..xinput1_3.dll....[Strings]..MSFT = "Microsoft"..ExceptionClassDesc = "DirectX 9.0 APR2007"..DiskName = "DirectX 9.0 APR2007 cab"....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):216496
                                                                                                Entropy (8bit):6.646208142644182
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:/Jz/kyKA1X1dxbOZU32KndB4GLvyui2lhQtEaY4IDflQn0xHuudQ+cxEHSiZxaQ:/t/kE1jOZy2KL4GBiwQtEa4L2sV
                                                                                                MD5:A3AE5D86ECF38DB9427359EA37A5F646
                                                                                                SHA1:EB4CB5FF520717038ADADCC5E1EF8F7C24B27A90
                                                                                                SHA-256:C8D190D5BE1EFD2D52F72A72AE9DFA3940AB3FACEB626405959349654FE18B74
                                                                                                SHA-512:96ECB3BC00848EEB2836E289EF7B7B2607D30790FFD1AE0E0ACFC2E14F26A991C6E728B8DC67280426E478C70231F9E13F514E52C8CE7D956C1FAD0E322D98E0
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........................^.......\......].........................,.......<.........L...'.....'.....'.P.......8.....'.....Rich............................PE..L...Ap.]...........!.........P............................................................@.........................@................P..x....................`..........T...............................@...............<............................text...[........................... ..`.rdata..............................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):116144
                                                                                                Entropy (8bit):6.633672738599962
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:YImZwomOndvrhsgz56GoiFmntw1ebC0fsWk0FlcdOJKJpPpxyNokVbY4:jewOdvregz5L/mxb7FUOsrPpxyN7/
                                                                                                MD5:4FDD16752561CF585FED1506914D73E0
                                                                                                SHA1:F00023B9AE3C8CE5B7BB92F25011EAEBE6F9D424
                                                                                                SHA-256:AECD2D2FE766F6D439ACC2BBF1346930ECC535012CF5AD7B3273D2875237B7E7
                                                                                                SHA-512:3695E7EB1E35EC959243A91AB5B4454EB59AEEF0F2699AA5DE8E03DE8FBB89F756A89130526DA5C08815408CB700284A17936522AD2CAD594C3E6E9D18A3F600
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........z.b...1...1...1/.^1...1/.\1...1/.]1...1.s.0...1.s.0...1.s.0...1.c<1...1...1^..1.r.0...1.r.0...1.rP1...1..81...1.r.0...1Rich...1........................PE..L....p.]...........!.................4....... ......................................Y.....@.........................p...\..............x...............................T...........................8...@............ ..(............................text...k........................... ..`.rdata...w... ...x..................@..@.data...<"..........................@....rsrc...x...........................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                                                                                Category:dropped
                                                                                                Size (bytes):259950
                                                                                                Entropy (8bit):6.312075792225588
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:FArbg5BxgracGnEnRQOl9WGPotdix9uYuiARxs3J4VtiaGKykjFgESYj:FArbtraBqLlAGvPIs3qtiaCkjKESYj
                                                                                                MD5:F54843AF156794BA61AE0EC764251229
                                                                                                SHA1:069BA2232C67729A23841EC6C69021CE63B59A37
                                                                                                SHA-256:02A22318281D8F0475076239A63434189B142F2F533CA378D074AB9EB4E9CFDA
                                                                                                SHA-512:2D687454AEFCF93667B4D044092F549650C048E9311ED0A474F7E573F5BC8F9E3E18CECD00A69EB6F2FECEDAA23CC63AD882C193B310D52DBACC6E8049E7CE5C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..................'P\....'P^....'P_...........................>.......4..................R......:...........Rich...........................PE..L....o.]...........!.....D...|.......L.......`.......................................@....@.........................0}...*......x...............................4... s..T...........................xs..@............`..l............................text....B.......D.................. ..`.rdata...Q...`...R...H..............@..@.data...p...........................@....rsrc...............................@..@.reloc..4...........................@..B................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):1493
                                                                                                Entropy (8bit):4.732294656481805
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWwlTh17jJBDZtG9jDqRp:c0nd5t7q7WwFD7t3tG96n
                                                                                                MD5:3A35350940B2FA2C5A9C57BDB25AAE3F
                                                                                                SHA1:F4D32D9E007478C80C23F7B70245D6401550CE6A
                                                                                                SHA-256:361F2F5623B1E11403827FFD625C9EDC5D7977D584393D6475FC5E6559C3EDB7
                                                                                                SHA-512:62756D9247CD6EAD152F00D5FF7627E3158E5F0BEAE00520510830EEB9B1FF5B3A33201BC81240BD31F066198C6B639E3F2CBCEB9155C2CE994900AB3A685E8B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies .. by using the lates
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):36352
                                                                                                Entropy (8bit):4.813800140264642
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:v2b9NQxWU/kFDMgVzC2Yejxt2GlKyMmfSFtr5AEmHk4gQLnHMdbR:v2mHkDM32Bj2+KyWrB4gQzMd1
                                                                                                MD5:2B54558C365370886723974967A60B45
                                                                                                SHA1:FAF9BF7AC38BF35701DB8BD14321BA5E97A0103F
                                                                                                SHA-256:A7C459CA67D6388EB3C8D16A210E1DC73F6ABFFBB8A78BCF071C22F809942AFA
                                                                                                SHA-512:A47E0589FE690D45EEBDD540033FB1C0BEF88DBB6A9ED6FDDA0B989DEF4EBE5683A387CA2F72819727BA5BA372368BC35F76FC6BB32EF860F298FC13525BAB84
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....68e.........." ..0.................. ........... ....................................@....................................O.......d............................................................................ ............... ..H............text...$.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......,>..he...........................................................0..0.........(......o......(....-........,..o.......&...*.*....................')......Z(.......(....+.......*..{....*"..}....*..{....*.0..........(......~....(....-..*....0..........~.....r...pr...p~....(....o......,..~....(....,;(.....r...pr...p..r...p(....(....r...pr...p~....(....o.......&...,..o....*r...p*........gm.......0..0.......~.....r...pr...p~....(....o.......&...,..*~....*.........".......0..
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):184240
                                                                                                Entropy (8bit):5.876033362692288
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
                                                                                                MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
                                                                                                SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
                                                                                                SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
                                                                                                SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:modified
                                                                                                Size (bytes):281530
                                                                                                Entropy (8bit):2.179958689354676
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:/HlkOrpH6zWC7Ifyqo8Dn3LjIvZKdNKj79nIFTv+6mS+JOW0DR1+AKvX78CdEw/X:/eOrpazWlcE7RbACp7zibCuvr
                                                                                                MD5:E33BB7F63C09072122DDDC78439F1C9B
                                                                                                SHA1:63DF79F21C4CC0F9AF5BFA72F7149FD36DC7C8D6
                                                                                                SHA-256:178DF1EE0D08EF951B01A44FA9D2CF2AE39421958E9BAB6E7538CAB20AEEE58C
                                                                                                SHA-512:0F9F0FA91E7D8F4D1BF44801F87F2890CEB5759E0CC75F10A81A63ED7AECD16B30942A8B421F1153A803B02C1FB35B770D57BE77910196694A76E92D6F03EB55
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:--2023-10-31 12:15:04-- https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/EpicGamesLauncherInstaller.msi?productName=unrealEngine..Resolving launcher-public-service-prod06.ol.epicgames.com (launcher-public-service-prod06.ol.epicgames.com)... 18.67.65.6, 18.67.65.60, 18.67.65.112, .....Connecting to launcher-public-service-prod06.ol.epicgames.com (launcher-public-service-prod06.ol.epicgames.com)|18.67.65.6|:443... connected...HTTP request sent, awaiting response... 303 See Other..Location: https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller-15.17.1.msi?launcherfilename=EpicInstaller-15.17.1-unrealEngine.msi [following]..--2023-10-31 12:15:04-- https://epicgames-download1.akamaized.net/Builds/UnrealEngineLauncher/Installers/Win32/EpicInstaller-15.17.1.msi?launcherfilename=EpicInstaller-15.17.1-unrealEngine.msi..Resolving epicgames-download1.akamaized.net (epicgames-download1.akamaized.net)... 23.218.
                                                                                                Process:C:\Windows\SysWOW64\wget.exe
                                                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Epic Games Launcher, Author: Epic Games, Inc., Keywords: Installer, Comments: This installer database contains the logic and data required to install Epic Games Launcher., Create Time/Date: Tue Oct 24 22:37:28 2023, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 4, Template: Intel;1033,1042,1041,2052,1025,1031,1034,1036,1040,1045,1046,1049,1055,1054,1028, Last Saved By: Intel;1033,1042,1041,2052,1025,1031,1034,1036,1040,1045,1046,1049,1055,1054,1028, Revision Number: {B85FAA6E-A9AA-4655-9029-E1A4EDC05E1A}1.3.93.0;{FEC1A84C-0BE3-4B1C-9F28-9E333C9DE22D}1.3.93.0;{D0769F44-D459-450F-B084-CAE38062C75B}, Number of Pages: 405, Number of Characters: 0
                                                                                                Category:dropped
                                                                                                Size (bytes):185073664
                                                                                                Entropy (8bit):7.997663391194621
                                                                                                Encrypted:true
                                                                                                SSDEEP:3145728:oyKHxXZR5bsPL+buxE4ynkX+kKbtt3V8mIeDLhZ8muXNNE7byK88OmTZbOW/rXiA:IP4PAwUnkuk8BNbLIxg7bUQ
                                                                                                MD5:7A2CF04AC0C504A8EA5AED805DDE484D
                                                                                                SHA1:0536D7A178D1A42CEA1476EA6B44BC53ED26BC63
                                                                                                SHA-256:6F3F486D7A8409FC174198818C039152C6268BD9FDF210EE6BE1C91BF832B7E9
                                                                                                SHA-512:42AEED1D015AB279DF3065E04ADFF8001672A13180F4D73121ACE3BC8989783F12C7A5D0B50C684C74FD138FC1B4F451439ACD7B6342D4F60C7D3A18034E0988
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:......................>...................-................................................................ ...$...(...,...0...4...8...<...@...D...H...L...P...T...X...\...`...d...h...l...p...t...x...|..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Epic Games Launcher, Author: Epic Games, Inc., Keywords: Installer, Comments: This installer database contains the logic and data required to install Epic Games Launcher., Create Time/Date: Tue Oct 24 22:37:28 2023, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 4, Template: Intel;1033,1042,1041,2052,1025,1031,1034,1036,1040,1045,1046,1049,1055,1054,1028, Last Saved By: Intel;1033,1042,1041,2052,1025,1031,1034,1036,1040,1045,1046,1049,1055,1054,1028, Revision Number: {B85FAA6E-A9AA-4655-9029-E1A4EDC05E1A}1.3.93.0;{FEC1A84C-0BE3-4B1C-9F28-9E333C9DE22D}1.3.93.0;{D0769F44-D459-450F-B084-CAE38062C75B}, Number of Pages: 405, Number of Characters: 0
                                                                                                Category:dropped
                                                                                                Size (bytes):185073664
                                                                                                Entropy (8bit):7.997663391194621
                                                                                                Encrypted:true
                                                                                                SSDEEP:3145728:oyKHxXZR5bsPL+buxE4ynkX+kKbtt3V8mIeDLhZ8muXNNE7byK88OmTZbOW/rXiA:IP4PAwUnkuk8BNbLIxg7bUQ
                                                                                                MD5:7A2CF04AC0C504A8EA5AED805DDE484D
                                                                                                SHA1:0536D7A178D1A42CEA1476EA6B44BC53ED26BC63
                                                                                                SHA-256:6F3F486D7A8409FC174198818C039152C6268BD9FDF210EE6BE1C91BF832B7E9
                                                                                                SHA-512:42AEED1D015AB279DF3065E04ADFF8001672A13180F4D73121ACE3BC8989783F12C7A5D0B50C684C74FD138FC1B4F451439ACD7B6342D4F60C7D3A18034E0988
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:......................>...................-................................................................ ...$...(...,...0...4...8...<...@...D...H...L...P...T...X...\...`...d...h...l...p...t...x...|..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):1493
                                                                                                Entropy (8bit):4.732294656481805
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWwlTh17jJBDZtG9jDqRp:c0nd5t7q7WwFD7t3tG96n
                                                                                                MD5:3A35350940B2FA2C5A9C57BDB25AAE3F
                                                                                                SHA1:F4D32D9E007478C80C23F7B70245D6401550CE6A
                                                                                                SHA-256:361F2F5623B1E11403827FFD625C9EDC5D7977D584393D6475FC5E6559C3EDB7
                                                                                                SHA-512:62756D9247CD6EAD152F00D5FF7627E3158E5F0BEAE00520510830EEB9B1FF5B3A33201BC81240BD31F066198C6B639E3F2CBCEB9155C2CE994900AB3A685E8B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies .. by using the lates
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):36352
                                                                                                Entropy (8bit):4.813800140264642
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:v2b9NQxWU/kFDMgVzC2Yejxt2GlKyMmfSFtr5AEmHk4gQLnHMdbR:v2mHkDM32Bj2+KyWrB4gQzMd1
                                                                                                MD5:2B54558C365370886723974967A60B45
                                                                                                SHA1:FAF9BF7AC38BF35701DB8BD14321BA5E97A0103F
                                                                                                SHA-256:A7C459CA67D6388EB3C8D16A210E1DC73F6ABFFBB8A78BCF071C22F809942AFA
                                                                                                SHA-512:A47E0589FE690D45EEBDD540033FB1C0BEF88DBB6A9ED6FDDA0B989DEF4EBE5683A387CA2F72819727BA5BA372368BC35F76FC6BB32EF860F298FC13525BAB84
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....68e.........." ..0.................. ........... ....................................@....................................O.......d............................................................................ ............... ..H............text...$.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......,>..he...........................................................0..0.........(......o......(....-........,..o.......&...*.*....................')......Z(.......(....+.......*..{....*"..}....*..{....*.0..........(......~....(....-..*....0..........~.....r...pr...p~....(....o......,..~....(....,;(.....r...pr...p..r...p(....(....r...pr...p~....(....o.......&...,..o....*r...p*........gm.......0..0.......~.....r...pr...p~....(....o.......&...,..*~....*.........".......0..
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):184240
                                                                                                Entropy (8bit):5.876033362692288
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
                                                                                                MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
                                                                                                SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
                                                                                                SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
                                                                                                SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):216496
                                                                                                Entropy (8bit):6.646208142644182
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:/Jz/kyKA1X1dxbOZU32KndB4GLvyui2lhQtEaY4IDflQn0xHuudQ+cxEHSiZxaQ:/t/kE1jOZy2KL4GBiwQtEa4L2sV
                                                                                                MD5:A3AE5D86ECF38DB9427359EA37A5F646
                                                                                                SHA1:EB4CB5FF520717038ADADCC5E1EF8F7C24B27A90
                                                                                                SHA-256:C8D190D5BE1EFD2D52F72A72AE9DFA3940AB3FACEB626405959349654FE18B74
                                                                                                SHA-512:96ECB3BC00848EEB2836E289EF7B7B2607D30790FFD1AE0E0ACFC2E14F26A991C6E728B8DC67280426E478C70231F9E13F514E52C8CE7D956C1FAD0E322D98E0
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........................^.......\......].........................,.......<.........L...'.....'.....'.P.......8.....'.....Rich............................PE..L...Ap.]...........!.........P............................................................@.........................@................P..x....................`..........T...............................@...............<............................text...[........................... ..`.rdata..............................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                                                                                Category:dropped
                                                                                                Size (bytes):259950
                                                                                                Entropy (8bit):6.312075792225588
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:FArbg5BxgracGnEnRQOl9WGPotdix9uYuiARxs3J4VtiaGKykjFgESYj:FArbtraBqLlAGvPIs3qtiaCkjKESYj
                                                                                                MD5:F54843AF156794BA61AE0EC764251229
                                                                                                SHA1:069BA2232C67729A23841EC6C69021CE63B59A37
                                                                                                SHA-256:02A22318281D8F0475076239A63434189B142F2F533CA378D074AB9EB4E9CFDA
                                                                                                SHA-512:2D687454AEFCF93667B4D044092F549650C048E9311ED0A474F7E573F5BC8F9E3E18CECD00A69EB6F2FECEDAA23CC63AD882C193B310D52DBACC6E8049E7CE5C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..................'P\....'P^....'P_...........................>.......4..................R......:...........Rich...........................PE..L....o.]...........!.....D...|.......L.......`.......................................@....@.........................0}...*......x...............................4... s..T...........................xs..@............`..l............................text....B.......D.................. ..`.rdata...Q...`...R...H..............@..@.data...p...........................@....rsrc...............................@..@.reloc..4...........................@..B................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):1493
                                                                                                Entropy (8bit):4.732294656481805
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWwlTh17jJBDZtG9jDqRp:c0nd5t7q7WwFD7t3tG96n
                                                                                                MD5:3A35350940B2FA2C5A9C57BDB25AAE3F
                                                                                                SHA1:F4D32D9E007478C80C23F7B70245D6401550CE6A
                                                                                                SHA-256:361F2F5623B1E11403827FFD625C9EDC5D7977D584393D6475FC5E6559C3EDB7
                                                                                                SHA-512:62756D9247CD6EAD152F00D5FF7627E3158E5F0BEAE00520510830EEB9B1FF5B3A33201BC81240BD31F066198C6B639E3F2CBCEB9155C2CE994900AB3A685E8B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies .. by using the lates
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):36352
                                                                                                Entropy (8bit):4.813800140264642
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:v2b9NQxWU/kFDMgVzC2Yejxt2GlKyMmfSFtr5AEmHk4gQLnHMdbR:v2mHkDM32Bj2+KyWrB4gQzMd1
                                                                                                MD5:2B54558C365370886723974967A60B45
                                                                                                SHA1:FAF9BF7AC38BF35701DB8BD14321BA5E97A0103F
                                                                                                SHA-256:A7C459CA67D6388EB3C8D16A210E1DC73F6ABFFBB8A78BCF071C22F809942AFA
                                                                                                SHA-512:A47E0589FE690D45EEBDD540033FB1C0BEF88DBB6A9ED6FDDA0B989DEF4EBE5683A387CA2F72819727BA5BA372368BC35F76FC6BB32EF860F298FC13525BAB84
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....68e.........." ..0.................. ........... ....................................@....................................O.......d............................................................................ ............... ..H............text...$.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......,>..he...........................................................0..0.........(......o......(....-........,..o.......&...*.*....................')......Z(.......(....+.......*..{....*"..}....*..{....*.0..........(......~....(....-..*....0..........~.....r...pr...p~....(....o......,..~....(....,;(.....r...pr...p..r...p(....(....r...pr...p~....(....o.......&...,..o....*r...p*........gm.......0..0.......~.....r...pr...p~....(....o.......&...,..*~....*.........".......0..
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):184240
                                                                                                Entropy (8bit):5.876033362692288
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
                                                                                                MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
                                                                                                SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
                                                                                                SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
                                                                                                SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                                                                                Category:dropped
                                                                                                Size (bytes):259950
                                                                                                Entropy (8bit):6.312075792225588
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:FArbg5BxgracGnEnRQOl9WGPotdix9uYuiARxs3J4VtiaGKykjFgESYj:FArbtraBqLlAGvPIs3qtiaCkjKESYj
                                                                                                MD5:F54843AF156794BA61AE0EC764251229
                                                                                                SHA1:069BA2232C67729A23841EC6C69021CE63B59A37
                                                                                                SHA-256:02A22318281D8F0475076239A63434189B142F2F533CA378D074AB9EB4E9CFDA
                                                                                                SHA-512:2D687454AEFCF93667B4D044092F549650C048E9311ED0A474F7E573F5BC8F9E3E18CECD00A69EB6F2FECEDAA23CC63AD882C193B310D52DBACC6E8049E7CE5C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..................'P\....'P^....'P_...........................>.......4..................R......:...........Rich...........................PE..L....o.]...........!.....D...|.......L.......`.......................................@....@.........................0}...*......x...............................4... s..T...........................xs..@............`..l............................text....B.......D.................. ..`.rdata...Q...`...R...H..............@..@.data...p...........................@....rsrc...............................@..@.reloc..4...........................@..B................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):1493
                                                                                                Entropy (8bit):4.732294656481805
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWwlTh17jJBDZtG9jDqRp:c0nd5t7q7WwFD7t3tG96n
                                                                                                MD5:3A35350940B2FA2C5A9C57BDB25AAE3F
                                                                                                SHA1:F4D32D9E007478C80C23F7B70245D6401550CE6A
                                                                                                SHA-256:361F2F5623B1E11403827FFD625C9EDC5D7977D584393D6475FC5E6559C3EDB7
                                                                                                SHA-512:62756D9247CD6EAD152F00D5FF7627E3158E5F0BEAE00520510830EEB9B1FF5B3A33201BC81240BD31F066198C6B639E3F2CBCEB9155C2CE994900AB3A685E8B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies .. by using the lates
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):36352
                                                                                                Entropy (8bit):4.813800140264642
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:v2b9NQxWU/kFDMgVzC2Yejxt2GlKyMmfSFtr5AEmHk4gQLnHMdbR:v2mHkDM32Bj2+KyWrB4gQzMd1
                                                                                                MD5:2B54558C365370886723974967A60B45
                                                                                                SHA1:FAF9BF7AC38BF35701DB8BD14321BA5E97A0103F
                                                                                                SHA-256:A7C459CA67D6388EB3C8D16A210E1DC73F6ABFFBB8A78BCF071C22F809942AFA
                                                                                                SHA-512:A47E0589FE690D45EEBDD540033FB1C0BEF88DBB6A9ED6FDDA0B989DEF4EBE5683A387CA2F72819727BA5BA372368BC35F76FC6BB32EF860F298FC13525BAB84
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....68e.........." ..0.................. ........... ....................................@....................................O.......d............................................................................ ............... ..H............text...$.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......,>..he...........................................................0..0.........(......o......(....-........,..o.......&...*.*....................')......Z(.......(....+.......*..{....*"..}....*..{....*.0..........(......~....(....-..*....0..........~.....r...pr...p~....(....o......,..~....(....,;(.....r...pr...p..r...p(....(....r...pr...p~....(....o.......&...,..o....*r...p*........gm.......0..0.......~.....r...pr...p~....(....o.......&...,..*~....*.........".......0..
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):184240
                                                                                                Entropy (8bit):5.876033362692288
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
                                                                                                MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
                                                                                                SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
                                                                                                SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
                                                                                                SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2861755
                                                                                                Entropy (8bit):6.169111147382788
                                                                                                Encrypted:false
                                                                                                SSDEEP:24576:Fog5kZwu047sB56BbMoKvlGJtaMRZljzOE2Z34K/zOE2Z34Kz:Fv2a6Bb6lWZBnUIynUIG
                                                                                                MD5:D4D9F8F4CAF8D7F016876A572CA16BBF
                                                                                                SHA1:B1EBA4C49FF6AE51120906731BF81833F022DF31
                                                                                                SHA-256:0828851E20AE52CEEA4248906643438E14D5B9E1AAE36EA147F1B4775B6C119E
                                                                                                SHA-512:5FB1564AF72AEAD87CF503B0620262C1112B03E350720E1F959955569F6EC6A800F0BFE5AD4FAB37D357BF3B287A9BEDF7D5B8BC0C115F6EF321D13252A5475A
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:...@IXOS.@.....@.a_W.@.....@.....@.....@.....@.....@......&.{B85FAA6E-A9AA-4655-9029-E1A4EDC05E1A}..Epic Games Launcher&.EpicInstaller-15.17.1-unrealEngine.msi.@.....@]....@.....@......Installer.ico..&.{A13B70BC-1756-496B-B59D-57ABAB414A7D}.....@.....@.....@.....@.......@.....@.....@.......@......Epic Games Launcher......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration...@.....@.....@.]....&.{0A1854C3-A103-4EB9-AEFF-23E9388B9BA4}/.02:\Software\EpicGames\Unreal Engine\INSTALLDIR.@.......@.....@.....@......&.{50381214-3C27-4EA2-9681-8D3B63ADCF11}D.01:\Software\Epic Games\EpicGamesLauncher\StartMenuShortcutInstalled.@.......@.....@.....@......&.{14FC0C7C-7052-4099-8639-D521EF685E17}B.01:\Software\Epic Games\EpicGamesLauncher\DesktopShortcutInstalled.@.......@.....@.....@......&.{15FF6EE8-2A78-4FD0-830D-1A000D175ACF};.C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe.@.....
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                                                                                Category:dropped
                                                                                                Size (bytes):259950
                                                                                                Entropy (8bit):6.312075792225588
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:FArbg5BxgracGnEnRQOl9WGPotdix9uYuiARxs3J4VtiaGKykjFgESYj:FArbtraBqLlAGvPIs3qtiaCkjKESYj
                                                                                                MD5:F54843AF156794BA61AE0EC764251229
                                                                                                SHA1:069BA2232C67729A23841EC6C69021CE63B59A37
                                                                                                SHA-256:02A22318281D8F0475076239A63434189B142F2F533CA378D074AB9EB4E9CFDA
                                                                                                SHA-512:2D687454AEFCF93667B4D044092F549650C048E9311ED0A474F7E573F5BC8F9E3E18CECD00A69EB6F2FECEDAA23CC63AD882C193B310D52DBACC6E8049E7CE5C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..................'P\....'P^....'P_...........................>.......4..................R......:...........Rich...........................PE..L....o.]...........!.....D...|.......L.......`.......................................@....@.........................0}...*......x...............................4... s..T...........................xs..@............`..l............................text....B.......D.................. ..`.rdata...Q...`...R...H..............@..@.data...p...........................@....rsrc...............................@..@.reloc..4...........................@..B................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):1493
                                                                                                Entropy (8bit):4.732294656481805
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWwlTh17jJBDZtG9jDqRp:c0nd5t7q7WwFD7t3tG96n
                                                                                                MD5:3A35350940B2FA2C5A9C57BDB25AAE3F
                                                                                                SHA1:F4D32D9E007478C80C23F7B70245D6401550CE6A
                                                                                                SHA-256:361F2F5623B1E11403827FFD625C9EDC5D7977D584393D6475FC5E6559C3EDB7
                                                                                                SHA-512:62756D9247CD6EAD152F00D5FF7627E3158E5F0BEAE00520510830EEB9B1FF5B3A33201BC81240BD31F066198C6B639E3F2CBCEB9155C2CE994900AB3A685E8B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies .. by using the lates
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):36352
                                                                                                Entropy (8bit):4.813800140264642
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:v2b9NQxWU/kFDMgVzC2Yejxt2GlKyMmfSFtr5AEmHk4gQLnHMdbR:v2mHkDM32Bj2+KyWrB4gQzMd1
                                                                                                MD5:2B54558C365370886723974967A60B45
                                                                                                SHA1:FAF9BF7AC38BF35701DB8BD14321BA5E97A0103F
                                                                                                SHA-256:A7C459CA67D6388EB3C8D16A210E1DC73F6ABFFBB8A78BCF071C22F809942AFA
                                                                                                SHA-512:A47E0589FE690D45EEBDD540033FB1C0BEF88DBB6A9ED6FDDA0B989DEF4EBE5683A387CA2F72819727BA5BA372368BC35F76FC6BB32EF860F298FC13525BAB84
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....68e.........." ..0.................. ........... ....................................@....................................O.......d............................................................................ ............... ..H............text...$.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......,>..he...........................................................0..0.........(......o......(....-........,..o.......&...*.*....................')......Z(.......(....+.......*..{....*"..}....*..{....*.0..........(......~....(....-..*....0..........~.....r...pr...p~....(....o......,..~....(....,;(.....r...pr...p..r...p(....(....r...pr...p~....(....o.......&...,..o....*r...p*........gm.......0..0.......~.....r...pr...p~....(....o.......&...,..*~....*.........".......0..
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):184240
                                                                                                Entropy (8bit):5.876033362692288
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
                                                                                                MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
                                                                                                SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
                                                                                                SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
                                                                                                SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):1493
                                                                                                Entropy (8bit):4.732294656481805
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWwlTh17jJBDZtG9jDqRp:c0nd5t7q7WwFD7t3tG96n
                                                                                                MD5:3A35350940B2FA2C5A9C57BDB25AAE3F
                                                                                                SHA1:F4D32D9E007478C80C23F7B70245D6401550CE6A
                                                                                                SHA-256:361F2F5623B1E11403827FFD625C9EDC5D7977D584393D6475FC5E6559C3EDB7
                                                                                                SHA-512:62756D9247CD6EAD152F00D5FF7627E3158E5F0BEAE00520510830EEB9B1FF5B3A33201BC81240BD31F066198C6B639E3F2CBCEB9155C2CE994900AB3A685E8B
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies .. by using the lates
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):36352
                                                                                                Entropy (8bit):4.813800140264642
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:v2b9NQxWU/kFDMgVzC2Yejxt2GlKyMmfSFtr5AEmHk4gQLnHMdbR:v2mHkDM32Bj2+KyWrB4gQzMd1
                                                                                                MD5:2B54558C365370886723974967A60B45
                                                                                                SHA1:FAF9BF7AC38BF35701DB8BD14321BA5E97A0103F
                                                                                                SHA-256:A7C459CA67D6388EB3C8D16A210E1DC73F6ABFFBB8A78BCF071C22F809942AFA
                                                                                                SHA-512:A47E0589FE690D45EEBDD540033FB1C0BEF88DBB6A9ED6FDDA0B989DEF4EBE5683A387CA2F72819727BA5BA372368BC35F76FC6BB32EF860F298FC13525BAB84
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....68e.........." ..0.................. ........... ....................................@....................................O.......d............................................................................ ............... ..H............text...$.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......,>..he...........................................................0..0.........(......o......(....-........,..o.......&...*.*....................')......Z(.......(....+.......*..{....*"..}....*..{....*.0..........(......~....(....-..*....0..........~.....r...pr...p~....(....o......,..~....(....,;(.....r...pr...p..r...p(....(....r...pr...p~....(....o.......&...,..o....*r...p*........gm.......0..0.......~.....r...pr...p~....(....o.......&...,..*~....*.........".......0..
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):184240
                                                                                                Entropy (8bit):5.876033362692288
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
                                                                                                MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
                                                                                                SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
                                                                                                SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
                                                                                                SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):1493
                                                                                                Entropy (8bit):4.732294656481805
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWslTh17jJB7ZtG9jDqRp:c0nd5t7q7WsFD7tztG96n
                                                                                                MD5:01C01D040563A55E0FD31CC8DAA5F155
                                                                                                SHA1:3C1C229703198F9772D7721357F1B90281917842
                                                                                                SHA-256:33D947C04A10E3AFF3DCA3B779393FA56CE5F02251C8CBAE5076A125FDEA081F
                                                                                                SHA-512:9C3F0CC17868479575090E1949E31A688B8C1CDFA56AC4A08CBE661466BB40ECFC94EA512DC4B64D5FF14A563F96F1E71C03B6EEACC42992455BD4F1C91F17D5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies.. by using the latest
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):51200
                                                                                                Entropy (8bit):5.0659062068745335
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:9aob1Yt6/ibkVewbBUwBWnC0ee76rUYxv:/v/PlJWC9drUYxv
                                                                                                MD5:2CF9FE3247BB25DAF0AADDEFD6D40763
                                                                                                SHA1:DC9B4F8E2BB6E202500061E0E03DDDB102E42F26
                                                                                                SHA-256:DD24F8EF3EF4B6BC58B08ADE93E4AAC64856EE681909201B42CB0111A45FE9E6
                                                                                                SHA-512:4AF9A34082DD04179A080918C88FFFD2DDBC1D7E34779C50F8B9A2EEC9CFB65F2DE3EA016FA0843DE97DFEA5B0CA7E86F07EC0D7D1358DF6A3BCCB54C806A11C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...}..d.........." ..0.............2.... ........... ....................... ............@.....................................O.......d............................................................................ ............... ..H............text...8.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......<T..l............................................................0...........-.r...ps....z...u....,...+_.u0...,...+S.u1...-(.u2...- .u3...-..u4...-..u5...-..u6...,...+..u....,...+..u7...-..u8...,.......(....*.0..]........-.r...ps....z..(......sv......ox.....-...ou....o.....$..ou.....o.......,..o......,..o......*.........%."G..........4Q.......0..K........-.r...ps....z.sv......ow.....-....%..ou.....o........,..o......,..o......*..........5..........*?......&...(....*..
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):184240
                                                                                                Entropy (8bit):5.876033362692288
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
                                                                                                MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
                                                                                                SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
                                                                                                SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
                                                                                                SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):1493
                                                                                                Entropy (8bit):4.732294656481805
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWslTh17jJB7ZtG9jDqRp:c0nd5t7q7WsFD7tztG96n
                                                                                                MD5:01C01D040563A55E0FD31CC8DAA5F155
                                                                                                SHA1:3C1C229703198F9772D7721357F1B90281917842
                                                                                                SHA-256:33D947C04A10E3AFF3DCA3B779393FA56CE5F02251C8CBAE5076A125FDEA081F
                                                                                                SHA-512:9C3F0CC17868479575090E1949E31A688B8C1CDFA56AC4A08CBE661466BB40ECFC94EA512DC4B64D5FF14A563F96F1E71C03B6EEACC42992455BD4F1C91F17D5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies.. by using the latest
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):51200
                                                                                                Entropy (8bit):5.0659062068745335
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:9aob1Yt6/ibkVewbBUwBWnC0ee76rUYxv:/v/PlJWC9drUYxv
                                                                                                MD5:2CF9FE3247BB25DAF0AADDEFD6D40763
                                                                                                SHA1:DC9B4F8E2BB6E202500061E0E03DDDB102E42F26
                                                                                                SHA-256:DD24F8EF3EF4B6BC58B08ADE93E4AAC64856EE681909201B42CB0111A45FE9E6
                                                                                                SHA-512:4AF9A34082DD04179A080918C88FFFD2DDBC1D7E34779C50F8B9A2EEC9CFB65F2DE3EA016FA0843DE97DFEA5B0CA7E86F07EC0D7D1358DF6A3BCCB54C806A11C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...}..d.........." ..0.............2.... ........... ....................... ............@.....................................O.......d............................................................................ ............... ..H............text...8.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......<T..l............................................................0...........-.r...ps....z...u....,...+_.u0...,...+S.u1...-(.u2...- .u3...-..u4...-..u5...-..u6...,...+..u....,...+..u7...-..u8...,.......(....*.0..]........-.r...ps....z..(......sv......ox.....-...ou....o.....$..ou.....o.......,..o......,..o......*.........%."G..........4Q.......0..K........-.r...ps....z.sv......ow.....-....%..ou.....o........,..o......,..o......*..........5..........*?......&...(....*..
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):184240
                                                                                                Entropy (8bit):5.876033362692288
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
                                                                                                MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
                                                                                                SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
                                                                                                SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
                                                                                                SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):1493
                                                                                                Entropy (8bit):4.732294656481805
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWslTh17jJB7ZtG9jDqRp:c0nd5t7q7WsFD7tztG96n
                                                                                                MD5:01C01D040563A55E0FD31CC8DAA5F155
                                                                                                SHA1:3C1C229703198F9772D7721357F1B90281917842
                                                                                                SHA-256:33D947C04A10E3AFF3DCA3B779393FA56CE5F02251C8CBAE5076A125FDEA081F
                                                                                                SHA-512:9C3F0CC17868479575090E1949E31A688B8C1CDFA56AC4A08CBE661466BB40ECFC94EA512DC4B64D5FF14A563F96F1E71C03B6EEACC42992455BD4F1C91F17D5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies.. by using the latest
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):51200
                                                                                                Entropy (8bit):5.0659062068745335
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:9aob1Yt6/ibkVewbBUwBWnC0ee76rUYxv:/v/PlJWC9drUYxv
                                                                                                MD5:2CF9FE3247BB25DAF0AADDEFD6D40763
                                                                                                SHA1:DC9B4F8E2BB6E202500061E0E03DDDB102E42F26
                                                                                                SHA-256:DD24F8EF3EF4B6BC58B08ADE93E4AAC64856EE681909201B42CB0111A45FE9E6
                                                                                                SHA-512:4AF9A34082DD04179A080918C88FFFD2DDBC1D7E34779C50F8B9A2EEC9CFB65F2DE3EA016FA0843DE97DFEA5B0CA7E86F07EC0D7D1358DF6A3BCCB54C806A11C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...}..d.........." ..0.............2.... ........... ....................... ............@.....................................O.......d............................................................................ ............... ..H............text...8.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......<T..l............................................................0...........-.r...ps....z...u....,...+_.u0...,...+S.u1...-(.u2...- .u3...-..u4...-..u5...-..u6...,...+..u....,...+..u7...-..u8...,.......(....*.0..]........-.r...ps....z..(......sv......ox.....-...ou....o.....$..ou.....o.......,..o......,..o......*.........%."G..........4Q.......0..K........-.r...ps....z.sv......ow.....-....%..ou.....o........,..o......,..o......*..........5..........*?......&...(....*..
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):184240
                                                                                                Entropy (8bit):5.876033362692288
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
                                                                                                MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
                                                                                                SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
                                                                                                SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
                                                                                                SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):1493
                                                                                                Entropy (8bit):4.732294656481805
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWslTh17jJB7ZtG9jDqRp:c0nd5t7q7WsFD7tztG96n
                                                                                                MD5:01C01D040563A55E0FD31CC8DAA5F155
                                                                                                SHA1:3C1C229703198F9772D7721357F1B90281917842
                                                                                                SHA-256:33D947C04A10E3AFF3DCA3B779393FA56CE5F02251C8CBAE5076A125FDEA081F
                                                                                                SHA-512:9C3F0CC17868479575090E1949E31A688B8C1CDFA56AC4A08CBE661466BB40ECFC94EA512DC4B64D5FF14A563F96F1E71C03B6EEACC42992455BD4F1C91F17D5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies.. by using the latest
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):51200
                                                                                                Entropy (8bit):5.0659062068745335
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:9aob1Yt6/ibkVewbBUwBWnC0ee76rUYxv:/v/PlJWC9drUYxv
                                                                                                MD5:2CF9FE3247BB25DAF0AADDEFD6D40763
                                                                                                SHA1:DC9B4F8E2BB6E202500061E0E03DDDB102E42F26
                                                                                                SHA-256:DD24F8EF3EF4B6BC58B08ADE93E4AAC64856EE681909201B42CB0111A45FE9E6
                                                                                                SHA-512:4AF9A34082DD04179A080918C88FFFD2DDBC1D7E34779C50F8B9A2EEC9CFB65F2DE3EA016FA0843DE97DFEA5B0CA7E86F07EC0D7D1358DF6A3BCCB54C806A11C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...}..d.........." ..0.............2.... ........... ....................... ............@.....................................O.......d............................................................................ ............... ..H............text...8.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......<T..l............................................................0...........-.r...ps....z...u....,...+_.u0...,...+S.u1...-(.u2...- .u3...-..u4...-..u5...-..u6...,...+..u....,...+..u7...-..u8...,.......(....*.0..]........-.r...ps....z..(......sv......ox.....-...ou....o.....$..ou.....o.......,..o......,..o......*.........%."G..........4Q.......0..K........-.r...ps....z.sv......ow.....-....%..ou.....o........,..o......,..o......*..........5..........*?......&...(....*..
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):184240
                                                                                                Entropy (8bit):5.876033362692288
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
                                                                                                MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
                                                                                                SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
                                                                                                SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
                                                                                                SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):1493
                                                                                                Entropy (8bit):4.732294656481805
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:2dhmhx0PY6Iee7LfKhT06XWslTh17jJB7ZtG9jDqRp:c0nd5t7q7WsFD7tztG96n
                                                                                                MD5:01C01D040563A55E0FD31CC8DAA5F155
                                                                                                SHA1:3C1C229703198F9772D7721357F1B90281917842
                                                                                                SHA-256:33D947C04A10E3AFF3DCA3B779393FA56CE5F02251C8CBAE5076A125FDEA081F
                                                                                                SHA-512:9C3F0CC17868479575090E1949E31A688B8C1CDFA56AC4A08CBE661466BB40ECFC94EA512DC4B64D5FF14A563F96F1E71C03B6EEACC42992455BD4F1C91F17D5
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.... .. Use supportedRuntime tags to explicitly specify the version(s) of the .NET Framework runtime that.. the custom action should run on. If no versions are specified, the chosen version of the runtime.. will be the "best" match to what Microsoft.Deployment.WindowsInstaller.dll was built against..... WARNING: leaving the version unspecified is dangerous as it introduces a risk of compatibility.. problems with future versions of the .NET Framework runtime. It is highly recommended that you specify.. only the version(s) of the .NET Framework runtime that you have tested against..... Note for .NET Framework v3.0 and v3.5, the runtime version is still v2.0..... In order to enable .NET Framework version 2.0 runtime activation policy, which is to load all assemblies.. by using the latest
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):51200
                                                                                                Entropy (8bit):5.0659062068745335
                                                                                                Encrypted:false
                                                                                                SSDEEP:768:9aob1Yt6/ibkVewbBUwBWnC0ee76rUYxv:/v/PlJWC9drUYxv
                                                                                                MD5:2CF9FE3247BB25DAF0AADDEFD6D40763
                                                                                                SHA1:DC9B4F8E2BB6E202500061E0E03DDDB102E42F26
                                                                                                SHA-256:DD24F8EF3EF4B6BC58B08ADE93E4AAC64856EE681909201B42CB0111A45FE9E6
                                                                                                SHA-512:4AF9A34082DD04179A080918C88FFFD2DDBC1D7E34779C50F8B9A2EEC9CFB65F2DE3EA016FA0843DE97DFEA5B0CA7E86F07EC0D7D1358DF6A3BCCB54C806A11C
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...}..d.........." ..0.............2.... ........... ....................... ............@.....................................O.......d............................................................................ ............... ..H............text...8.... ...................... ..`.rsrc...d...........................@..@.reloc..............................@..B........................H.......<T..l............................................................0...........-.r...ps....z...u....,...+_.u0...,...+S.u1...-(.u2...- .u3...-..u4...-..u5...-..u6...,...+..u....,...+..u7...-..u8...,.......(....*.0..]........-.r...ps....z..(......sv......ox.....-...ou....o.....$..ou.....o.......,..o......,..o......*.........%."G..........4Q.......0..K........-.r...ps....z.sv......ow.....-....%..ou.....o........,..o......,..o......*..........5..........*?......&...(....*..
                                                                                                Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):184240
                                                                                                Entropy (8bit):5.876033362692288
                                                                                                Encrypted:false
                                                                                                SSDEEP:3072:BGfZS7hUuK3PcbFeRRLxyR69UgoCaf8+aCnfKlRUjW01KymkO:9zMRLkR6joxfRPW
                                                                                                MD5:1A5CAEA6734FDD07CAA514C3F3FB75DA
                                                                                                SHA1:F070AC0D91BD337D7952ABD1DDF19A737B94510C
                                                                                                SHA-256:CF06D4ED4A8BAF88C82D6C9AE0EFC81C469DE6DA8788AB35F373B350A4B4CDCA
                                                                                                SHA-512:A22DD3B7CF1C2EDCF5B540F3DAA482268D8038D468B8F00CA623D1C254AFFBBC1446E5BD42ADC3D8E274BE3BA776B0034E179FACCD9AC8612CCD75186D1E3BF1
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....o.].........." ..0...... ......z.... ........... ....................................@.................................(...O................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):38715
                                                                                                Entropy (8bit):5.195082049890812
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:KQWkujDjvI4/y14TWpsCF5hoznbXXsk11pS/T/Y/IgjJ1gjKVjPE/9huqu6xNT/G:jLxbmkmVsHSChG+AyV+J6p+amPOk
                                                                                                MD5:D49BBD2BF63CA0A60E6A08D94C8B7B32
                                                                                                SHA1:AD43EEB95A2AFB625B4E62641E287318BEA9720E
                                                                                                SHA-256:1C635E2422973E5FF3DBB8175BCAFF7479B20338BB1784D4D55A853C53E53AF8
                                                                                                SHA-512:9B809B6B29772CE14DF4919C6E3781FE1315AE12361EF04F07D61319D60714AD63A5EE7AEE9C0A839EF10A79E643F6542062A443D5DAFFE430D11AE719D3EFFE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:10/31/23 12:16:36: DXSetup: CommandLine: /silent..10/31/23 12:16:36: DSETUP: DirectXSetupA(): hWnd: 00000000 dwFlags: 02010098........10/31/23 12:16:36: dsetup32: === SetupForDirectX() start ===..10/31/23 12:16:36: dsetup32: Mar 30 2011 04:38:03..10/31/23 12:16:36: dsetup32: DXSetupCommand = 0...10/31/23 12:16:36: dsetup32: Installing on Windows 6.2.9200..10/31/23 12:16:36: dsetup32: DirectXSetupIsJapanese == 0..10/31/23 12:16:36: dsetup32: DirectXSetupIsJapanNec == 0..10/31/23 12:16:51: dsetup32: IsIA64(): not IA64...10/31/23 12:16:51: dsetup32: CLR version number = 2.0.50727....10/31/23 12:16:51: dsetup32: CLR version number = 4.0.30319....10/31/23 12:16:51: dsetup32: DXCheckTrust(): C:\PROGRA~2\EPICGA~1\DIRECT~1\dxupdate.cab is trusted...10/31/23 12:16:51: dsetup32: GetCDXUpdate(): Extracting dxupdate.dll from C:\PROGRA~2\EPICGA~1\DIRECT~1\dxupdate.cab...10/31/23 12:16:51: dsetup32: Extracted file C:\Users\user\AppData\Local\Temp\DX71DD.tmp\dxupdate.dll from cab..10/31/23 12:16:51:
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):432221
                                                                                                Entropy (8bit):5.37517548310053
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgauq:zTtbmkExhMJCIpErH
                                                                                                MD5:8E8E0E3F6633A7AB77CEC550803A2C8D
                                                                                                SHA1:4C87D28CC192152C4383ABF44E2F6338C4A099B2
                                                                                                SHA-256:15E7CFEE2838FD81ED8AFC9CF8053277805969BCF07B18ED6D8D394F228F1610
                                                                                                SHA-512:1EDED0BBCF2E696632B55D8157238BBD0FB01665CA21DFCDBF1690B6828CCFFCD981A00A48070EAB8BDE83A1B96066CBDBCEFCCB250CEFD42CE0FB4D574BF378
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):81768
                                                                                                Entropy (8bit):6.4167890753768395
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:TVeqvNS6T6jxeEsU6b0xZtDDVb9X8u9JA7zitdrz/R8cy/FaeBD:TVeqvNOeFgxZ9DVVtRBy/EeD
                                                                                                MD5:77F595DEE5FFACEA72B135B1FCE1312E
                                                                                                SHA1:D2A710B332DE3EF7A576E0AED27B0AE66892B7E9
                                                                                                SHA-256:8D540D484EA41E374FD0107D55D253F87DED4CE780D515D8FD59BBE8C98970A7
                                                                                                SHA-512:A8683050D7758C248052C11AC6A46C9A0B3B3773902CCA478C1961B6D9D2D57C75A8C925BA5AF4499989C0F44B34EAF57ABAFAFA26506C31E5E4769FB3439746
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........M..i#Y.i#Y.i#Y.i"Y.i#Y.f~Y.i#Y.f,Y.i#Y.f|Y.i#Y.f.Y.i#Y.fCY.i#Y.f}Y.i#Y.fyY.i#YRich.i#Y........................PE..L...5S.F...........!.........F....................@..........................`..................................................d....0..................h%...@..8....................................&..@...............\............................text...j........................... ..`.data....+..........................@....rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):470880
                                                                                                Entropy (8bit):6.715347536118646
                                                                                                Encrypted:false
                                                                                                SSDEEP:12288:cFUDOgwNvArf8r3bK9s3kW3CG3vQ3sad/QNbubxu:5DOgw6fYbK9s3kW3CG3vQ3snputu
                                                                                                MD5:20C835843FCEC4DEDFCD7BFFA3B91641
                                                                                                SHA1:5DD1D5B42A0B58D708D112694394A9A23691C283
                                                                                                SHA-256:56FCD13650FD1F075743154E8C48465DD68A236AB8960667D75373139D2631BF
                                                                                                SHA-512:561EB2BB3A7E562BAB0DE6372E824F65B310D96D840CDAA3C391969018AF6AFBA225665D07139FC938DCFF03F4F8DAE7F19DE61C9A0EAE7C658A32800DC9D123
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......o..?+.nl+.nl+.nl+.ol..nl...l .nl...lk.nl...l$.nl...l*.nl...l{.nl.S.l*.nl...l*.nl...l*.nlRich+.nl........PE..L..../.K...........!.................9.......................................@...........@..........................v..%....k..x.......................`........0.....................................@............................................text....~.......................... ..`.data....].......V..................@....rsrc...............................@..@.reloc...9.......:..................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):248672
                                                                                                Entropy (8bit):6.540646534165038
                                                                                                Encrypted:false
                                                                                                SSDEEP:6144:8K0GaAtQlDJCSB4MvfIeDRI9Z7IJItblSwJ7FnH4fa1wlMjb5:eGjQlDkSB4MvfIeDRI9Z7IJIRlfJ7N4w
                                                                                                MD5:8E0BB968FF41D80E5F2C747C04DB79AE
                                                                                                SHA1:69B332D78020177A9B3F60CB672EC47578003C0D
                                                                                                SHA-256:492E960CB3CCFC8C25FC83F7C464BA77C86A20411347A1A9B3E5D3E8C9180A8D
                                                                                                SHA-512:7D71CB5411F239696E77FE57A272C675FE15D32456CE7BEFB0C2CF3FC567DCE5D38A45F4B004577E3DEC283904F42AE17A290105D8AB8EF6B70BAD4E15C9D506
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t.c.0..Z0..Z0..Z.Z9..Z0..Z...Z.Z9..Z.Zp..Z.Z1..Z.Z...Z.6sZ1..Z.Z1..Z.Z1..ZRich0..Z........PE..L....1.K...........!.....6...|......F........P............................................@..........................<..E...T5..d.......................`.......`...................................`...@...............P............................text...%4.......6.................. ..`.data....S...P...R...:..............@....rsrc...............................@..@.reloc...".......$..................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):1868128
                                                                                                Entropy (8bit):6.25014757191993
                                                                                                Encrypted:false
                                                                                                SSDEEP:24576:/j0ZXvi+of1/z+uQ5Da3Qx1fF4dEQMtqVC43ux:/A9i/f1/z+Zce4dpMATe
                                                                                                MD5:83EBA442F07AAB8D6375D2EEC945C46C
                                                                                                SHA1:C29C20DA6BB30BE7D9DDA40241CA48F069123BD9
                                                                                                SHA-256:B46A44B6FCE8F141C9E02798645DB2EE0DA5C69EA71195E29F83A91A355FA2CA
                                                                                                SHA-512:288906C8AA8EB4D62440FE84DEAA25E7F362DC3644DAFC1227E45A71F6D915ACF885314531DB4757A9BF2E6CB12EAF43B54E9FF0F6A7E3239CABB697B07C25EA
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........$...E...E...E....$..E...E..]E....&..E.......E....!..E.......E......E.... ..E....'..E..Rich.E..........................PE..L....1.K...........!.........f......Mf....... ............................................@.........................0...X.......<....`...............j..`....p......P................................d..@............... ............................text............................... ..`.data....3... ...0..................@....rsrc........`.......8..............@..@.reloc...,...p.......<..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):2106216
                                                                                                Entropy (8bit):6.4563314852745375
                                                                                                Encrypted:false
                                                                                                SSDEEP:49152:DpX9JVeE9HP6Zpy9KyhMI50Du8LljslNsHSHFUq9OiapbbO5Akb:H3P9HP6Zpy9KyhMI50Du8LljslNsyHiS
                                                                                                MD5:1C9B45E87528B8BB8CFA884EA0099A85
                                                                                                SHA1:98BE17E1D324790A5B206E1EA1CC4E64FBE21240
                                                                                                SHA-256:2F23182EC6F4889397AC4BF03D62536136C5BDBA825C7D2C4EF08C827F3A8A1C
                                                                                                SHA-512:B76D780810E8617B80331B4AD56E9C753652AF2E55B66795F7A7D67D6AFCEC5EF00D120D9B2C64126309076D8169239A721AE8B34784B639B3A3E2BF50D6EE34
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\.h...;...;...;..];...;...;...;.._;...;..h;0..;..i;'..;..X;...;..l;D..;?M.;...;..Y;...;..^;...;Rich...;........PE..L...92.K...........!.........d...............................................p .....O. ...@.........................@.......@...P..................... .h............................................i..@............................................text...S........................... ..`.data....~.......B..................@....rsrc................(..............@..@.reloc..D............,..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):512
                                                                                                Entropy (8bit):0.0
                                                                                                Encrypted:false
                                                                                                SSDEEP:3::
                                                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                Category:dropped
                                                                                                Size (bytes):49152
                                                                                                Entropy (8bit):1.2518925228845963
                                                                                                Encrypted:false
                                                                                                SSDEEP:96:mug0TX8Gfsg5nf2JlD8XZs6gwgfJD9M1A:Lg0bigJf2rEm
                                                                                                MD5:90E44E11FF2FF5C994B0897693E61E7D
                                                                                                SHA1:0D02494239DCF9D0201144B3F3D7914099733064
                                                                                                SHA-256:26DD0B63BDC400D4B29FB9F26930FE06946C0B05F1761804A76313AC1509E8EE
                                                                                                SHA-512:B25ECB3C24D6FCF75B77921A07FFE1D6FABDDF443236D4F41F7595E0A6FC69A55C8DAD34D13ED4383DFFBA8C1CBD05317098B7AA9ADD1DF17218A808EAEF7D59
                                                                                                Malicious:false
                                                                                                Reputation:low
                                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                No static file info
                                                                                                Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

                                                                                                Click to jump to process

                                                                                                Click to jump to process

                                                                                                Click to dive into process behavior distribution

                                                                                                Click to jump to process

                                                                                                Target ID:0
                                                                                                Start time:12:15:03
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/EpicGamesLauncherInstaller.msi?productName=unrealEngine" > cmdline.out 2>&1
                                                                                                Imagebase:0x240000
                                                                                                File size:236'544 bytes
                                                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:1
                                                                                                Start time:12:15:04
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff7699e0000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:2
                                                                                                Start time:12:15:04
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\SysWOW64\wget.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/EpicGamesLauncherInstaller.msi?productName=unrealEngine"
                                                                                                Imagebase:0x400000
                                                                                                File size:3'895'184 bytes
                                                                                                MD5 hash:3DADB6E2ECE9C4B3E1E322E617658B60
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:9
                                                                                                Start time:12:15:26
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\System32\msiexec.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\download\EpicInstaller-15.17.1-unrealEngine.msi"
                                                                                                Imagebase:0x7ff647f30000
                                                                                                File size:69'632 bytes
                                                                                                MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:low
                                                                                                Has exited:false

                                                                                                Target ID:10
                                                                                                Start time:12:15:27
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\System32\msiexec.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\msiexec.exe /V
                                                                                                Imagebase:0x7ff647f30000
                                                                                                File size:69'632 bytes
                                                                                                MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:low
                                                                                                Has exited:false

                                                                                                Target ID:11
                                                                                                Start time:12:15:28
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 3BBD1DD15089631A9AFCF4304595035B C
                                                                                                Imagebase:0x290000
                                                                                                File size:59'904 bytes
                                                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:low
                                                                                                Has exited:false

                                                                                                Target ID:12
                                                                                                Start time:12:15:34
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:rundll32.exe "C:\Users\user\AppData\Local\Temp\MSIBB31.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7161484 5 CustomActionManaged!CustomActionManaged.CustomActions.ValidatePathLength
                                                                                                Imagebase:0xd80000
                                                                                                File size:61'440 bytes
                                                                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:13
                                                                                                Start time:12:15:41
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 5854640CF7E0C4E3DEBC704E3691BC11
                                                                                                Imagebase:0x290000
                                                                                                File size:59'904 bytes
                                                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:low
                                                                                                Has exited:false

                                                                                                Target ID:14
                                                                                                Start time:12:15:41
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:rundll32.exe "C:\Windows\Installer\MSI6187.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7168421 10 CustomActionManaged!CustomActionManaged.CustomActions.TelemetrySendStart
                                                                                                Imagebase:0xd80000
                                                                                                File size:61'440 bytes
                                                                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:15
                                                                                                Start time:12:15:44
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:rundll32.exe "C:\Windows\Installer\MSI6C17.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7171125 16 CustomActionManaged!CustomActionManaged.CustomActions.SetStartupCmdlineArgs
                                                                                                Imagebase:0xd80000
                                                                                                File size:61'440 bytes
                                                                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:16
                                                                                                Start time:12:15:46
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:rundll32.exe "C:\Windows\Installer\MSI7447.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7173218 22 CustomActionManaged!CustomActionManaged.CustomActions.CheckReparsePoints
                                                                                                Imagebase:0xd80000
                                                                                                File size:61'440 bytes
                                                                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:18
                                                                                                Start time:12:16:28
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 326B4F743620B4FBE5E3F09E4CCFA871 E Global\MSI0000
                                                                                                Imagebase:0x290000
                                                                                                File size:59'904 bytes
                                                                                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:low
                                                                                                Has exited:false

                                                                                                Target ID:19
                                                                                                Start time:12:16:28
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:rundll32.exe "C:\Windows\Installer\MSI19B0.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7215609 31 CustomActionManaged!CustomActionManaged.CustomActions.MoveChainerToFolder
                                                                                                Imagebase:0xd80000
                                                                                                File size:61'440 bytes
                                                                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:21
                                                                                                Start time:12:16:36
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe" /silent
                                                                                                Imagebase:0xf10000
                                                                                                File size:517'976 bytes
                                                                                                MD5 hash:BF3F290275C21BDD3951955C9C3CF32C
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Antivirus matches:
                                                                                                • Detection: 0%, ReversingLabs
                                                                                                • Detection: 0%, Virustotal, Browse
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:25
                                                                                                Start time:12:16:50
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\System32\SrTasks.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1
                                                                                                Imagebase:0x7ff6cefd0000
                                                                                                File size:59'392 bytes
                                                                                                MD5 hash:2694D2D28C368B921686FE567BD319EB
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:26
                                                                                                Start time:12:16:51
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff7699e0000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:28
                                                                                                Start time:12:17:00
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\SysWOW64\icacls.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"icacls.exe" "C:\Program Files (x86)\Epic Games\Launcher" /grant "BUILTIN\Users":(OI)(CI)F
                                                                                                Imagebase:0x860000
                                                                                                File size:29'696 bytes
                                                                                                MD5 hash:2E49585E4E08565F52090B144062F97E
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:30
                                                                                                Start time:12:17:00
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff7699e0000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:31
                                                                                                Start time:12:17:03
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\SysWOW64\icacls.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"icacls.exe" "C:\ProgramData\Epic" /grant "BUILTIN\Users":(OI)(CI)F
                                                                                                Imagebase:0x860000
                                                                                                File size:29'696 bytes
                                                                                                MD5 hash:2E49585E4E08565F52090B144062F97E
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:32
                                                                                                Start time:12:17:03
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff7699e0000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:33
                                                                                                Start time:12:17:04
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:rundll32.exe "C:\Windows\Installer\MSIA49E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7251093 50 CustomActionManaged!CustomActionManaged.CustomActions.TelemetrySendEnd
                                                                                                Imagebase:0xd80000
                                                                                                File size:61'440 bytes
                                                                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:34
                                                                                                Start time:12:17:06
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\InstallChainer.exe" 44 "C:\Program Files (x86)\Epic Games\Launcher\Portal\Extras\EOS\EpicOnlineServices.msi" "EOSPRODUCTID=EpicGamesLauncher" "C:\Program Files (x86)\Epic Games\Launcher\Portal\Binaries\Win32\EpicGamesLauncher.exe" com.epicgames.launcher://unrealEngine
                                                                                                Imagebase:0xaa0000
                                                                                                File size:24'016 bytes
                                                                                                MD5 hash:4A3181A2E93579124799A9B81263768E
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Reputation:low
                                                                                                Has exited:false

                                                                                                Target ID:35
                                                                                                Start time:12:17:10
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:rundll32.exe "C:\Windows\Installer\MSIBD1A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7257359 59 CustomActionManaged!CustomActionManaged.CustomActions.SetLauncherEpicGamesDirLoc
                                                                                                Imagebase:0xd80000
                                                                                                File size:61'440 bytes
                                                                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:36
                                                                                                Start time:12:17:11
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:rundll32.exe "C:\Windows\Installer\MSIC019.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7258125 65 CustomActionManaged!CustomActionManaged.CustomActions.SetLauncherInstallDirLoc
                                                                                                Imagebase:0xd80000
                                                                                                File size:61'440 bytes
                                                                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:37
                                                                                                Start time:12:17:12
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:rundll32.exe "C:\Windows\Installer\MSIC3E2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7259093 71 CustomActionManaged!CustomActionManaged.CustomActions.SetServiceWrapperDirLoc
                                                                                                Imagebase:0xd80000
                                                                                                File size:61'440 bytes
                                                                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:38
                                                                                                Start time:12:17:13
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:rundll32.exe "C:\Windows\Installer\MSICB46.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7260984 77 CustomActionManaged!CustomActionManaged.TelemetryActions.TelemetrySendStart
                                                                                                Imagebase:0xd80000
                                                                                                File size:61'440 bytes
                                                                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:39
                                                                                                Start time:12:17:19
                                                                                                Start date:31/10/2023
                                                                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:rundll32.exe "C:\Windows\Installer\MSIE2CA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7267015 99 CustomActionManaged!CustomActionManaged.CustomActions.RegisterProductID
                                                                                                Imagebase:0xd80000
                                                                                                File size:61'440 bytes
                                                                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:.Net C# or VB.NET
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Reset < >
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000002.00000002.1930579524.00000000009E8000.00000004.00000020.00020000.00000000.sdmp, Offset: 009E8000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_2_2_9e8000_wget.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2d5d510c4c670ecd2e016ddcdf207043e87375265d06b73f55326f90d03ec0b6
                                                                                                  • Instruction ID: d50a886266b6473f4e78f90bcd141bdf29376d128b17e3034a23fe3f5ad7e3a9
                                                                                                  • Opcode Fuzzy Hash: 2d5d510c4c670ecd2e016ddcdf207043e87375265d06b73f55326f90d03ec0b6
                                                                                                  • Instruction Fuzzy Hash: FAC12F6144E3C55FC7138B745CA98A2BFB4AE1322430E86DFD8C5CF4A3E259494ADB63
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq$LR^q
                                                                                                  • API String ID: 0-516514815
                                                                                                  • Opcode ID: dc08b2ad50e7135db670fc9d346991e4ca52e8c31cdc5e1fb49e3127d9047091
                                                                                                  • Instruction ID: 183d8c20202eeb28c9f8357b639ad27135a9041c61a4f32e3ab753fa042de750
                                                                                                  • Opcode Fuzzy Hash: dc08b2ad50e7135db670fc9d346991e4ca52e8c31cdc5e1fb49e3127d9047091
                                                                                                  • Instruction Fuzzy Hash: 92A155B17052559FDB069B74A8607FA3FBBFFCA210F04846AE909DB295CE348C45C7A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q
                                                                                                  • API String ID: 0-355816377
                                                                                                  • Opcode ID: faca749749031bb5ee8bf11bec98410bb843c3a490d4339cd09a3e879cc2219f
                                                                                                  • Instruction ID: 8224aca33d91da084ee84cc7ea2a726ef27e7a7d89b39cbf00b48706665d3317
                                                                                                  • Opcode Fuzzy Hash: faca749749031bb5ee8bf11bec98410bb843c3a490d4339cd09a3e879cc2219f
                                                                                                  • Instruction Fuzzy Hash: E551F2B1B012499FCB15DF78E8506EEBBF6BFC9250B14812AD908DB364DA309C46C791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: d2716c533be7d0fecc885e535d60af84078d6f3423b8ae186c83b618d8d62517
                                                                                                  • Instruction ID: 834387d816a5564a5b07320af382112fa1eeed5a18e976c8638261fac3a415c3
                                                                                                  • Opcode Fuzzy Hash: d2716c533be7d0fecc885e535d60af84078d6f3423b8ae186c83b618d8d62517
                                                                                                  • Instruction Fuzzy Hash: 6E71D075B10208DFDB049BB9D854AAEBBE7BFC8200F158429E506AB3A4DE75DC42C781
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: 2ac61f8fa0930c60aa833059ad6fffc816d0b1ab6c0c4bae83d2cd937080e175
                                                                                                  • Instruction ID: 0868e27e378987699942414dcc8b785b2b5b8d44381839d1d23116038c8892d5
                                                                                                  • Opcode Fuzzy Hash: 2ac61f8fa0930c60aa833059ad6fffc816d0b1ab6c0c4bae83d2cd937080e175
                                                                                                  • Instruction Fuzzy Hash: 0C51DF71A08249AFEB069B74A8657EA7FB3AFC9310F15446AE506E7281CE344C85C7A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: 49450f009c6540b324b048ce9095a1b705d2429fda9d79f41cb162a6b4e4665d
                                                                                                  • Instruction ID: 77bd144195c4b8e57da21ab814b2e738c4d77f0bfb195b361bc7bf97ad05289e
                                                                                                  • Opcode Fuzzy Hash: 49450f009c6540b324b048ce9095a1b705d2429fda9d79f41cb162a6b4e4665d
                                                                                                  • Instruction Fuzzy Hash: 2E413575709205AFDB05AB64E451AEE7FB7FFC9321F14802AE90997380CE348C82C7A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: LR^q
                                                                                                  • API String ID: 0-2625958711
                                                                                                  • Opcode ID: bffc84c890716aa26bbc45bedbf05395a8c7c07719171eedecae43c038569d8d
                                                                                                  • Instruction ID: 74c0f3e8cd681b3b0e32c6d33ef8502c698dae393255f13c3cee26675893a033
                                                                                                  • Opcode Fuzzy Hash: bffc84c890716aa26bbc45bedbf05395a8c7c07719171eedecae43c038569d8d
                                                                                                  • Instruction Fuzzy Hash: 9A21ABB1B012965FDB089A74A854BBF3BFABB85200F00842FE40AC7294EE348901C791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d9ab29e4206779cef13909a4133f18de9ef7f68fc1fa1682c208b0f6f1a101db
                                                                                                  • Instruction ID: 7309318eca15ddc1b9bcf2448eb1e90819b3d14a5026bdeb8f38b70044cea40b
                                                                                                  • Opcode Fuzzy Hash: d9ab29e4206779cef13909a4133f18de9ef7f68fc1fa1682c208b0f6f1a101db
                                                                                                  • Instruction Fuzzy Hash: 05F0BEB160D7A11EEB2212642D503E62FF87FCB650F0400ABD4C5CA182D5848C45C3B2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: bfd93628ae728196e286f416af9e8ac604beea0b2d278f131292aa67f858f0a6
                                                                                                  • Instruction ID: efe3787f8c1e76d9cbcbd28a7b08484e44c07a7ccca1fbf75bf6ce8166dbb21f
                                                                                                  • Opcode Fuzzy Hash: bfd93628ae728196e286f416af9e8ac604beea0b2d278f131292aa67f858f0a6
                                                                                                  • Instruction Fuzzy Hash: A961D0B5B05212CFCB11CB78E8549EABBF2FF49314F1581AAD518DB262D731D842CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: bc4c2724026ad27fdf540daef9a5b302a2942d2033cb1f77797293f9640aa58a
                                                                                                  • Instruction ID: f0566bd81428b3e4bd3e4b13770dca4d1fb045ee20fa67e88d7e66d2602ca5a3
                                                                                                  • Opcode Fuzzy Hash: bc4c2724026ad27fdf540daef9a5b302a2942d2033cb1f77797293f9640aa58a
                                                                                                  • Instruction Fuzzy Hash: 2C4146B67053505FDB169A35B8916BA7BBBFFC5260F05846FEA45CB381CE349802C3A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 86452bf5fd3c3ddc5b2d2b10b0ef6ea13458815590e67f70c95b6c57c7020f1f
                                                                                                  • Instruction ID: 7096e0d6d12e73f7de53ef04b4701a0c590660af908b9783501fe72e36aeeb98
                                                                                                  • Opcode Fuzzy Hash: 86452bf5fd3c3ddc5b2d2b10b0ef6ea13458815590e67f70c95b6c57c7020f1f
                                                                                                  • Instruction Fuzzy Hash: 7E412671A09209AFDB05DBA4E8617EA7FB7EFC9311F11406AE909D7390CE348D45CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9795c5571caefd2fb6e972b81bf987de5b5a00729d3d4e8a4e34619fd8171685
                                                                                                  • Instruction ID: eeb48265c80bf83c35cf636315fc74766b86bbd9f01393e60f71809910237c10
                                                                                                  • Opcode Fuzzy Hash: 9795c5571caefd2fb6e972b81bf987de5b5a00729d3d4e8a4e34619fd8171685
                                                                                                  • Instruction Fuzzy Hash: 4341E775B111199FCB54DF68E8809DEBBB6FF8C610B14816AE905EB360DB31DD42CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0ea8287fae9bd671a0330e9d504accf8b98c2466e9afe9ff11e04c0453b89ef2
                                                                                                  • Instruction ID: 3f9b746421bc4ba5772cda52fe1242df891a0ea0fa857027c0185d7b531fb03b
                                                                                                  • Opcode Fuzzy Hash: 0ea8287fae9bd671a0330e9d504accf8b98c2466e9afe9ff11e04c0453b89ef2
                                                                                                  • Instruction Fuzzy Hash: 7C1105B6B1421897DF018AB5A940AFEBBEAAFC8251F054037D906D7285EA74CD46C7D0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: adae4a4fbc0de322ee23bdb04835abc9c3238da3a505547299f641d8b5cbafdf
                                                                                                  • Instruction ID: 90c227fb73974257e4ecd6346a0489002c33c9812d5fd28cf3064e286d2e5fb3
                                                                                                  • Opcode Fuzzy Hash: adae4a4fbc0de322ee23bdb04835abc9c3238da3a505547299f641d8b5cbafdf
                                                                                                  • Instruction Fuzzy Hash: F411257570D3950FEB16227439643FA2FBABBC6210F0508ABD845CB286CD688C46C3A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 071c8864808b2cd3da346ae71345ed890c8679202e9b1890de61737d8889941e
                                                                                                  • Instruction ID: c3890fb35ea84d485967ee13ed2eb9b6c3ee28746b7a537471e4deb062c38c74
                                                                                                  • Opcode Fuzzy Hash: 071c8864808b2cd3da346ae71345ed890c8679202e9b1890de61737d8889941e
                                                                                                  • Instruction Fuzzy Hash: 202108B5A112189FCB54DFA8D8809DEBBF6FF8D611B10852AE919E7360D7319841CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 22e7a39c9e306856ca8a683f63a0ff5acf6692375e4b4a9b50fb44f7b31c0ade
                                                                                                  • Instruction ID: 51a06557c4a9afe33d41034f68865caa4784263bd08e5e02c2834d1e4a940d52
                                                                                                  • Opcode Fuzzy Hash: 22e7a39c9e306856ca8a683f63a0ff5acf6692375e4b4a9b50fb44f7b31c0ade
                                                                                                  • Instruction Fuzzy Hash: F0018EB570E75917CB15567938942AB6F9D6FC5120F014467E90CC7345DD24CC41C2A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6fa2b4aba73857f1747bc1642443b7762b2ba8596f746c3732b1203c84681cde
                                                                                                  • Instruction ID: 383eb7b3f56acade1ad58396473ad184b91855939b5088a9453dfaf0d6b87dad
                                                                                                  • Opcode Fuzzy Hash: 6fa2b4aba73857f1747bc1642443b7762b2ba8596f746c3732b1203c84681cde
                                                                                                  • Instruction Fuzzy Hash: E0116D35A18204AFDB05CFA4D559AEABFB7AF8C321F154019E509E7384DF745885CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e74894049845a576e3be9e4aac4249585a77e17c5faf27a4b8843bb6fb35625f
                                                                                                  • Instruction ID: d69474c861f9975993ed7789a3e196e2c0d5626ec683e81cc97549a67bead3ea
                                                                                                  • Opcode Fuzzy Hash: e74894049845a576e3be9e4aac4249585a77e17c5faf27a4b8843bb6fb35625f
                                                                                                  • Instruction Fuzzy Hash: BC2102B4D042498ECB20DFAAC484AEEFBF0FF88324F10852ED559A7240C7756945CFA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a32de3b9402fd32c8981ac96852e44a6ded82850dd110a2980b955a2a3f2713a
                                                                                                  • Instruction ID: 1b0839f6a63c9760ef6475dac92030ed4d4549288e5b1c9711573d61983f78d4
                                                                                                  • Opcode Fuzzy Hash: a32de3b9402fd32c8981ac96852e44a6ded82850dd110a2980b955a2a3f2713a
                                                                                                  • Instruction Fuzzy Hash: 4C118F70A04209AFEB05DB64E556AAABFB7FFCC320F154029E909A7380CF355C85CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3818dcaa8c73a50df0d942d44d285c6eb8f594692d94c54eaaab5e392bb790f2
                                                                                                  • Instruction ID: b40b92104f49184075c984ad9f84ed250b99f8ad2754a23abc6476c3324ec5e7
                                                                                                  • Opcode Fuzzy Hash: 3818dcaa8c73a50df0d942d44d285c6eb8f594692d94c54eaaab5e392bb790f2
                                                                                                  • Instruction Fuzzy Hash: A51133B4D002098FCB20DFAAC484AEEFBF4FF88324F10842AD559A7240C774A945CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e53079ca5e7321470ed6b59c7ff4eef530ea7c52ececd09f6fa6e6d06fef8bd7
                                                                                                  • Instruction ID: e4a3e6da50916a72e523ed199d4736031dea225fd7ef7fe2877e87e6207e168a
                                                                                                  • Opcode Fuzzy Hash: e53079ca5e7321470ed6b59c7ff4eef530ea7c52ececd09f6fa6e6d06fef8bd7
                                                                                                  • Instruction Fuzzy Hash: A4116D31A14204AFEB05DB64D459AAA7FB7EF8C320F154019E50AA7380DF755C85CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: cbb75a0a3134e8177dd5f5c6ab9decae44cf1ad8f6b56d072718125dcd78f637
                                                                                                  • Instruction ID: ba724d338db590d81be31d6058b5fa5417295ed7097d4f4415b21a15cd5c5b50
                                                                                                  • Opcode Fuzzy Hash: cbb75a0a3134e8177dd5f5c6ab9decae44cf1ad8f6b56d072718125dcd78f637
                                                                                                  • Instruction Fuzzy Hash: AD01B970A193490FDB0A8F346A261263FE7AEC250470609ABD649CB191F914D449C392
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0225ee77f3f6a3bd396862bc54b03ddce223fe751d338f1ef97a3825d398e1a5
                                                                                                  • Instruction ID: a9e5e37c81181d6c0ac3f58759d89665a950e2848da5776dcaac976220cceafc
                                                                                                  • Opcode Fuzzy Hash: 0225ee77f3f6a3bd396862bc54b03ddce223fe751d338f1ef97a3825d398e1a5
                                                                                                  • Instruction Fuzzy Hash: 8D01DFB2A1060987E7189AB8A5553FF7AE6ABC8310F10842ED406A3780CE755C05CBA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000002.2031863609.0000000004F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F9D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_2_4f9d000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 06434224eb64370dc196d11dc4d61e62e84f58763a68f025796cb570fd8d78f6
                                                                                                  • Instruction ID: 48b8cfd1dffaa9960c826a6169d446275b2e4b4c2a5d67a50bd38b800c8b2c55
                                                                                                  • Opcode Fuzzy Hash: 06434224eb64370dc196d11dc4d61e62e84f58763a68f025796cb570fd8d78f6
                                                                                                  • Instruction Fuzzy Hash: BD01A771908344AAFB104E25DD84767BFD8EF41364F28C52AED484B25AD279EC43C6B1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000002.2031863609.0000000004F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F9D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_2_4f9d000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3d501d6bb0cf2fdbaf371610d3c8c35ce263bcd1bc5a240d24fcad3c0f36b24e
                                                                                                  • Instruction ID: 9498b7bede0cabd6a4a43df0360fe5c6226c7417e942c9267f927e9b1555300a
                                                                                                  • Opcode Fuzzy Hash: 3d501d6bb0cf2fdbaf371610d3c8c35ce263bcd1bc5a240d24fcad3c0f36b24e
                                                                                                  • Instruction Fuzzy Hash: 5C01526140E3C09FE7128B259D94752BFB4DF43224F19C5DBD9888F1A7C2699C46C772
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5f9462639c6aa29e906ce030bcb3b7da5fb1c8ad4c9fa2312c03e76cfe4e6613
                                                                                                  • Instruction ID: 500887227a8ae183ed5fcdc49db379f0b833c3f9c3d3ccaeed30bc81addd7415
                                                                                                  • Opcode Fuzzy Hash: 5f9462639c6aa29e906ce030bcb3b7da5fb1c8ad4c9fa2312c03e76cfe4e6613
                                                                                                  • Instruction Fuzzy Hash: 40F096B0B5924A1EDF0E5B7866271667FE7EEC255470A08AED246CF2D1FE20C445C3D2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 262eec163dfdf65dbc7ecfece3a42ec2ded13b0bb11a57a7b645622abc22a3c1
                                                                                                  • Instruction ID: 03860b985c48e81c4607726ba748f58eda931733278b15cee84f6031f3761dbb
                                                                                                  • Opcode Fuzzy Hash: 262eec163dfdf65dbc7ecfece3a42ec2ded13b0bb11a57a7b645622abc22a3c1
                                                                                                  • Instruction Fuzzy Hash: 22E0E5B6B10A1657CB2555A675907AAAB8E7BC8161F11002AEE0C87340DA30CC42C290
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: aa0285b2d65974491b007dce5a1d1520fcfe9c932904bbf196826a6e5fa2df57
                                                                                                  • Instruction ID: b4dc29f17616ae6639b51367cf3d44821f88f5878a3862db1fcd0aec324b6723
                                                                                                  • Opcode Fuzzy Hash: aa0285b2d65974491b007dce5a1d1520fcfe9c932904bbf196826a6e5fa2df57
                                                                                                  • Instruction Fuzzy Hash: 4AD02E7720B1B04FC30B1B30A8614E6BF3AAB4A02230800A7E981C72F2CA210D0AC3A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8c0f4adb174271ba792c22282a988b2bf5c2578f891115fd238f1fc7c93ebc14
                                                                                                  • Instruction ID: c02bb18777e00f7cfcd2bc886bed08093d09363e40f3c05d938c685b842370a4
                                                                                                  • Opcode Fuzzy Hash: 8c0f4adb174271ba792c22282a988b2bf5c2578f891115fd238f1fc7c93ebc14
                                                                                                  • Instruction Fuzzy Hash: 9ED0A736A7422563DA0021A921842AAA59DE785120F014862A909D21059924C80041C1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 805ed5039851f5715282283585327f4b6da2add7a43a10e56f0cf6704f07e0b9
                                                                                                  • Instruction ID: 099a0d3579a1325760a9ed6f56fdfdad31324bdced72993194d357f437a5211b
                                                                                                  • Opcode Fuzzy Hash: 805ed5039851f5715282283585327f4b6da2add7a43a10e56f0cf6704f07e0b9
                                                                                                  • Instruction Fuzzy Hash: 95D0A77222502C6B4A046718E8C59AAB7AAF7C52A17504433FA0683264CD605C41C796
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6a3dd17f528963287d5fac3c139f3b6f38b9cc8ca38d386a895be572995a6ecc
                                                                                                  • Instruction ID: 5ae4a8f82f3eecd9f573dce881fa7d1ff09ceb48908ea59301ed2bdd1ddb7b64
                                                                                                  • Opcode Fuzzy Hash: 6a3dd17f528963287d5fac3c139f3b6f38b9cc8ca38d386a895be572995a6ecc
                                                                                                  • Instruction Fuzzy Hash: 27C0123262E3C04FDB078AA088454C2BF71A9A222634A82ABE192D5843C21C9185C3B2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000C.00000003.2030836281.0000000007570000.00000040.00000800.00020000.00000000.sdmp, Offset: 07570000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_12_3_7570000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4e4f8eb2ca5a7609828445a95791e2e28522b511d0a83ca17629becb956fd7af
                                                                                                  • Instruction ID: 13f1922264246cb6a7291a5eb9ea00a54d032c0e0ce05a1370d756ca31d8a605
                                                                                                  • Opcode Fuzzy Hash: 4e4f8eb2ca5a7609828445a95791e2e28522b511d0a83ca17629becb956fd7af
                                                                                                  • Instruction Fuzzy Hash: B6B0128A554009524501B73559D08FE80D2B6C1200FC0CC101006E401C4D18C4418015
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 07183A75
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000E.00000003.2110095171.0000000007180000.00000040.00000800.00020000.00000000.sdmp, Offset: 07180000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_14_3_7180000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DispatcherExceptionUser
                                                                                                  • String ID:
                                                                                                  • API String ID: 6842923-0
                                                                                                  • Opcode ID: abca3a1b9b8e5d7cddf66213c643b4ac39049e66044b74b8bbfc9aa2faa0e2e9
                                                                                                  • Instruction ID: 364c3db516fb21234e70477ed8e60dc3d3e55f270877f139d8f02a5b5ba54b1d
                                                                                                  • Opcode Fuzzy Hash: abca3a1b9b8e5d7cddf66213c643b4ac39049e66044b74b8bbfc9aa2faa0e2e9
                                                                                                  • Instruction Fuzzy Hash: D6E09236255240DBD7059BB5B8298E63FADDACB22131941ABF445D7702E9388C438BB1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 07183A75
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000E.00000003.2110095171.0000000007180000.00000040.00000800.00020000.00000000.sdmp, Offset: 07180000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_14_3_7180000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DispatcherExceptionUser
                                                                                                  • String ID:
                                                                                                  • API String ID: 6842923-0
                                                                                                  • Opcode ID: 2a4022bf00b26959e97796355c81f4a16d1c8f7a26675bda0968e0b45fd424a4
                                                                                                  • Instruction ID: f74d7d13e103f2c31db40d32254124d71986f4aa53696553b76e4afbff38b239
                                                                                                  • Opcode Fuzzy Hash: 2a4022bf00b26959e97796355c81f4a16d1c8f7a26675bda0968e0b45fd424a4
                                                                                                  • Instruction Fuzzy Hash: 43E0C236610204EBD7049B7AF92DC3B7BAEEBCE221304442BF806C3700ED389C018AB1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000E.00000002.2111205771.0000000004B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B9D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_14_2_4b9d000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 311365e7d8ec47db5174a525631952a3ac6f55ee39cab84c65c7a48e8d147a85
                                                                                                  • Instruction ID: 0673e910e740afabdd2dbd0f058eba0939f9025ca720b03f094c0c35a7eb6968
                                                                                                  • Opcode Fuzzy Hash: 311365e7d8ec47db5174a525631952a3ac6f55ee39cab84c65c7a48e8d147a85
                                                                                                  • Instruction Fuzzy Hash: 44212571604200DFCF05DF14DAC4B26BFA9FB94314F2085B9D90D4B256C336E856CAA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000E.00000002.2111205771.0000000004B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B9D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_14_2_4b9d000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 402c6a8559748647fef594cd0c7d6ed57cea98399c5c457cfc3d558c3163147f
                                                                                                  • Instruction ID: bd3b978994f4e1ab57d7fe58bbf66e171040e5b36a0a4f322a83c9078e100e46
                                                                                                  • Opcode Fuzzy Hash: 402c6a8559748647fef594cd0c7d6ed57cea98399c5c457cfc3d558c3163147f
                                                                                                  • Instruction Fuzzy Hash: A511B176504240DFCF16CF14D9C4B16BFB2FB94314F24C6A9D9490B256C33AE85ACBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000E.00000002.2111205771.0000000004B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B9D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_14_2_4b9d000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d7e5f11f0a84e9c458d4f3a8f67fd49f1c4e6dea70b903baa45d56fb08354f6b
                                                                                                  • Instruction ID: e35d2e3182cd8ac222867d8bcff1e9b5c79805e9bff16a122572f1ca2dd53f4a
                                                                                                  • Opcode Fuzzy Hash: d7e5f11f0a84e9c458d4f3a8f67fd49f1c4e6dea70b903baa45d56fb08354f6b
                                                                                                  • Instruction Fuzzy Hash: 5801D471108340AAEB104E36DD84767BFDCEF41324F08C5BAEC080A146D279AC41C6B1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000E.00000002.2111205771.0000000004B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B9D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_14_2_4b9d000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 882a92c9ae0240c3ef2f7f1e4eeb29133f8d26914f81b2eddfdade9cb4f00549
                                                                                                  • Instruction ID: 6e947997d5cbb74441e4a4101c7377ed448837c70892ce1e984c6d67fc83fe33
                                                                                                  • Opcode Fuzzy Hash: 882a92c9ae0240c3ef2f7f1e4eeb29133f8d26914f81b2eddfdade9cb4f00549
                                                                                                  • Instruction Fuzzy Hash: 7801526150D3C06FD7164B259CA4756BFB4DF53224F19C1DBD9888F193C2695844C772
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq$LR^q
                                                                                                  • API String ID: 0-516514815
                                                                                                  • Opcode ID: 4e4fe7dcfbde3c8b58870b8b160c91a85a60eb8231f2e069e8fddd24db7ef75d
                                                                                                  • Instruction ID: 5b347052da6bfee397057b1c44f45ba544ce1384cbdf48ecf5c5608133b28ced
                                                                                                  • Opcode Fuzzy Hash: 4e4fe7dcfbde3c8b58870b8b160c91a85a60eb8231f2e069e8fddd24db7ef75d
                                                                                                  • Instruction Fuzzy Hash: DB613821B043945FDF295E34681477E3BEAEF82614F5884EAE411DB393EE34EC0583A5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q
                                                                                                  • API String ID: 0-355816377
                                                                                                  • Opcode ID: 60ee19d9c0f1943b125fe843e63f2ff4df6edfce35ba2c5a4e319bc06d0b7a4b
                                                                                                  • Instruction ID: 7a78b41cd9863d3efa076137137518be03be4cf04602b7f57de55b228832de8e
                                                                                                  • Opcode Fuzzy Hash: 60ee19d9c0f1943b125fe843e63f2ff4df6edfce35ba2c5a4e319bc06d0b7a4b
                                                                                                  • Instruction Fuzzy Hash: 7451E331B002099FCB14DF79D8546AEBBFAEFC5350B94802AE404DB364DE30AC06C791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: 290e98134553d08e01a6e76c25a4bf84d514344985a89242bd9066d64e99e809
                                                                                                  • Instruction ID: 73a999fd2f724ca666d92ea7189ba51ea787ae6b2a1704c332ad96490a8852df
                                                                                                  • Opcode Fuzzy Hash: 290e98134553d08e01a6e76c25a4bf84d514344985a89242bd9066d64e99e809
                                                                                                  • Instruction Fuzzy Hash: 1C71B231B002149FDF089BB5C954AAEBBE7EFC8301F558429E506AB3A4DE35ED42C781
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: 169253364dcd9d04f24baa2878444979ad82d0a1f73b2d3a06586911a6ee34a5
                                                                                                  • Instruction ID: 0f31a2937fd3b7f07de49886b836b22e532272276ff3e60b8358a481b8540796
                                                                                                  • Opcode Fuzzy Hash: 169253364dcd9d04f24baa2878444979ad82d0a1f73b2d3a06586911a6ee34a5
                                                                                                  • Instruction Fuzzy Hash: BE412931B001045BEF18AA699869B7E7B9ADFC8711F948879E506EB381CD34AC06C7E1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: dc0138d909a85ce2bd8932d5430f1440a14e571630b79b5f4b89e9125d3a25de
                                                                                                  • Instruction ID: 1b3834d28fa46e403ab89d337a22aa5974875e6295deee8b4467ab9d30afb718
                                                                                                  • Opcode Fuzzy Hash: dc0138d909a85ce2bd8932d5430f1440a14e571630b79b5f4b89e9125d3a25de
                                                                                                  • Instruction Fuzzy Hash: 1C31F730B083845BEF156B7948243BE7FE6DB86715F9484AAD502EB386CD786C068791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: LR^q
                                                                                                  • API String ID: 0-2625958711
                                                                                                  • Opcode ID: 85392eb7bdd606be367806b72567113fd4a3292c44cb77417b17208635676c54
                                                                                                  • Instruction ID: 8d32ba0adc6b9f466015077dfd2b2e9a62327e8d2e0ff64f6bc0e04475d8a992
                                                                                                  • Opcode Fuzzy Hash: 85392eb7bdd606be367806b72567113fd4a3292c44cb77417b17208635676c54
                                                                                                  • Instruction Fuzzy Hash: 1B2142317002615BDF249E38A8847BF77EAEF81218F4444A9E816D7357EA34A8018784
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: LR^q
                                                                                                  • API String ID: 0-2625958711
                                                                                                  • Opcode ID: 5b8621290331b91704adb0dc67cc087ced24bb067f34046d9eaf7e0021a82160
                                                                                                  • Instruction ID: 5e5547ebcfffab4a33932759233b59f203ad1fb3b8ef0aabfe483cec17a4a309
                                                                                                  • Opcode Fuzzy Hash: 5b8621290331b91704adb0dc67cc087ced24bb067f34046d9eaf7e0021a82160
                                                                                                  • Instruction Fuzzy Hash: E421E231B002515FDF289E34AC44B7F77EAEF85215F9884ADE426E7393EA34AC008B50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 48cc72c933eecd6fafd5c0522200525e9acfa82c91311843af161e1b00e2caea
                                                                                                  • Instruction ID: 76131532b0bfc8d22254096315ecf6c9a512a3368f96b111ffcbf104bc848539
                                                                                                  • Opcode Fuzzy Hash: 48cc72c933eecd6fafd5c0522200525e9acfa82c91311843af161e1b00e2caea
                                                                                                  • Instruction Fuzzy Hash: B2E1DE35B002158FDF24CB69C55476EBBF5AF84308F5481AAE825DB392DB35EC82CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9724f174c41ced8fc36e5133c525f0df062af4db782f8d3b56300f3a45c557d7
                                                                                                  • Instruction ID: cbd3e7d02ee5c66c0e6d2ee4d5438f0ace100251c0f8be81a763ab3c47eeaa69
                                                                                                  • Opcode Fuzzy Hash: 9724f174c41ced8fc36e5133c525f0df062af4db782f8d3b56300f3a45c557d7
                                                                                                  • Instruction Fuzzy Hash: 71413B75B002089FCB14DF69D88099EBBB2FF8C714B10816AE905EB361DB31EC42CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: fc132a0be4d9a5279683fe01ebbead146e6a64356006d50cd1a7efbbdfb89b11
                                                                                                  • Instruction ID: 44472852c6e390e9f63c4a890d0dddc2545056833197ec7132687da45d2a2f5d
                                                                                                  • Opcode Fuzzy Hash: fc132a0be4d9a5279683fe01ebbead146e6a64356006d50cd1a7efbbdfb89b11
                                                                                                  • Instruction Fuzzy Hash: 59110A32B0022497DF148A6589447FEBBEAEBC8256F848436D906DB345EA74EE06C791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7e0dfb72560f2277717d4f9467ba7dd47af627b79e54a47bc10dc9ec8c53193a
                                                                                                  • Instruction ID: eed26b6e1ee6a6b75c17c5029b229ec78bb183ff8d0a006e5e678a0fa1bd282a
                                                                                                  • Opcode Fuzzy Hash: 7e0dfb72560f2277717d4f9467ba7dd47af627b79e54a47bc10dc9ec8c53193a
                                                                                                  • Instruction Fuzzy Hash: DF216775E002089FCB54DF69C88499EBBF1FF8C714F10856AE915EB321EB30A842CB94
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: aeccd767958becca74d647de1a6b91f03851b7203da6de4af46915354b1a0df7
                                                                                                  • Instruction ID: 1f83a9e0f46860fe93bd09b138ac2569e46469ff072688f72e30442aba7b1047
                                                                                                  • Opcode Fuzzy Hash: aeccd767958becca74d647de1a6b91f03851b7203da6de4af46915354b1a0df7
                                                                                                  • Instruction Fuzzy Hash: 4F114E326013187FEF052DA56C14BFA3F59DF41371F9080A6FD6C96363D925A891D390
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 853ef3b40d896e426f9ad91a610df3c4bce6f21ebac6197fa8a32009ca1f0efa
                                                                                                  • Instruction ID: 1ec21759da611e1b152bd16a7a9ad577e6ccc3aeef7f8444834cef9529e8d452
                                                                                                  • Opcode Fuzzy Hash: 853ef3b40d896e426f9ad91a610df3c4bce6f21ebac6197fa8a32009ca1f0efa
                                                                                                  • Instruction Fuzzy Hash: DD214235A00254AFCB14DFA4D494AEDBFB6EF8C322F558419E409A7351CF796C45CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 209b9e1e7baa7e588a9e8524903eccf1489e5399eae6861d1eb914ecccf550c5
                                                                                                  • Instruction ID: 217d8eea930798cdc671610e309e6d2d5ac71cdebfc72edaa308ce935cd8ff22
                                                                                                  • Opcode Fuzzy Hash: 209b9e1e7baa7e588a9e8524903eccf1489e5399eae6861d1eb914ecccf550c5
                                                                                                  • Instruction Fuzzy Hash: E52113B0D002498EDB20DFAAC480AEEFBF0FF88324F10842ED859A7240C7756945CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f5fb499d83a35e5f768bb030b5cdb01252dbd2dd2fb578cb8eff838da7731bd5
                                                                                                  • Instruction ID: 44623681129c40f9f7eae42d5b394e64ec64d9bceb33a5a64bc5d93f27ba6360
                                                                                                  • Opcode Fuzzy Hash: f5fb499d83a35e5f768bb030b5cdb01252dbd2dd2fb578cb8eff838da7731bd5
                                                                                                  • Instruction Fuzzy Hash: 3D1103B1D042498FDB10DFAAC480AEEFBF4FF88324F50842AD459A7250C775A945CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5f29d030b0fbd34abd5ef5984dd9f9ee241fce2ae2996b5881df98e4a963777b
                                                                                                  • Instruction ID: 29223506706d4cbaaa738b51a2c336564d2ae1d7ef14d3a9923824285d804f56
                                                                                                  • Opcode Fuzzy Hash: 5f29d030b0fbd34abd5ef5984dd9f9ee241fce2ae2996b5881df98e4a963777b
                                                                                                  • Instruction Fuzzy Hash: B601D830A493452FCF099F3859351667FE9DFC26053454CAED54ACF352E925E809C7E2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6996d465e1604f505a7cb0958c0ba8841717dd2f2213d470c55cee467ab51524
                                                                                                  • Instruction ID: f72834df2e7ca5001723deb60dc3a4cd25df6ddf277ad078abbb062b96740446
                                                                                                  • Opcode Fuzzy Hash: 6996d465e1604f505a7cb0958c0ba8841717dd2f2213d470c55cee467ab51524
                                                                                                  • Instruction Fuzzy Hash: 25110D35A00215AFCB08DF64D498AE97BB6EF8C322F158419E40AE7390CF795C45CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000002.2126521239.0000000000B3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_2_b3d000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7486a961788667f1d110140865e5580a9fdbdfd556aeea7571a22153b3acd88b
                                                                                                  • Instruction ID: a261681bbfd0eb5d5d9a8224dfdc5a50a96a22e6cdc5582bcf21415d56e33d50
                                                                                                  • Opcode Fuzzy Hash: 7486a961788667f1d110140865e5580a9fdbdfd556aeea7571a22153b3acd88b
                                                                                                  • Instruction Fuzzy Hash: E5018C6140D3C09FD7164B259C94752BFA8EF53624F1985CBE8888F1A3C2699C45C772
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e8690efa10c88dabcff4a677ae158425f7ce976434fa3975527d2db6f467eff7
                                                                                                  • Instruction ID: 41241b40befd17dd9abeebed707f8388adbbc2da6a75bd8abac39ed917c05a06
                                                                                                  • Opcode Fuzzy Hash: e8690efa10c88dabcff4a677ae158425f7ce976434fa3975527d2db6f467eff7
                                                                                                  • Instruction Fuzzy Hash: 90012975D00219CFCF18EFA8D5405EEBBB1EF48311B5045A9D425A7351DB3AA981CF94
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 87ec5eee1362af7bace96963b774696fc89d16f9f951bedc165084305a6871b8
                                                                                                  • Instruction ID: a09dbccfd5b8eb9170415945d58f2d692b9a2371d8d6deda41af88f740c27ca7
                                                                                                  • Opcode Fuzzy Hash: 87ec5eee1362af7bace96963b774696fc89d16f9f951bedc165084305a6871b8
                                                                                                  • Instruction Fuzzy Hash: 6F01F270A0020597EF28AA6885583AF7AE6DBC8714F90842EE006B3380CEB97C008BD0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000002.2126521239.0000000000B3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_2_b3d000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e8963c1cf1e25c904115e4b57b50990342849df9c731e0e7aa1c4f003dec2e8d
                                                                                                  • Instruction ID: eb786c4e1aee7f04e22adf699dd7ec4b69aa862b2f70655a16871ccb30cf06a9
                                                                                                  • Opcode Fuzzy Hash: e8963c1cf1e25c904115e4b57b50990342849df9c731e0e7aa1c4f003dec2e8d
                                                                                                  • Instruction Fuzzy Hash: CB012B71508300AAE7148A25EDC4767BFD8DF41724F28C5AAEC580F186C379DC41C6B1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: fc7c8837482503288b276d34d74c4458963e25cb14fc2158f1089cd453137a4b
                                                                                                  • Instruction ID: 2a9a2248eb8a3d5406f103cab8f0d72c7298bd9861c041a4cd1204086a21d5ea
                                                                                                  • Opcode Fuzzy Hash: fc7c8837482503288b276d34d74c4458963e25cb14fc2158f1089cd453137a4b
                                                                                                  • Instruction Fuzzy Hash: 4AF0C230A843051ECF099F78556516A7FAAEFC26563850CAEC54ACF351E935E80587E3
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 56db107736705c6adef7203741dca353e75769dbaf07edb5c4b1da8297bd526a
                                                                                                  • Instruction ID: 59e9bfad11a24dbc1f91a765d6df7eabfd2825d40819428e67ed32d62d955742
                                                                                                  • Opcode Fuzzy Hash: 56db107736705c6adef7203741dca353e75769dbaf07edb5c4b1da8297bd526a
                                                                                                  • Instruction Fuzzy Hash: 58E0D82072426816FF3529695718B7764CDCB40708FC008B9C841C2757F9D0F84493F1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5e31ca7bd79010be6643f4fa5c7e39bd0ee3ded1b2d7d1495af57b6888c14930
                                                                                                  • Instruction ID: 8f776848bdde9f9c73cbbc68d998e23a32fab8f1f934e98fd2b60cac1a37d030
                                                                                                  • Opcode Fuzzy Hash: 5e31ca7bd79010be6643f4fa5c7e39bd0ee3ded1b2d7d1495af57b6888c14930
                                                                                                  • Instruction Fuzzy Hash: 57D02B2065A3946FCB01277818B4179BF5CCF47111F409CE3EA15E7323E824AC054385
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3f99b77f03847c7fe0879051512aa2dbabacd3947e2f7c00585975221bbdc13d
                                                                                                  • Instruction ID: 3b2e65e13087922789fffa2b8b7d70949b409039b2845e9045cd0fdae14246ad
                                                                                                  • Opcode Fuzzy Hash: 3f99b77f03847c7fe0879051512aa2dbabacd3947e2f7c00585975221bbdc13d
                                                                                                  • Instruction Fuzzy Hash: 04E0C2B1D00229DF8F54DFA999001EEBBF4EF48240B50456AD519E3300E3355A01CF94
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 361c286d84c023dfe55f1a9212ab9ff5cd2f3efc551db9d800cd5abee18f9fec
                                                                                                  • Instruction ID: 92dda42b8d98e45c5a123c6bdb15d604e31e487ac72b7ebbcadab6096fa5c2ed
                                                                                                  • Opcode Fuzzy Hash: 361c286d84c023dfe55f1a9212ab9ff5cd2f3efc551db9d800cd5abee18f9fec
                                                                                                  • Instruction Fuzzy Hash: C9D05B26E0535457CF112D7434545A9BF5CC747825F9144F3E924DF373B4246D054395
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 986de3eefc33aa67da924192a039d65743f91cde5430f32131a62e119149e53a
                                                                                                  • Instruction ID: f524c887c02b53641fdc4ea5b91d62e83e4f3e82fc9e4f7a284dc81fa55dfda5
                                                                                                  • Opcode Fuzzy Hash: 986de3eefc33aa67da924192a039d65743f91cde5430f32131a62e119149e53a
                                                                                                  • Instruction Fuzzy Hash: 94E02B3354C2885FCB062B14A8154E93FBDD75E02138800A7F441C73A2DD612C06C7E4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d961294e4f7f75bc77e7c5ce1eb5684f49bca77d259e272aeef09075fe403af5
                                                                                                  • Instruction ID: 1028d6925fab083e2b3c392212b1b3d94b2facb25727b156df086a86cff2cb36
                                                                                                  • Opcode Fuzzy Hash: d961294e4f7f75bc77e7c5ce1eb5684f49bca77d259e272aeef09075fe403af5
                                                                                                  • Instruction Fuzzy Hash: 63E0C23134CAA00FCB068768A8248F53BA98F4A228B5500FFE54E8F373D941AC00D399
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4459a6a2136ab076ef3698291764e55ce8c8a8080cf42f36fb4c812c71f6a496
                                                                                                  • Instruction ID: 456f15bd72ddf5668404a9ead57f1eb23458425f6f2230bb944244a37295f538
                                                                                                  • Opcode Fuzzy Hash: 4459a6a2136ab076ef3698291764e55ce8c8a8080cf42f36fb4c812c71f6a496
                                                                                                  • Instruction Fuzzy Hash: 55D0A9313901209FDA08A36CE4549B97398DB8A729B4048AAF60ACB321CD92FC0046CA
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9578fc8244cbd07cc902c055c2064cf7465dbfce37942ac72bfe849f830618d6
                                                                                                  • Instruction ID: d674ee5a94da0042135605b2313aff217c530f796d297ccc5fd8d997ef013695
                                                                                                  • Opcode Fuzzy Hash: 9578fc8244cbd07cc902c055c2064cf7465dbfce37942ac72bfe849f830618d6
                                                                                                  • Instruction Fuzzy Hash: 70D0A7323501186B5A046719D88986ABB99E7892613904433F90283324DD60BC458799
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000F.00000003.2125972332.0000000004770000.00000040.00000800.00020000.00000000.sdmp, Offset: 04770000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_15_3_4770000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: cbb4321b20401afca67bbcbd14f77c879166e55ee18302195c193696718424fc
                                                                                                  • Instruction ID: 0adb07f61705df4d8504232f6469021c080f0e93908d187b1fd7c0b045b99d76
                                                                                                  • Opcode Fuzzy Hash: cbb4321b20401afca67bbcbd14f77c879166e55ee18302195c193696718424fc
                                                                                                  • Instruction Fuzzy Hash: DAD0A7B551D3C0AFC702C79406540997F71FF2330ABCD8197D0D488513D226A846E372
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q
                                                                                                  • API String ID: 0-355816377
                                                                                                  • Opcode ID: 6ebbb3090753cf8a00301519c885c8625c04b1f5eb050c1b7f16eed229cd4d45
                                                                                                  • Instruction ID: 9a109d55dacac1f6a87da69cae957dedcfa5d448b1dc0ee1dc4ae4d527a95a18
                                                                                                  • Opcode Fuzzy Hash: 6ebbb3090753cf8a00301519c885c8625c04b1f5eb050c1b7f16eed229cd4d45
                                                                                                  • Instruction Fuzzy Hash: DC51C235B012099FC715DF7DD8506AEBBE6EFC9350B18812AE818DB3A5DE31AD02C791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: LR^q
                                                                                                  • API String ID: 0-2625958711
                                                                                                  • Opcode ID: 21db8e302768242ed4d24bb07e073051417f071d80ae7768cf30fd514cca0aac
                                                                                                  • Instruction ID: 92baebe738c967b7a34e8756214817390c67819a93553a1e79a761fc41fb8734
                                                                                                  • Opcode Fuzzy Hash: 21db8e302768242ed4d24bb07e073051417f071d80ae7768cf30fd514cca0aac
                                                                                                  • Instruction Fuzzy Hash: 06B12535B012119FDB14CF68D898A6EB7A6FF84314F15C4AAE509CB391EB31ED42C791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: f2ec4fb482ce07262d70094dfea00c12ecad8ed6d9868fb463e677b5fa5f6621
                                                                                                  • Instruction ID: c4e0ab16d656e24ddf6abaf51eeb805bc2d35318fca61cd30a6a1271b4905002
                                                                                                  • Opcode Fuzzy Hash: f2ec4fb482ce07262d70094dfea00c12ecad8ed6d9868fb463e677b5fa5f6621
                                                                                                  • Instruction Fuzzy Hash: E871D335B002149FDB14ABB9C8547BEB6A7EFC8314F18C029E506AB3A4DE75ED428791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: 4329a6be1c2213328f249d06331fcb832319cf328bbc915f71e096e7b7a6462a
                                                                                                  • Instruction ID: 696a72909e36355039721cb911615309b741846bad48837420b213a077f72f52
                                                                                                  • Opcode Fuzzy Hash: 4329a6be1c2213328f249d06331fcb832319cf328bbc915f71e096e7b7a6462a
                                                                                                  • Instruction Fuzzy Hash: CA51F430B04214AFE7149B69D8547AEBBB3EF88314F19806AD506E73C5CE79AD05CBE1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 77ab8549d6554051f4ad95e7fe804eb1d98d0e97720c5d7bea1cf2d011ace472
                                                                                                  • Instruction ID: 06fc0ccede50d9eb255f8203650391f7ef6d9028a241ed2aa73a51c2f7ee4e44
                                                                                                  • Opcode Fuzzy Hash: 77ab8549d6554051f4ad95e7fe804eb1d98d0e97720c5d7bea1cf2d011ace472
                                                                                                  • Instruction Fuzzy Hash: 4A3146377041556FC32A6A79782526ABB57DBC2308B4EC077C2048F292DE697C0383E2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9e7475a684d91552f87cce0966668f416758e0287762fe4728f55f0e5fdb4de3
                                                                                                  • Instruction ID: 7bc9f4aa1025a307e297c84d29b55b74af5854c72012873089dc4c2809e3c1bd
                                                                                                  • Opcode Fuzzy Hash: 9e7475a684d91552f87cce0966668f416758e0287762fe4728f55f0e5fdb4de3
                                                                                                  • Instruction Fuzzy Hash: 2B31B336B002149FDB24DF7998946AEB7A7EFC4264B14C46AE549DB380DA74EC0287E1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: dcd34997f6a44e3f5139318bf751c8be67233ca2029071027d832dd2e7d91b05
                                                                                                  • Instruction ID: 49bb13fee0319fe5b26c2944dadc88ae5bac3f542e1fe1afdca0910af9f70954
                                                                                                  • Opcode Fuzzy Hash: dcd34997f6a44e3f5139318bf751c8be67233ca2029071027d832dd2e7d91b05
                                                                                                  • Instruction Fuzzy Hash: 9041D531A05208AFD715DF64D8247AEBFB7EF89315F18806AD80997391CE399D41C7E2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 91e81cfda14584539fc43c58e80364e161001001be50f4a474d4e47120c87d1f
                                                                                                  • Instruction ID: 546af5942ffa3223fe0edf9ebb99e2f37154c86ba90347812e7caee0fe185d88
                                                                                                  • Opcode Fuzzy Hash: 91e81cfda14584539fc43c58e80364e161001001be50f4a474d4e47120c87d1f
                                                                                                  • Instruction Fuzzy Hash: 5F414C35B001089FCB14DF69D88499EBBB6FF8C714B10816AE905EB360DB31ED42CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3ef3b00e0d273c06ec881b1a6e506b4b8a4edb6beab41a29124c823411856cb3
                                                                                                  • Instruction ID: a3b31271f91ab7c0bddac523082f25dea3f8fde6e1c696f5a65ef0e174334c3c
                                                                                                  • Opcode Fuzzy Hash: 3ef3b00e0d273c06ec881b1a6e506b4b8a4edb6beab41a29124c823411856cb3
                                                                                                  • Instruction Fuzzy Hash: 77110A32B00214A7DB148A6598506FEF7EBDBC8354F08C076D906D7385EEB5EE0287E1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e82b8b80963e1548fcbbed598f77754c162d0dc81e3a16709cdc3bcb68c589a6
                                                                                                  • Instruction ID: 46af8d29f41074fc9a3c6da24f17cb95704e77eb4bb0a6c1730fccc8bb4f6a58
                                                                                                  • Opcode Fuzzy Hash: e82b8b80963e1548fcbbed598f77754c162d0dc81e3a16709cdc3bcb68c589a6
                                                                                                  • Instruction Fuzzy Hash: 54018E267093501BC725267A285022BAF4B9FC5360F0DC467EA09CB381DD24DC0092F1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5a3888fc99433c32e593c75a61bdb23d1c32e5cbb194e0a697c006a4221ec4c5
                                                                                                  • Instruction ID: 2c2c86ac04a1744f02f99a9a79f5440b9d667dc091bf0703e3ad70270b2f270f
                                                                                                  • Opcode Fuzzy Hash: 5a3888fc99433c32e593c75a61bdb23d1c32e5cbb194e0a697c006a4221ec4c5
                                                                                                  • Instruction Fuzzy Hash: 2E212C75E112189FCB44DF69D4849DEBBF2FF8C710B10816AE915AB360DB31A842CF90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5bf7affcd4f51167989a50276fc31bea99313e80803216eb7173555e23a3c3bc
                                                                                                  • Instruction ID: 652c3615dc8a07799acc353e5ed05e92b65829af6ba75d3fc979b04473306cc0
                                                                                                  • Opcode Fuzzy Hash: 5bf7affcd4f51167989a50276fc31bea99313e80803216eb7173555e23a3c3bc
                                                                                                  • Instruction Fuzzy Hash: 2E115936B002209BDF109E68A8902FEB79ADB4431CF0CC023D542C7285ED65EA0583D2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7f76d21ad9c774427dae0029ee198755874fbeac9a9231a096585fca6ecf0052
                                                                                                  • Instruction ID: 50e13499e7a61a7848a9a9be28f265114f06da2df276badc6716b5c565e4137a
                                                                                                  • Opcode Fuzzy Hash: 7f76d21ad9c774427dae0029ee198755874fbeac9a9231a096585fca6ecf0052
                                                                                                  • Instruction Fuzzy Hash: EB119335600115EFDB54DF68D854AA9BBB2EF8C314F14802AE409A7384CFB96C46CBE1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3b4e442c4784a0bb1c71dc268037b6678e069599f83f7e1b0dd4937f0e4ecafa
                                                                                                  • Instruction ID: 635e52d3eb2956a571a9444063df394ac6832ec1702b64455b7f84298132c20d
                                                                                                  • Opcode Fuzzy Hash: 3b4e442c4784a0bb1c71dc268037b6678e069599f83f7e1b0dd4937f0e4ecafa
                                                                                                  • Instruction Fuzzy Hash: 372124B1D002598FDB10DFAAC480ADEFBF0FF88324F10802AD469A7250CB756945CFA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ecb7472fcccbff075cb6136c1d250e2e2ff0927aaaf9e0f5dfadfd1671ceabb7
                                                                                                  • Instruction ID: 5cc03b9634ef63458eb43a0ec9154c85d110ed466ed4391dd74356f5befc05a9
                                                                                                  • Opcode Fuzzy Hash: ecb7472fcccbff075cb6136c1d250e2e2ff0927aaaf9e0f5dfadfd1671ceabb7
                                                                                                  • Instruction Fuzzy Hash: 18114234A04104AFDB54DF64D854AADBBB7EF8C325F58802AE409A7390CF79AC45DBE1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8428f3be63fd7a6f678be1f451dd9492fdaa239b8eba486350824fab2bbe4bfd
                                                                                                  • Instruction ID: 3ca1b4d5bb29bd0440b762e97331696428f494cd65028292651faa1d2b75cbcf
                                                                                                  • Opcode Fuzzy Hash: 8428f3be63fd7a6f678be1f451dd9492fdaa239b8eba486350824fab2bbe4bfd
                                                                                                  • Instruction Fuzzy Hash: 1001495270D3854FD7016735183026C6F619F82314B1988EAC64CCF2C2DD19DC0A4396
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: caa8251f1e4396f2624ce8795b0dbb9d7d4ef0438f5f64bed926aeeb62cdc021
                                                                                                  • Instruction ID: 6735cb16fc2d3392f6457c03a7803ec45719cdfc3153f07d0a83a50fae80b409
                                                                                                  • Opcode Fuzzy Hash: caa8251f1e4396f2624ce8795b0dbb9d7d4ef0438f5f64bed926aeeb62cdc021
                                                                                                  • Instruction Fuzzy Hash: 461106B1D042498FDB10DFAAC480ADEFBF4FF48324F108429D45967250CB756945CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 08097dd9e511c0cf8bf3cee4a279b1640ae7c978128ee5a3e920c0cd12c348c3
                                                                                                  • Instruction ID: 6bddc86b00c95eb477ae3f03c8d55d76a54d95686b5d1879fc380a798f05e4da
                                                                                                  • Opcode Fuzzy Hash: 08097dd9e511c0cf8bf3cee4a279b1640ae7c978128ee5a3e920c0cd12c348c3
                                                                                                  • Instruction Fuzzy Hash: 34114231604115AFDB54DF68D854AA9BBB6EF8C324F14402AE409E7394CFB99C45CBE1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f96b4410ed8fbe499fbdd3cccf79b993183207da177129b1e3915dc69985a3c9
                                                                                                  • Instruction ID: 459e7f25662fc69fa7dd778ccf038eaa03be117adedf78789e950ddcfecabc5a
                                                                                                  • Opcode Fuzzy Hash: f96b4410ed8fbe499fbdd3cccf79b993183207da177129b1e3915dc69985a3c9
                                                                                                  • Instruction Fuzzy Hash: 6F0126343843089FE715A768D864739BB92EB40304F29885AE6898F6C1CE76FC81C356
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000002.2148362054.00000000030CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 030CD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_2_30cd000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: eb43fbcb1fcd6fe167f27b6ca4d0d1ef84f3cb5f702611b233e95c43ab983061
                                                                                                  • Instruction ID: b506e3dfa65b4b7e2405cd43774e4fc946123fc6d03a82b4a336060013898d2d
                                                                                                  • Opcode Fuzzy Hash: eb43fbcb1fcd6fe167f27b6ca4d0d1ef84f3cb5f702611b233e95c43ab983061
                                                                                                  • Instruction Fuzzy Hash: 6A01406240E3C05FD7128B258C94756BFA8EF53224F1985DBE8888F297C2695C45D771
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0cf2bc8ce530950307d3a42edf0164f3daf5308731ffff6394e903a4ea948d22
                                                                                                  • Instruction ID: 2c388ac67ee2b677d9eff2dda51f2dd7251608c8f859bb7a282f7401f7c63ed8
                                                                                                  • Opcode Fuzzy Hash: 0cf2bc8ce530950307d3a42edf0164f3daf5308731ffff6394e903a4ea948d22
                                                                                                  • Instruction Fuzzy Hash: 8501D8307093495FCB099F786435215BFDAEFC1604B4908ABC549CB1A1ED65D805C3D3
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000002.2148362054.00000000030CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 030CD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_2_30cd000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 473aeaa1cb1cdc1569931a8f03613bfd931bebe6737e4d34211269600cc2a5ce
                                                                                                  • Instruction ID: 1086acd36d1f5e7cd9443da917d39bde10446bf87f00d86fc8eb4a9608ac3147
                                                                                                  • Opcode Fuzzy Hash: 473aeaa1cb1cdc1569931a8f03613bfd931bebe6737e4d34211269600cc2a5ce
                                                                                                  • Instruction Fuzzy Hash: 0F01847141A3809AE7118B29CD8476BBFD8EF41324F28C57EED484A286C279D842C6B1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5df6dc761ac6291b5c488f018359ecd0ead9ae753d014d798f4cf10a351bf79a
                                                                                                  • Instruction ID: aa75737807beea4e18540a3b94b1efed0311e7bc354584185f0af436db6d2610
                                                                                                  • Opcode Fuzzy Hash: 5df6dc761ac6291b5c488f018359ecd0ead9ae753d014d798f4cf10a351bf79a
                                                                                                  • Instruction Fuzzy Hash: 7301D631B0020597E728AA6984547EFBAF79BC8704F2A8169D115B73C0CF726E019BD1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 90afd65632803ed69c35de83fd1d4809dff2c4a784ced3cc6ae006d88a08af6f
                                                                                                  • Instruction ID: 9d90554acd826113bc12a41298e9f18707160a58d1c232dd4472f2ea82d3e679
                                                                                                  • Opcode Fuzzy Hash: 90afd65632803ed69c35de83fd1d4809dff2c4a784ced3cc6ae006d88a08af6f
                                                                                                  • Instruction Fuzzy Hash: 39F02776B013502BD725699A918472B9A4B5BC4275F1A802EEE098B380DE70DD0291A0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 665d9a3d2a82646dfef362cac6f61d8b7f2e0a1fa81397c93b5fabc5eca109cb
                                                                                                  • Instruction ID: b96ad34ee83a1406d7561d9903676fbd444e2f8e7c76b1ca13ac18651c360b6b
                                                                                                  • Opcode Fuzzy Hash: 665d9a3d2a82646dfef362cac6f61d8b7f2e0a1fa81397c93b5fabc5eca109cb
                                                                                                  • Instruction Fuzzy Hash: 3DF09030B452065ECB1C9FB86525216BFDAEFC0718B89086B82098F2A0EE65D906C7D3
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3be34e66b0a152276812c913a09479ce74792dd5d2a99fecd166339e302661f7
                                                                                                  • Instruction ID: ae0e05efb89972ab5847239a23144dcb79241b3f5f2995100f2ec1e794b827c4
                                                                                                  • Opcode Fuzzy Hash: 3be34e66b0a152276812c913a09479ce74792dd5d2a99fecd166339e302661f7
                                                                                                  • Instruction Fuzzy Hash: D3D0A7323510286B56146719E885ABABB9AE7953613158433F94283364DD61BC4093D6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 665e459f287a90710b68303fa76223e87f456b75467e831e7dd68f0043db339d
                                                                                                  • Instruction ID: 65e76b60b9d58a0bd068fde46ace379ef3332aa0e2a722df41eba585f2af1b0b
                                                                                                  • Opcode Fuzzy Hash: 665e459f287a90710b68303fa76223e87f456b75467e831e7dd68f0043db339d
                                                                                                  • Instruction Fuzzy Hash: F1C0C08FA0733803C71110742F1108AC3030B89B12B0B8C93C20CDF280440ADC0872F2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9ce0eb3bf2e9a910ffcee216777a2d9d6794f088cebc9b1f5f2e39f2d514b154
                                                                                                  • Instruction ID: e96d38ce10a8da8b38ffda4427a5b0805031e5fda1d6ebbb86c6fef11a4e2aba
                                                                                                  • Opcode Fuzzy Hash: 9ce0eb3bf2e9a910ffcee216777a2d9d6794f088cebc9b1f5f2e39f2d514b154
                                                                                                  • Instruction Fuzzy Hash: A8D097333581205FC308E344F1457697B926749232B09402BFA088B3A0CC301CA0C380
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ead2edbd3d83a8f948f77e98a687016d883ec2dad359032ad9debc9eb10ac75e
                                                                                                  • Instruction ID: dacc4c8cd7357f35d0ade65f05640f22ce3e9ddbc1285c1ba3225666838a035b
                                                                                                  • Opcode Fuzzy Hash: ead2edbd3d83a8f948f77e98a687016d883ec2dad359032ad9debc9eb10ac75e
                                                                                                  • Instruction Fuzzy Hash: 1BC08C21B802088AEA103B67221833AB18EDB8070CF44C8557A0E86084DDAAF8401189
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9ab1eb0d07c49233290b5f9cd8af0f32e7b061a4dd0b7e36e959bada4a161827
                                                                                                  • Instruction ID: dc76b57ef6a55cb5fed90cab6d650c6270728d6c856827a8145e19947a17d5b9
                                                                                                  • Opcode Fuzzy Hash: 9ab1eb0d07c49233290b5f9cd8af0f32e7b061a4dd0b7e36e959bada4a161827
                                                                                                  • Instruction Fuzzy Hash: F1C08CF3B10A219BD2094A4800002E9F3A1FFB020AB81C156C1A800000933161238968
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000010.00000003.2147204372.0000000004C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_16_3_4c00000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 77ab45fcd00ab7e3657f9892a90d4cd1c7e7903ee0390931512efa52f0f68f63
                                                                                                  • Instruction ID: 494af2c101e1384bcb9b3133107d98dcf67e7b8920f1e1b8060ac8b737fa24e3
                                                                                                  • Opcode Fuzzy Hash: 77ab45fcd00ab7e3657f9892a90d4cd1c7e7903ee0390931512efa52f0f68f63
                                                                                                  • Instruction Fuzzy Hash: FCB01286644000127500B73748D05B6C0C3D6C0304BCCCC902602E005C5E18F0013004
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q
                                                                                                  • API String ID: 0-355816377
                                                                                                  • Opcode ID: 35aa242259efaadf22747943a8610446fce4cf41e88aae15da0f8764ebc9d200
                                                                                                  • Instruction ID: d8d98a97e2d2deb68fa73343f2b70a549b85c26772ee34be13cb7370f17bb6da
                                                                                                  • Opcode Fuzzy Hash: 35aa242259efaadf22747943a8610446fce4cf41e88aae15da0f8764ebc9d200
                                                                                                  • Instruction Fuzzy Hash: 9C51D232B002499FDB25DF78D8406AEBBF6AFC9350B14812AE854DB365DA34ED06C791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq$LR^q
                                                                                                  • API String ID: 0-516514815
                                                                                                  • Opcode ID: f947388eeeaa7dea85bc4382399a0413fa382b240db47e364b6e08e861b3451d
                                                                                                  • Instruction ID: c39c84cd94bdd4fe0b143c6cd7fc2dde8e3ed328a99c1ede52823e628327f394
                                                                                                  • Opcode Fuzzy Hash: f947388eeeaa7dea85bc4382399a0413fa382b240db47e364b6e08e861b3451d
                                                                                                  • Instruction Fuzzy Hash: F341ED317042559FEB189A78A86877F7AEAEFC4700F1494AAE442D73D5EE38EC418391
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: 50b1b84fec5c137ac130dda2f04e516a1d29a3148d18d98e08477566cbf5cd83
                                                                                                  • Instruction ID: 5f765b684951476147bd785d34a598e8f285fd5ac278d58dbbb0506303a5d726
                                                                                                  • Opcode Fuzzy Hash: 50b1b84fec5c137ac130dda2f04e516a1d29a3148d18d98e08477566cbf5cd83
                                                                                                  • Instruction Fuzzy Hash: 8171B731B10214DFDF189BB9D854B6DBBE7AFC8700F148029E546AB3A4DE75ED428741
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: e988bdb6f7cb34b052c4f0e0cee9ae775444d2c8b9f740323c109ed4940dbae6
                                                                                                  • Instruction ID: 577b4ac0434218d9fe31ea7d4ac29bf52acc3ca6c2523a7220d4e5deeeea6306
                                                                                                  • Opcode Fuzzy Hash: e988bdb6f7cb34b052c4f0e0cee9ae775444d2c8b9f740323c109ed4940dbae6
                                                                                                  • Instruction Fuzzy Hash: 9251FB31704254AFDB149F68E4547AE7BF6EFC9310F149469D446E7381CE38AC46CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: 9e171e1afdb91ed9e1387bb0d8c37e26706185ad7ee38b92d7eed7d296db08fa
                                                                                                  • Instruction ID: 0ebc56f03a6dd3f5c1d09e7f08dc2f98b76aa9a028001516308227608f6c77dd
                                                                                                  • Opcode Fuzzy Hash: 9e171e1afdb91ed9e1387bb0d8c37e26706185ad7ee38b92d7eed7d296db08fa
                                                                                                  • Instruction Fuzzy Hash: DD417D31B001145BEB28AA79A8A5B7F77D6DFC4710F14D02DE546EB380CD38AD4287E1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: LR^q
                                                                                                  • API String ID: 0-2625958711
                                                                                                  • Opcode ID: c93b0be3fc867a513db0e74df8735c62f25c59e21c870dc612790a5933197ddb
                                                                                                  • Instruction ID: 10248b242f084fa3745d62fba0e88b901a76171a3d2ba10610f1784500be1f0b
                                                                                                  • Opcode Fuzzy Hash: c93b0be3fc867a513db0e74df8735c62f25c59e21c870dc612790a5933197ddb
                                                                                                  • Instruction Fuzzy Hash: B321E271B002159FDB289E24A85577F37EAFF85214F0094ADE456C72D0EA38AD028750
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0aa1a2d9ea1bcd06c22e0d0786ea05ccafa6172ac358044332870e1b056986c9
                                                                                                  • Instruction ID: 33b8a8a013a685aa245b1c8021cf48311c6383d7924432d196003f152042aa0c
                                                                                                  • Opcode Fuzzy Hash: 0aa1a2d9ea1bcd06c22e0d0786ea05ccafa6172ac358044332870e1b056986c9
                                                                                                  • Instruction Fuzzy Hash: 1CF06D70D042598FCB54DFA4D8810EEBFB4EF0D310B1080AAC449E7311E3385A02CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0d1eea6eb98af5bf3b6dd3cbfd7845bd556d6a6af15fc6a9d816d7246db06f08
                                                                                                  • Instruction ID: 5103b80893d25ff79f072d21067abbaf0ddf8a53db97ec905a070333fdcb3ea7
                                                                                                  • Opcode Fuzzy Hash: 0d1eea6eb98af5bf3b6dd3cbfd7845bd556d6a6af15fc6a9d816d7246db06f08
                                                                                                  • Instruction Fuzzy Hash: B4B1E334B012158FD714CF78D894AAEBBF1FF88314F2591AAE4559B352DA35EC82CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: cbfab26a34620edf766cdd84b697d47898070f97fcd5308fe2c0b88a8e0ce9a8
                                                                                                  • Instruction ID: 74256418e3485745c3244683772bbb31fadbe7eb8a36535af54531828e40e9e6
                                                                                                  • Opcode Fuzzy Hash: cbfab26a34620edf766cdd84b697d47898070f97fcd5308fe2c0b88a8e0ce9a8
                                                                                                  • Instruction Fuzzy Hash: 10314B33708205BFCB395A25785966A7F6ACB81350B04A066E548CF252DE2CB842C3F2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 80f601674b60f91d536c08ec344209f8f72461d8cc3f31e515c21a6924602733
                                                                                                  • Instruction ID: fc8985b4c8d6d6c6f646b1e8a1639f7f360e05a8c0ce35927fdb84d394ee837b
                                                                                                  • Opcode Fuzzy Hash: 80f601674b60f91d536c08ec344209f8f72461d8cc3f31e515c21a6924602733
                                                                                                  • Instruction Fuzzy Hash: CF411A75B002189FDB54DF68D88099EBBB2FF88714B14816AE905EB360DB31ED42CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 14dcaeaf9663bd82f73fd1731cc1695996320a86014790e0d9b7e8749d75e67b
                                                                                                  • Instruction ID: 9a2daa5e04faac1a0b4281d522b1f856ed5fba1d63a565538b004e557d594fe3
                                                                                                  • Opcode Fuzzy Hash: 14dcaeaf9663bd82f73fd1731cc1695996320a86014790e0d9b7e8749d75e67b
                                                                                                  • Instruction Fuzzy Hash: B521E8327102249BDF209E7CA5906EEB7EADFC4254F048036D586D7345DE68E9868791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c7ba5e9865f7e03279f0c732da624af74f9e8734e22fd14d587c60394709bc08
                                                                                                  • Instruction ID: d94f8d14075006c739b1acbce4324a56d698f629b1e2fc1d3c25acfb4ea0465b
                                                                                                  • Opcode Fuzzy Hash: c7ba5e9865f7e03279f0c732da624af74f9e8734e22fd14d587c60394709bc08
                                                                                                  • Instruction Fuzzy Hash: DA11EC33B10214D7DF248E6998446EEB7EADBC8251F048036D947D7345EE78ED438791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a9b946e9ff3a43dc5f5329bf8d9c238f1fc3dba1b666d9028952e2f0892da53f
                                                                                                  • Instruction ID: d5a7792a8b6e218c8b3168e1f9998c23ec6c396d5cf1e7dfedb800d1cc3575db
                                                                                                  • Opcode Fuzzy Hash: a9b946e9ff3a43dc5f5329bf8d9c238f1fc3dba1b666d9028952e2f0892da53f
                                                                                                  • Instruction Fuzzy Hash: 87214231B40105AFDB14DF68E854ADEBBB6EF8C314F148025E805A7755DE79AC86CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0a2831a0820feba6b67ce4a887baca680446c957181ae6862af5081cabeadc40
                                                                                                  • Instruction ID: d38d7274e6ea45b04639b174d371dcff49cef8238a7a4b1d826f582cdbe3e151
                                                                                                  • Opcode Fuzzy Hash: 0a2831a0820feba6b67ce4a887baca680446c957181ae6862af5081cabeadc40
                                                                                                  • Instruction Fuzzy Hash: C621FC75E102199FCB54DF69D8809DEBBF1FF8C714B10816AE945AB320EB35A942CF90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5eb3d087c8202809082f23a66de502ab9bad420a2645c8cca6746b6776d42c3f
                                                                                                  • Instruction ID: 4aaec29c0f37726c9a05d5e5006903ae3194b6f5419853ead9c88e16491709e3
                                                                                                  • Opcode Fuzzy Hash: 5eb3d087c8202809082f23a66de502ab9bad420a2645c8cca6746b6776d42c3f
                                                                                                  • Instruction Fuzzy Hash: BA215431B00154EFDB44DF68F4999A9BBB6EF8C310F158019E849A7381DF79AD86CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 34c8b58fcfe64d1fd9b3a7e2e330c88407ae3ec7591b534e65636cbb05835b21
                                                                                                  • Instruction ID: 23e9c0e7b5ed045632fd7ad860b82771d11c8c528e914681aff881ed9107bb0c
                                                                                                  • Opcode Fuzzy Hash: 34c8b58fcfe64d1fd9b3a7e2e330c88407ae3ec7591b534e65636cbb05835b21
                                                                                                  • Instruction Fuzzy Hash: 26118431B00205AFDB14DF68E854A9EBBB6EFCC314F148029E409A7395DF79AC85CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a2d738466164714c1e1c667f325275611c5e287cab6f973826ab9dba31432185
                                                                                                  • Instruction ID: 8687be52ddc40352530d5bc6e5ecf83513497ffb9704769d48d71ef3d53d5697
                                                                                                  • Opcode Fuzzy Hash: a2d738466164714c1e1c667f325275611c5e287cab6f973826ab9dba31432185
                                                                                                  • Instruction Fuzzy Hash: 4A2104B1900209CFDB20DFAAC484ADEFBF0FF49324F108429D59967240C7796946CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a585d0b680c1b523776418306ce33d731cc44691c428c12a02a75dcb06c65b38
                                                                                                  • Instruction ID: 0f390214ce451aaf1f103e238acacf4fb0fed067fb14c4a8ba2d508a88545ec1
                                                                                                  • Opcode Fuzzy Hash: a585d0b680c1b523776418306ce33d731cc44691c428c12a02a75dcb06c65b38
                                                                                                  • Instruction Fuzzy Hash: BC11E3B59042498BDB20DFAAC484ADEFBF4FB88324F10842AD45967250C7796945CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e74acae7979b218069b3259032e5cc86feb1c60f99d1e457b37f506c9af71282
                                                                                                  • Instruction ID: c6b3f4b68ec07aed642e02600784e7a7238378dcb06e3b881c44b63f65148eda
                                                                                                  • Opcode Fuzzy Hash: e74acae7979b218069b3259032e5cc86feb1c60f99d1e457b37f506c9af71282
                                                                                                  • Instruction Fuzzy Hash: 29110035700255EFDB44DF68F458AA9BBB6EF8C321F148059E809A7391CF799C85CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0160ffe06e43d3ffdd9b072e0d72d83d8c4127c2c8333e0c78a36e85762f5baa
                                                                                                  • Instruction ID: c8cde9ba54f1ef71dca73e0f4f30cecac8cc5e9b7ad525af098277c06adac17b
                                                                                                  • Opcode Fuzzy Hash: 0160ffe06e43d3ffdd9b072e0d72d83d8c4127c2c8333e0c78a36e85762f5baa
                                                                                                  • Instruction Fuzzy Hash: 0C01B131B493455FCB199F3878AA1267FB9DF8560031518AAD589CF252FD18D84A83D2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 86282b703159e9975d7edc5215783aab6e3a947b0a292f45e30411b0a5e20cfa
                                                                                                  • Instruction ID: 66e704a2a2c13892a46edb337916cd0fcb9e070872ec53b2e4304e128ba5b7ec
                                                                                                  • Opcode Fuzzy Hash: 86282b703159e9975d7edc5215783aab6e3a947b0a292f45e30411b0a5e20cfa
                                                                                                  • Instruction Fuzzy Hash: C401A231B1021597EB38AA6885A53EF7BB69F88704F20102DD082B7780CE7D6D428BD1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000002.2602485622.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_2_bcd000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8f8e1bbe2fc0f0a3f24fc9fd0a9f19cd9c76ab032b52423326fa7f73d99502f3
                                                                                                  • Instruction ID: 8241ef528204d151b4315a9c2cf9a1abe9e76e0d13c11571455330b245db22d5
                                                                                                  • Opcode Fuzzy Hash: 8f8e1bbe2fc0f0a3f24fc9fd0a9f19cd9c76ab032b52423326fa7f73d99502f3
                                                                                                  • Instruction Fuzzy Hash: 4901A2755083409AE7208A2DCDD4FA7BFD8EF41324F18C5BEED484A286C2799842CAB1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000002.2602485622.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_2_bcd000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: adc0051dfe86b3d4b8182acfb4b9844a01f5a6c11984cc46a88ad77499540b26
                                                                                                  • Instruction ID: 168404f98396bd5369fb7acb6889f7ada2b6e6c115567f4f1b656d1dca097d0e
                                                                                                  • Opcode Fuzzy Hash: adc0051dfe86b3d4b8182acfb4b9844a01f5a6c11984cc46a88ad77499540b26
                                                                                                  • Instruction Fuzzy Hash: D1015E6150E3C09FD7128B258CA4B62BFB4EF53224F19C1DBDD888F197C2699849C772
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6da434a9487692360b47a4ef661b54734dbbe84b035697781fe2abeac9cbccb4
                                                                                                  • Instruction ID: 519b401b8da1d9b680079c5ae5563ad6610725a57e4ee1a8222561149543f9a2
                                                                                                  • Opcode Fuzzy Hash: 6da434a9487692360b47a4ef661b54734dbbe84b035697781fe2abeac9cbccb4
                                                                                                  • Instruction Fuzzy Hash: 61F0F631B442455FDB1C9F3874AA1567FEAEFC4600315186ED1C9CF252FD28C94683C2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9909b09a85e4558883fffce80e6f02131562a25d34f7f326e4beb039cf1067a0
                                                                                                  • Instruction ID: ae5164d0692165c6f4885ad474362f28663e29b205fb408c7644c720d3c71948
                                                                                                  • Opcode Fuzzy Hash: 9909b09a85e4558883fffce80e6f02131562a25d34f7f326e4beb039cf1067a0
                                                                                                  • Instruction Fuzzy Hash: C3E0ED363503108FD7259A34B0816DE7BF6EBC2260B10466ED1458B282CF6CAD4B8381
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0b4c19c7ff53ae6a8dd768d44b227137ca0a0fe65ab1591fd48dd24f5f0630cb
                                                                                                  • Instruction ID: 2c369acf4a371b9c2ce73ba2351eb4222af808a80fcba38409c9498d89d13ed4
                                                                                                  • Opcode Fuzzy Hash: 0b4c19c7ff53ae6a8dd768d44b227137ca0a0fe65ab1591fd48dd24f5f0630cb
                                                                                                  • Instruction Fuzzy Hash: D5E092353203159FDB24AA38A58466FB7EAEBC5355B004A6DE14697304DF68FC498381
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 82e46746ea32f508822fdf00b8f13a801fcdf43a431bfa08d2d360fe66063a4a
                                                                                                  • Instruction ID: 8a35f6db021d3ad4ea5458ee93876dfa452f9792567a4bfc6f20260d15834e8c
                                                                                                  • Opcode Fuzzy Hash: 82e46746ea32f508822fdf00b8f13a801fcdf43a431bfa08d2d360fe66063a4a
                                                                                                  • Instruction Fuzzy Hash: 1AE04836101128BBDF552A95E404BEB7F5AEF44370F10D025FD9C45250C6399964E790
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 05f306c7b542a29ca114880cbbde801c16ea0f3a35982d1c41aa45bced93471d
                                                                                                  • Instruction ID: 2f381fc4f0461e9a226f03c46fc470f0fc35cf89510b255ca996c3ebc2def9b9
                                                                                                  • Opcode Fuzzy Hash: 05f306c7b542a29ca114880cbbde801c16ea0f3a35982d1c41aa45bced93471d
                                                                                                  • Instruction Fuzzy Hash: 87F092B5D00219DF8B54EFA9D9445AEBBF8FF48350B10816AD519E7310E7399A41CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: fe44b17d81b3df8d549124ab045fd33cfa06bbead037a51a4b61e2aee906097b
                                                                                                  • Instruction ID: ceb51418814e42bef666d297eb117d905c679d9bf8ddfb8c299e11b55f5a7412
                                                                                                  • Opcode Fuzzy Hash: fe44b17d81b3df8d549124ab045fd33cfa06bbead037a51a4b61e2aee906097b
                                                                                                  • Instruction Fuzzy Hash: 34D02E3324A2101FD309E760F4870E9BF74AB0622030440ABE8458B2A2DC250C83C3C0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4c2dce9a5efce3a41ff9a08d0a9a9e3d016e27475ce7fd319b036ba5090e7726
                                                                                                  • Instruction ID: 34a6be20537d0d62b2b8c4737175fe45885d186bd45b41ad76a49a561c896d65
                                                                                                  • Opcode Fuzzy Hash: 4c2dce9a5efce3a41ff9a08d0a9a9e3d016e27475ce7fd319b036ba5090e7726
                                                                                                  • Instruction Fuzzy Hash: 4BD0A73232111C7B96186718E8858BABBA9EB852603104433F94383324DD64BC8083D9
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000013.00000003.2600392054.0000000004370000.00000040.00000800.00020000.00000000.sdmp, Offset: 04370000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_19_3_4370000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 211153dc7d1884c25867064dcea8726401130173d23b4c8f5679a14e8f825ec4
                                                                                                  • Instruction ID: 343b83135cc24d7a4ae74dec94157bd417af06761fc9260168482b0e1aa48ede
                                                                                                  • Opcode Fuzzy Hash: 211153dc7d1884c25867064dcea8726401130173d23b4c8f5679a14e8f825ec4
                                                                                                  • Instruction Fuzzy Hash: 0EC08CF3AA47509FE3258E0C08D10EAB7B0FE72B1A395855ED0C084007F22A60E3C760
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:12.4%
                                                                                                  Dynamic/Decrypted Code Coverage:2.9%
                                                                                                  Signature Coverage:2.5%
                                                                                                  Total number of Nodes:2000
                                                                                                  Total number of Limit Nodes:45
                                                                                                  execution_graph 26860 73ac67a9 26861 73ac67cc GetVersionExA 26860->26861 26862 73ac68aa 26860->26862 26863 73ac67ee 26861->26863 26910 73ac67e7 26861->26910 26864 73ac68e5 26862->26864 26865 73ac68b0 26862->26865 26911 73ac8962 HeapCreate 26863->26911 26866 73ac68ea 26864->26866 26867 73ac6936 26864->26867 26870 73ac68cf 26865->26870 26865->26910 27029 73ac79b9 61 API calls _doexit 26865->27029 27033 73ac7b06 6 API calls _raise 26866->27033 26867->26910 27037 73ac7e20 73 API calls 2 library calls 26867->27037 26870->26910 27030 73ac83bf 62 API calls __getstream 26870->27030 26872 73ac68ef 26878 73ac813a ___crtLCMapStringA 61 API calls 26872->26878 26874 73ac6840 26874->26910 26921 73ac7e93 GetModuleHandleA 26874->26921 26876 73ac6951 26881 73ac68fb 26878->26881 26880 73ac68d9 27031 73ac7b35 64 API calls 2 library calls 26880->27031 26884 73ac6907 26881->26884 26881->26910 26882 73ac684a 26885 73ac684e 26882->26885 26886 73ac6855 GetCommandLineA 26882->26886 27034 73ac7a8d TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 26884->27034 27026 73ac89c7 VirtualFree HeapFree HeapFree HeapDestroy 26885->27026 26955 73ac87c4 26886->26955 26887 73ac68de 27032 73ac89c7 VirtualFree HeapFree HeapFree HeapDestroy 26887->27032 26892 73ac6919 26895 73ac692a 26892->26895 26896 73ac6920 26892->26896 27036 73ac6f02 61 API calls 4 library calls 26895->27036 27035 73ac7b77 61 API calls 4 library calls 26896->27035 26897 73ac686f 26908 73ac6873 26897->26908 26998 73ac8704 26897->26998 26900 73ac6927 26900->26910 26903 73ac6893 26903->26910 27028 73ac83bf 62 API calls __getstream 26903->27028 27027 73ac7b35 64 API calls 2 library calls 26908->27027 27038 73ac6df2 26910->27038 26912 73ac898a 26911->26912 26913 73ac8986 26911->26913 27042 73ac8900 61 API calls 3 library calls 26912->27042 26913->26874 26915 73ac898f 26916 73ac89bd 26915->26916 26917 73ac8999 26915->26917 26916->26874 27043 73acae11 HeapAlloc 26917->27043 26919 73ac89a3 26919->26916 26920 73ac89a8 HeapDestroy 26919->26920 26920->26913 26922 73ac7ea7 26921->26922 26923 73ac7eb0 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 26921->26923 27044 73ac7b35 64 API calls 2 library calls 26922->27044 26924 73ac7efa TlsAlloc 26923->26924 26928 73ac7f44 TlsSetValue 26924->26928 26954 73ac7fa7 26924->26954 26927 73ac7eac 26927->26882 26929 73ac7f51 26928->26929 26928->26954 27045 73ac79cd 4 API calls 3 library calls 26929->27045 26931 73ac7f56 27046 73ac7a14 TlsGetValue 26931->27046 26934 73ac7a14 ___crtInitCritSecAndSpinCount 4 API calls 26935 73ac7f71 26934->26935 26936 73ac7a14 ___crtInitCritSecAndSpinCount 4 API calls 26935->26936 26937 73ac7f81 26936->26937 26938 73ac7a14 ___crtInitCritSecAndSpinCount 4 API calls 26937->26938 26939 73ac7f91 26938->26939 27053 73acac43 61 API calls 26939->27053 26941 73ac7f9e 26942 73ac7fa2 26941->26942 27055 73ac7a8d TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 26941->27055 27054 73ac7b35 64 API calls 2 library calls 26942->27054 26945 73ac7fbc 26945->26942 27056 73acdac2 61 API calls __calloc_impl 26945->27056 26947 73ac7fd5 26947->26942 27057 73ac7a8d TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 26947->27057 26949 73ac7fef 26950 73ac7fff 26949->26950 26951 73ac7ff6 26949->26951 27059 73ac7b77 61 API calls 4 library calls 26950->27059 27058 73ac6f02 61 API calls 4 library calls 26951->27058 26954->26882 26956 73ac8801 26955->26956 26957 73ac87e2 GetEnvironmentStringsW 26955->26957 26958 73ac87ea 26956->26958 26961 73ac889a 26956->26961 26957->26958 26959 73ac87f6 GetLastError 26957->26959 26960 73ac881d GetEnvironmentStringsW 26958->26960 26966 73ac882c 26958->26966 26959->26956 26963 73ac6865 26960->26963 26960->26966 26962 73ac88a3 GetEnvironmentStrings 26961->26962 26961->26963 26962->26963 26964 73ac88b3 26962->26964 26981 73ac8180 26963->26981 27062 73acb6f5 61 API calls 6 library calls 26964->27062 26965 73ac8841 WideCharToMultiByte 26967 73ac888f FreeEnvironmentStringsW 26965->26967 26968 73ac8860 26965->26968 26966->26965 26966->26966 26967->26963 27060 73acb6f5 61 API calls 6 library calls 26968->27060 26972 73ac88cd 26974 73ac88d4 FreeEnvironmentStringsA 26972->26974 26975 73ac88e0 ___crtGetEnvironmentStringsA 26972->26975 26973 73ac8866 26973->26967 26976 73ac886e WideCharToMultiByte 26973->26976 26974->26963 26979 73ac88ea FreeEnvironmentStringsA 26975->26979 26977 73ac8888 26976->26977 26978 73ac8880 26976->26978 26977->26967 27061 73ac6f02 61 API calls 4 library calls 26978->27061 26979->26963 27063 73ac8acc 26981->27063 26983 73ac818c GetStartupInfoA 26984 73ac813a ___crtLCMapStringA 61 API calls 26983->26984 26992 73ac81ad 26984->26992 26985 73ac83b1 __locking 26985->26897 26986 73ac832d GetStdHandle 26991 73ac82f7 26986->26991 26987 73ac813a ___crtLCMapStringA 61 API calls 26987->26992 26988 73ac8393 SetHandleCount 26988->26985 26989 73ac833f GetFileType 26989->26991 26990 73ac8279 26990->26991 26994 73ac82ad 26990->26994 26995 73ac82a2 GetFileType 26990->26995 26991->26986 26991->26988 26991->26989 26997 73ac8356 26991->26997 26992->26985 26992->26987 26992->26990 26992->26991 26994->26985 26994->26990 27064 73accfd8 61 API calls 4 library calls 26994->27064 26995->26990 26995->26994 26997->26985 26997->26991 27065 73accfd8 61 API calls 4 library calls 26997->27065 26999 73ac871e GetModuleFileNameA 26998->26999 27000 73ac8719 26998->27000 27002 73ac8745 26999->27002 27072 73acda9f 104 API calls __setmbcp 27000->27072 27066 73ac851d 27002->27066 27005 73ac687f 27005->26903 27011 73ac8412 27005->27011 27006 73ac8781 27073 73acb6f5 61 API calls 6 library calls 27006->27073 27008 73ac8787 27008->27005 27009 73ac851d 71 API calls 27008->27009 27010 73ac87a1 27009->27010 27010->27005 27012 73ac8425 27011->27012 27014 73ac842a 27011->27014 27076 73acda9f 104 API calls __setmbcp 27012->27076 27014->27014 27015 73ac813a ___crtLCMapStringA 61 API calls 27014->27015 27016 73ac6888 27014->27016 27020 73ac8473 27015->27020 27016->26903 27022 73ac784d 27016->27022 27017 73ac84f1 27079 73ac6f02 61 API calls 4 library calls 27017->27079 27020->27016 27020->27017 27077 73acdb13 61 API calls __locking 27020->27077 27078 73ac9b83 5 API calls ___ansicp 27020->27078 27024 73ac785b 27022->27024 27080 73accbf8 27024->27080 27025 73ac7879 __initterm_e _doexit 27025->26903 27026->26910 27027->26885 27028->26908 27029->26870 27030->26880 27031->26887 27032->26910 27033->26872 27034->26892 27035->26900 27036->26900 27037->26910 27039 73ac6dfc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 27038->27039 27040 73ac6dfa 27038->27040 27039->26876 27040->26876 27042->26915 27043->26919 27044->26927 27045->26931 27047 73ac7a2c 27046->27047 27048 73ac7a4d GetModuleHandleA 27046->27048 27047->27048 27049 73ac7a36 TlsGetValue 27047->27049 27050 73ac7a5c GetProcAddress 27048->27050 27051 73ac7a45 27048->27051 27052 73ac7a41 27049->27052 27050->27051 27051->26934 27052->27048 27052->27051 27053->26941 27054->26954 27055->26945 27056->26947 27057->26949 27058->26942 27059->26954 27060->26973 27061->26977 27062->26972 27063->26983 27064->26994 27065->26997 27068 73ac8544 27066->27068 27070 73ac85c8 27068->27070 27074 73acdbd8 71 API calls x_ismbbtype_l 27068->27074 27069 73ac86e8 27069->27005 27069->27006 27070->27069 27075 73acdbd8 71 API calls x_ismbbtype_l 27070->27075 27072->26999 27073->27008 27074->27068 27075->27070 27076->27014 27077->27020 27078->27020 27079->27016 27081 73accbfe 27080->27081 27082 73ac7a14 ___crtInitCritSecAndSpinCount 4 API calls 27081->27082 27083 73accc16 27081->27083 27082->27081 27083->27025 28040 f1a9ff 28041 f1aa0c 28040->28041 28046 f1e40d 28041->28046 28044 f1e40d ___crtLCMapStringA 60 API calls 28045 f1aa3f 28044->28045 28053 f1e2ea 28046->28053 28048 f1e427 28052 f1aa26 28048->28052 28066 f1a553 60 API calls __getptd 28048->28066 28050 f1e43d 28050->28052 28067 f1a553 60 API calls __getptd 28050->28067 28052->28044 28052->28045 28054 f1e2f6 __fcloseall 28053->28054 28055 f1e30e 28054->28055 28063 f1e32d _memset 28054->28063 28068 f1a553 60 API calls __getptd 28055->28068 28057 f1e313 28069 f1a451 5 API calls __fltout2 28057->28069 28058 f1e39f HeapAlloc 28058->28063 28060 f1e323 __fcloseall 28060->28048 28063->28058 28063->28060 28070 f1db61 28063->28070 28077 f1ea09 5 API calls 2 library calls 28063->28077 28078 f1e3e6 LeaveCriticalSection _doexit 28063->28078 28079 f1b542 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress __mtterm 28063->28079 28066->28050 28067->28052 28068->28057 28069->28060 28071 f1db76 28070->28071 28072 f1db89 EnterCriticalSection 28070->28072 28080 f1da99 28071->28080 28072->28063 28074 f1db7c 28074->28072 28109 f17ec6 60 API calls 3 library calls 28074->28109 28076 f1db88 28076->28072 28077->28063 28078->28063 28079->28063 28081 f1daa5 __fcloseall 28080->28081 28082 f1dab5 28081->28082 28083 f1dacd 28081->28083 28110 f1836a 60 API calls 2 library calls 28082->28110 28089 f1dadb __fcloseall 28083->28089 28115 f1b45f 28083->28115 28085 f1daba 28111 f181e0 60 API calls 3 library calls 28085->28111 28089->28074 28090 f1dac1 28112 f17f24 28090->28112 28091 f1daed 28133 f1a553 60 API calls __getptd 28091->28133 28092 f1dafc 28093 f1db61 __fcloseall 60 API calls 28092->28093 28096 f1db03 28093->28096 28098 f1db37 28096->28098 28099 f1db0b 28096->28099 28137 f1a5ab 60 API calls 4 library calls 28098->28137 28134 f1df24 60 API calls 5 library calls 28099->28134 28102 f1db16 28104 f1db28 28102->28104 28135 f1a5ab 60 API calls 4 library calls 28102->28135 28103 f1db3d 28138 f1db53 LeaveCriticalSection _doexit 28103->28138 28104->28103 28107 f1db22 28136 f1a553 60 API calls __getptd 28107->28136 28109->28076 28110->28085 28111->28090 28139 f17ef4 GetModuleHandleA 28112->28139 28116 f1b512 28115->28116 28123 f1b471 28115->28123 28149 f1b542 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress __mtterm 28116->28149 28118 f1b482 28118->28123 28127 f17f24 _fast_error_exit 3 API calls 28118->28127 28143 f1836a 60 API calls 2 library calls 28118->28143 28144 f181e0 60 API calls 3 library calls 28118->28144 28119 f1b518 28150 f1a553 60 API calls __getptd 28119->28150 28122 f1b50a 28122->28091 28122->28092 28123->28118 28123->28122 28126 f1b4ce HeapAlloc 28123->28126 28128 f1b4fe 28123->28128 28131 f1b503 28123->28131 28145 f1b40b 60 API calls 3 library calls 28123->28145 28146 f1b542 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress __mtterm 28123->28146 28126->28123 28127->28118 28147 f1a553 60 API calls __getptd 28128->28147 28148 f1a553 60 API calls __getptd 28131->28148 28133->28089 28134->28102 28135->28107 28136->28104 28137->28103 28138->28089 28140 f17f08 GetProcAddress 28139->28140 28141 f17f1d ExitProcess 28139->28141 28140->28141 28142 f17f18 28140->28142 28142->28141 28143->28118 28144->28118 28145->28123 28146->28123 28147->28131 28148->28122 28149->28119 28150->28122 29046 6d0df41c 212 API calls ___crtInitCritSecAndSpinCount 28151 73ac4f9c 28165 73ac6383 28151->28165 28154 73ac4fce GetLastError 28155 73ac5012 28154->28155 28156 73ac4fdb 28154->28156 28157 73ac504c 28155->28157 28158 73ac5019 CloseHandle 28155->28158 28172 73ac4b10 28156->28172 28158->28157 28160 73ac5024 GetLastError 28158->28160 28214 73ac64d5 167 API calls 3 library calls 28160->28214 28163 73ac4ffe iDirectXSetup 28163->28155 28164 73ac5049 28164->28157 28215 73ac61d6 28165->28215 28170 73ac6df2 ___ansicp 4 API calls 28171 73ac4fb6 CreateMutexA 28170->28171 28171->28154 28171->28155 28173 73ac4c93 28172->28173 28174 73ac4b36 GetCurrentDirectoryW 28172->28174 28175 73ac4ced 28173->28175 28176 73ac4cb7 GetProcAddress 28173->28176 28177 73ac4b4d GetLastError 28174->28177 28178 73ac4b78 GetModuleFileNameW 28174->28178 28180 73ac4d2b 28175->28180 28181 73ac4cf5 GetProcAddress 28175->28181 28176->28175 28179 73ac4ccd GetLastError 28176->28179 28182 73ac4b64 28177->28182 28183 73ac4ba9 28178->28183 28184 73ac4b90 GetLastError 28178->28184 28179->28175 28187 73ac4d71 28180->28187 28188 73ac4d33 GetProcAddress 28180->28188 28181->28180 28185 73ac4d0b GetLastError 28181->28185 29027 73ac64d5 167 API calls 3 library calls 28182->29027 28183->28173 28194 73ac4bc1 SetCurrentDirectoryW 28183->28194 28184->28182 28185->28180 28189 73ac4daf 28187->28189 28190 73ac4d79 GetProcAddress 28187->28190 28191 73ac4d69 28188->28191 28192 73ac4d49 GetLastError 28188->28192 28195 73ac4ded 28189->28195 28196 73ac4db7 GetProcAddress 28189->28196 28190->28189 28193 73ac4d8f GetLastError 28190->28193 28191->28187 28192->28191 28193->28189 28198 73ac4bd9 GetLastError 28194->28198 28199 73ac4bf5 28194->28199 28201 73ac4e2b 28195->28201 28202 73ac4df5 GetProcAddress 28195->28202 28196->28195 28200 73ac4dcd GetLastError 28196->28200 28197 73ac4b6e 28203 73ac6df2 ___ansicp 4 API calls 28197->28203 28198->28182 28208 73ac4c3a LoadLibraryW SetCurrentDirectoryW 28199->28208 28209 73ac4c11 28199->28209 28200->28195 28201->28197 28205 73ac4e33 GetProcAddress 28201->28205 28202->28201 28204 73ac4e0b GetLastError 28202->28204 28206 73ac4e79 28203->28206 28204->28201 28205->28197 28207 73ac4e49 GetLastError 28205->28207 28206->28155 28206->28163 28207->28197 28211 73ac4c6f 28208->28211 28212 73ac4c53 GetLastError 28208->28212 29028 73ac64d5 167 API calls 3 library calls 28209->29028 28211->28173 28213 73ac4c77 GetLastError 28211->28213 28212->28211 28213->28173 28214->28164 28216 73ac61e2 28215->28216 28217 73ac6208 28216->28217 28249 73ac618b 97 API calls _vswprintf_s 28216->28249 28219 73ac6212 28217->28219 28220 73ac62d2 28219->28220 28221 73ac623b GetWindowsDirectoryA 28219->28221 28224 73ac6252 OutputDebugStringA 28220->28224 28254 73ac7579 28220->28254 28223 73ac6262 28221->28223 28221->28224 28250 73ac4a54 28223->28250 28248 73ac636d 28224->28248 28228 73ac62f6 28257 73ac747f 28228->28257 28231 73ac6df2 ___ansicp 4 API calls 28236 73ac637c 28231->28236 28232 73ac628e CreateDirectoryA 28233 73ac62b5 28232->28233 28234 73ac62a1 GetLastError 28232->28234 28237 73ac4a54 97 API calls 28233->28237 28234->28224 28234->28233 28236->28170 28237->28220 28240 73ac6337 28243 73ac4a54 97 API calls 28240->28243 28241 73ac6311 28242 73ac4a54 97 API calls 28241->28242 28244 73ac6332 28242->28244 28243->28244 28263 73ac71bc 28244->28263 28246 73ac6367 28296 73ac713b 28246->28296 28248->28231 28249->28217 28251 73ac4a62 28250->28251 28253 73ac4a8c 28251->28253 28309 73ac6cd5 97 API calls _vswprintf_s 28251->28309 28253->28224 28253->28232 28310 73ac74a0 28254->28310 28256 73ac62e4 28256->28224 28256->28228 28803 73ac73d0 28257->28803 28260 73ac73af 28817 73ac7309 28260->28817 28266 73ac71c8 __locking 28263->28266 28264 73ac71d6 28853 73ac9c85 61 API calls _raise 28264->28853 28266->28264 28268 73ac729c 28266->28268 28855 73acbf5a 28266->28855 28267 73ac71db 28854 73ac9b83 5 API calls ___ansicp 28267->28854 28831 73acc247 28268->28831 28273 73ac71eb __locking 28273->28246 28274 73ac723c 28274->28264 28279 73acbf5a __fileno 61 API calls 28274->28279 28275 73ac72b4 28837 73acc315 28275->28837 28276 73acbf5a __fileno 61 API calls 28278 73ac7220 28276->28278 28278->28274 28281 73acbf5a __fileno 61 API calls 28278->28281 28282 73ac7259 28279->28282 28284 73ac722c 28281->28284 28285 73ac7281 28282->28285 28288 73acbf5a __fileno 61 API calls 28282->28288 28287 73acbf5a __fileno 61 API calls 28284->28287 28285->28264 28285->28268 28287->28274 28290 73ac7265 28288->28290 28290->28285 28293 73acbf5a __fileno 61 API calls 28290->28293 28291 73ac72d8 28862 73ac72fc LeaveCriticalSection LeaveCriticalSection __fcloseall 28291->28862 28294 73ac7271 28293->28294 28295 73acbf5a __fileno 61 API calls 28294->28295 28295->28285 28297 73ac7147 __locking 28296->28297 28298 73ac715b 28297->28298 28300 73ac7178 28297->28300 28969 73ac9c85 61 API calls _raise 28298->28969 28302 73acc247 __fcloseall 62 API calls 28300->28302 28307 73ac7170 __locking 28300->28307 28301 73ac7160 28970 73ac9b83 5 API calls ___ansicp 28301->28970 28304 73ac7190 28302->28304 28953 73ac70bf 28304->28953 28307->28248 28309->28253 28311 73ac74ac __locking 28310->28311 28312 73ac74bf 28311->28312 28313 73ac74d1 28311->28313 28373 73ac9c85 61 API calls _raise 28312->28373 28315 73ac74df 28313->28315 28316 73ac7504 28313->28316 28374 73ac9c85 61 API calls _raise 28315->28374 28332 73acc7ad 28316->28332 28319 73ac74e4 28375 73ac9b83 5 API calls ___ansicp 28319->28375 28320 73ac7509 28322 73ac751d 28320->28322 28323 73ac7510 28320->28323 28325 73ac7544 28322->28325 28326 73ac7524 28322->28326 28376 73ac9c85 61 API calls _raise 28323->28376 28351 73acc506 28325->28351 28377 73ac9c85 61 API calls _raise 28326->28377 28330 73ac74c4 __locking @_EH4_CallFilterFunc@8 28330->28256 28333 73acc7b9 __locking 28332->28333 28334 73acadd9 __getstream 61 API calls 28333->28334 28343 73acc7c7 28334->28343 28335 73acc834 28379 73acc8ca 28335->28379 28336 73acc838 28384 73acb6f5 61 API calls 6 library calls 28336->28384 28339 73acc8bf __locking 28339->28320 28340 73acc842 28340->28335 28385 73accfd8 61 API calls 4 library calls 28340->28385 28342 73acad11 __mtinitlocknum 61 API calls 28342->28343 28343->28335 28343->28336 28343->28342 28382 73acc281 62 API calls __getstream 28343->28382 28383 73acc2e8 LeaveCriticalSection LeaveCriticalSection _doexit 28343->28383 28345 73acc867 28347 73acc885 EnterCriticalSection 28345->28347 28348 73acc872 28345->28348 28347->28335 28386 73ac6f02 61 API calls 4 library calls 28348->28386 28350 73acc87a 28350->28335 28353 73acc528 28351->28353 28352 73acc55b 28358 73acc747 28352->28358 28372 73acc6f7 28352->28372 28393 73ad0283 71 API calls __fassign 28352->28393 28353->28352 28354 73acc53c 28353->28354 28391 73ac9c85 61 API calls _raise 28354->28391 28356 73acc541 28392 73ac9b83 5 API calls ___ansicp 28356->28392 28397 73ac9c85 61 API calls _raise 28358->28397 28359 73acc761 28388 73acfeb1 28359->28388 28362 73acc74c 28398 73ac9b83 5 API calls ___ansicp 28362->28398 28364 73ac754f 28378 73ac756a LeaveCriticalSection LeaveCriticalSection __fcloseall 28364->28378 28366 73acc6dc 28366->28358 28394 73ad00f7 96 API calls 28366->28394 28368 73acc6f1 28368->28372 28395 73ad00f7 96 API calls 28368->28395 28370 73acc70e 28370->28372 28396 73ad00f7 96 API calls 28370->28396 28372->28358 28372->28359 28373->28330 28374->28319 28375->28330 28376->28330 28377->28330 28378->28330 28387 73acacf5 LeaveCriticalSection 28379->28387 28381 73acc8d1 28381->28339 28382->28343 28383->28343 28384->28340 28385->28345 28386->28350 28387->28381 28399 73acfdf4 28388->28399 28390 73acfecc 28390->28364 28391->28356 28392->28364 28393->28366 28394->28368 28395->28370 28396->28372 28397->28362 28398->28364 28402 73acfe00 __locking 28399->28402 28400 73acfe0c 28486 73ac9c85 61 API calls _raise 28400->28486 28402->28400 28404 73acfe3d 28402->28404 28403 73acfe11 28487 73ac9b83 5 API calls ___ansicp 28403->28487 28410 73acf7a6 28404->28410 28409 73acfe20 __locking 28409->28390 28411 73acf7d1 28410->28411 28489 73ad1d71 28411->28489 28414 73acf7fc 28495 73ac77c6 28414->28495 28419 73acf84d 28608 73ac9c9d 61 API calls _raise 28419->28608 28421 73acf852 28609 73ac9c85 61 API calls _raise 28421->28609 28422 73acf817 28422->28419 28426 73acf8fb 28422->28426 28424 73acf85c 28610 73ac9b83 5 API calls ___ansicp 28424->28610 28501 73acf473 28426->28501 28428 73acf9a1 28429 73acf9bf CreateFileA 28428->28429 28430 73acf9a8 28428->28430 28431 73acfa1b GetFileType 28429->28431 28432 73acf9e7 28429->28432 28611 73ac9c9d 61 API calls _raise 28430->28611 28435 73acfa26 CloseHandle 28431->28435 28439 73acfa4a 28431->28439 28434 73acfa02 GetLastError 28432->28434 28613 73ac9cb5 61 API calls 2 library calls 28434->28613 28435->28434 28436 73acf9ad 28612 73ac9c85 61 API calls _raise 28436->28612 28520 73acf1f9 28439->28520 28444 73acf86b 28488 73acfe7e LeaveCriticalSection __lseeki64 28444->28488 28463 73acf9b7 28614 73ac9c85 61 API calls _raise 28463->28614 28486->28403 28487->28409 28488->28409 28490 73acf7ed 28489->28490 28491 73ad1d80 28489->28491 28490->28414 28606 73ac9b83 5 API calls ___ansicp 28490->28606 28668 73ac9c85 61 API calls _raise 28491->28668 28493 73ad1d85 28669 73ac9b83 5 API calls ___ansicp 28493->28669 28496 73ac77d5 28495->28496 28500 73ac77ea 28496->28500 28670 73ac9c85 61 API calls _raise 28496->28670 28498 73ac77da 28671 73ac9b83 5 API calls ___ansicp 28498->28671 28500->28422 28607 73ac9b83 5 API calls ___ansicp 28500->28607 28502 73acf47f __locking 28501->28502 28503 73acad11 __mtinitlocknum 61 API calls 28502->28503 28504 73acf48f 28503->28504 28505 73acadd9 __getstream 61 API calls 28504->28505 28506 73acf494 __locking 28504->28506 28515 73acf4a3 28505->28515 28506->28428 28507 73acf5f0 28686 73acf60e LeaveCriticalSection _doexit 28507->28686 28509 73acf582 28510 73ac813a ___crtLCMapStringA 61 API calls 28509->28510 28513 73acf58b 28510->28513 28511 73acf525 EnterCriticalSection 28514 73acf535 LeaveCriticalSection 28511->28514 28511->28515 28512 73acadd9 __getstream 61 API calls 28512->28515 28513->28507 28674 73acf3a1 28513->28674 28514->28515 28515->28507 28515->28509 28515->28511 28515->28512 28516 73acf4f9 28515->28516 28673 73acf547 LeaveCriticalSection _doexit 28515->28673 28516->28515 28672 73accfd8 61 API calls 4 library calls 28516->28672 28521 73acf260 28520->28521 28523 73acf207 28520->28523 28687 73ac9c85 61 API calls _raise 28521->28687 28523->28521 28528 73acf22b 28523->28528 28524 73acf265 28526 73acf256 28527 73acf250 SetStdHandle 28527->28526 28528->28526 28528->28527 28606->28414 28607->28422 28608->28421 28609->28424 28610->28444 28611->28436 28612->28463 28613->28463 28614->28444 28668->28493 28669->28490 28670->28498 28671->28500 28672->28516 28673->28515 28676 73acf3ad __locking 28674->28676 28675 73acf40a 28678 73acf42d __locking 28675->28678 28679 73acf410 EnterCriticalSection 28675->28679 28676->28675 28677 73acadd9 __getstream 61 API calls 28676->28677 28680 73acf3d8 28677->28680 28678->28507 28679->28678 28686->28506 28687->28524 28804 73ac745d 28803->28804 28805 73ac73e3 28803->28805 28815 73ac9c85 61 API calls _raise 28804->28815 28805->28804 28807 73ac73e8 28805->28807 28808 73ac73f9 GetLocalTime 28807->28808 28809 73ac73f0 28807->28809 28810 73ac62ff 28808->28810 28814 73ac9c85 61 API calls _raise 28809->28814 28810->28260 28811 73ac73f5 28816 73ac9b83 5 API calls ___ansicp 28811->28816 28814->28811 28815->28811 28816->28810 28818 73ac731c 28817->28818 28819 73ac738d 28817->28819 28818->28819 28821 73ac7321 28818->28821 28829 73ac9c85 61 API calls _raise 28819->28829 28822 73ac732a 28821->28822 28823 73ac7333 GetLocalTime 28821->28823 28828 73ac9c85 61 API calls _raise 28822->28828 28826 73ac6308 28823->28826 28824 73ac732f 28830 73ac9b83 5 API calls ___ansicp 28824->28830 28826->28240 28826->28241 28828->28824 28829->28824 28830->28826 28832 73acc258 28831->28832 28833 73acc270 EnterCriticalSection 28831->28833 28832->28833 28834 73acc25f 28832->28834 28833->28275 28835 73acadd9 __getstream 61 API calls 28834->28835 28836 73acc26d 28835->28836 28836->28275 28838 73acbf5a __fileno 61 API calls 28837->28838 28839 73acc324 28838->28839 28863 73ace5b3 28839->28863 28841 73acc32a 28842 73acc368 28841->28842 28843 73ac72be 28841->28843 28872 73acb6f5 61 API calls 6 library calls 28842->28872 28846 73acc3e5 28843->28846 28845 73acc36e 28845->28843 28850 73acc407 ___crtGetEnvironmentStringsA 28846->28850 28852 73ac72ce 28846->28852 28849 73acbf5a __fileno 61 API calls 28849->28850 28850->28849 28851 73ace47e __locking 95 API calls 28850->28851 28850->28852 28876 73ac8cc1 28850->28876 28897 73acbfc7 28850->28897 28851->28850 28861 73acc3ad 95 API calls __fclose_nolock 28852->28861 28853->28267 28854->28273 28856 73acbf69 28855->28856 28857 73ac7214 28855->28857 28951 73ac9c85 61 API calls _raise 28856->28951 28857->28274 28857->28276 28859 73acbf6e 28952 73ac9b83 5 API calls ___ansicp 28859->28952 28861->28291 28862->28273 28864 73ace5cf 28863->28864 28865 73ace5c0 28863->28865 28868 73ace5f3 28864->28868 28874 73ac9c85 61 API calls _raise 28864->28874 28873 73ac9c85 61 API calls _raise 28865->28873 28867 73ace5c5 28867->28841 28868->28841 28870 73ace5e3 28875 73ac9b83 5 API calls ___ansicp 28870->28875 28872->28845 28873->28867 28874->28870 28875->28868 28877 73acbf5a __fileno 61 API calls 28876->28877 28878 73ac8cd0 28877->28878 28879 73ac8cdb 28878->28879 28880 73ac8cf2 28878->28880 28938 73ac9c85 61 API calls _raise 28879->28938 28882 73ac8cf6 28880->28882 28883 73ac8d03 28880->28883 28939 73ac9c85 61 API calls _raise 28882->28939 28885 73ac8d54 28883->28885 28888 73ac8d49 28883->28888 28889 73ace5b3 __locking 61 API calls 28883->28889 28894 73ac8ce0 28883->28894 28886 73ac8ddd 28885->28886 28887 73ac8d5e 28885->28887 28890 73ace47e __locking 95 API calls 28886->28890 28891 73ac8d75 28887->28891 28895 73ac8d91 28887->28895 28888->28885 28903 73ace55f 28888->28903 28889->28888 28890->28894 28892 73ace47e __locking 95 API calls 28891->28892 28892->28894 28894->28850 28895->28894 28906 73acdc7f 28895->28906 28898 73acbfe0 28897->28898 28902 73acc001 28897->28902 28899 73acbf5a __fileno 61 API calls 28898->28899 28898->28902 28900 73acbffa 28899->28900 28901 73ace47e __locking 95 API calls 28900->28901 28901->28902 28902->28850 28904 73ac813a ___crtLCMapStringA 61 API calls 28903->28904 28905 73ace576 28904->28905 28905->28885 28907 73acdc8b __locking 28906->28907 28938->28894 28939->28894 28951->28859 28952->28857 28954 73ac70ef 28953->28954 28955 73ac70d3 28953->28955 28958 73acbfc7 __fclose_nolock 95 API calls 28954->28958 28961 73ac70e8 28954->28961 29011 73ac9c85 61 API calls _raise 28955->29011 28957 73ac70d8 29012 73ac9b83 5 API calls ___ansicp 28957->29012 28960 73ac70fb 28958->28960 28972 73acbf91 28960->28972 28971 73ac71af LeaveCriticalSection LeaveCriticalSection __fcloseall 28961->28971 28964 73acbf5a __fileno 61 API calls 28965 73ac7109 28964->28965 28976 73acbe49 28965->28976 28969->28301 28970->28307 28971->28307 28973 73ac7103 28972->28973 28974 73acbfa1 28972->28974 28973->28964 28974->28973 29014 73ac6f02 61 API calls 4 library calls 28974->29014 28977 73acbe55 __locking 28976->28977 28978 73acbe5f 28977->28978 28979 73acbe79 28977->28979 29015 73ac9c85 61 API calls _raise 28978->29015 28981 73acbe7e 28979->28981 28982 73acbe93 28979->28982 29017 73ac9c9d 61 API calls _raise 28981->29017 28985 73acbea1 28982->28985 28988 73acbec2 28982->28988 28983 73acbe64 29011->28957 29012->28961 29014->28973 29015->28983 29027->28197 29028->28197 29047 f16ec2 29048 f16ed1 ___crtLCMapStringA 29047->29048 29089 f1935e GetModuleHandleA 29048->29089 29050 f16edc GetStartupInfoA GetVersionExA 29051 f17036 29050->29051 29053 f16f19 29050->29053 29309 f193e8 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess __fltout2 29051->29309 29091 f19296 HeapCreate 29053->29091 29056 f16f7a 29057 f16f86 29056->29057 29302 f16e4e 60 API calls 2 library calls 29056->29302 29101 f190b0 GetModuleHandleA 29057->29101 29060 f16f8c 29061 f16f97 29060->29061 29303 f16e4e 60 API calls 2 library calls 29060->29303 29135 f18a65 29061->29135 29064 f16fa0 29065 f16fac GetCommandLineA 29064->29065 29304 f17ec6 60 API calls 3 library calls 29064->29304 29152 f18929 29065->29152 29068 f16fab 29068->29065 29072 f16fd1 29189 f18577 29072->29189 29076 f16fe2 29200 f17fea 29076->29200 29079 f16fe9 29080 f16ff4 29079->29080 29307 f17ec6 60 API calls 3 library calls 29079->29307 29204 f18513 29080->29204 29086 f17031 29308 f18171 60 API calls _doexit 29086->29308 29090 f1936f 29089->29090 29090->29050 29092 f192ba 29091->29092 29093 f192be 29091->29093 29092->29056 29310 f19234 60 API calls 3 library calls 29093->29310 29095 f192c3 29096 f192f1 29095->29096 29097 f192cd 29095->29097 29096->29056 29311 f1e4a4 HeapAlloc 29097->29311 29099 f192d7 29099->29096 29100 f192dc HeapDestroy 29099->29100 29100->29092 29102 f190c4 29101->29102 29103 f190cd GetProcAddress GetProcAddress GetProcAddress GetProcAddress 29101->29103 29312 f18dc5 63 API calls 2 library calls 29102->29312 29107 f19117 TlsAlloc 29103->29107 29105 f190c9 29105->29060 29108 f19161 TlsSetValue 29107->29108 29109 f191c4 29107->29109 29108->29109 29110 f1916e 29108->29110 29109->29060 29313 f18199 4 API calls 3 library calls 29110->29313 29112 f19173 29314 f18ca4 TlsGetValue 29112->29314 29115 f18ca4 ___crtInitCritSecAndSpinCount 4 API calls 29116 f1918e 29115->29116 29117 f18ca4 ___crtInitCritSecAndSpinCount 4 API calls 29116->29117 29118 f1919e 29117->29118 29119 f18ca4 ___crtInitCritSecAndSpinCount 4 API calls 29118->29119 29120 f191ae 29119->29120 29321 f1d9cb 60 API calls 29120->29321 29122 f191bb 29123 f191bf 29122->29123 29323 f18d1d TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 29122->29323 29322 f18dc5 63 API calls 2 library calls 29123->29322 29126 f191d9 29126->29123 29324 f1e453 60 API calls __calloc_impl 29126->29324 29128 f191f2 29128->29123 29325 f18d1d TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 29128->29325 29130 f1920c 29131 f19213 29130->29131 29132 f1921c 29130->29132 29326 f1a5ab 60 API calls 4 library calls 29131->29326 29327 f18e07 60 API calls 3 library calls 29132->29327 29328 f1aba8 29135->29328 29137 f18a71 GetStartupInfoA 29138 f1e40d ___crtLCMapStringA 60 API calls 29137->29138 29145 f18a92 29138->29145 29139 f18c96 __fcloseall 29139->29064 29140 f18c12 GetStdHandle 29146 f18bdc 29140->29146 29141 f18c78 SetHandleCount 29141->29139 29142 f1e40d ___crtLCMapStringA 60 API calls 29142->29145 29143 f18c24 GetFileType 29143->29146 29144 f18b5e 29144->29146 29147 f18b92 29144->29147 29148 f18b87 GetFileType 29144->29148 29145->29139 29145->29142 29145->29144 29145->29146 29146->29140 29146->29141 29146->29143 29150 f18c3b 29146->29150 29147->29139 29147->29144 29329 f1df24 60 API calls 5 library calls 29147->29329 29148->29144 29148->29147 29150->29139 29150->29146 29330 f1df24 60 API calls 5 library calls 29150->29330 29153 f18966 29152->29153 29154 f18947 GetEnvironmentStringsW 29152->29154 29156 f1894f 29153->29156 29157 f189ff 29153->29157 29155 f1895b GetLastError 29154->29155 29154->29156 29155->29153 29159 f18991 WideCharToMultiByte 29156->29159 29160 f18982 GetEnvironmentStringsW 29156->29160 29158 f18a08 GetEnvironmentStrings 29157->29158 29161 f16fbc 29157->29161 29158->29161 29162 f18a18 29158->29162 29164 f189c5 29159->29164 29165 f189f4 FreeEnvironmentStringsW 29159->29165 29160->29159 29160->29161 29178 f18869 29161->29178 29166 f1b45f ___crtGetEnvironmentStringsA 60 API calls 29162->29166 29167 f1b45f ___crtGetEnvironmentStringsA 60 API calls 29164->29167 29165->29161 29168 f18a32 29166->29168 29169 f189cb 29167->29169 29171 f18a45 29168->29171 29172 f18a39 FreeEnvironmentStringsA 29168->29172 29169->29165 29170 f189d3 WideCharToMultiByte 29169->29170 29173 f189ed 29170->29173 29174 f189e5 29170->29174 29332 f1b730 __VEC_memcpy 29171->29332 29172->29161 29173->29165 29331 f1a5ab 60 API calls 4 library calls 29174->29331 29177 f18a4f FreeEnvironmentStringsA 29177->29161 29179 f18883 GetModuleFileNameA 29178->29179 29180 f1887e 29178->29180 29182 f188aa 29179->29182 29339 f1c140 103 API calls __setmbcp 29180->29339 29333 f18682 29182->29333 29184 f16fc6 29184->29072 29305 f17ec6 60 API calls 3 library calls 29184->29305 29186 f1b45f ___crtGetEnvironmentStringsA 60 API calls 29187 f188ec 29186->29187 29187->29184 29188 f18682 70 API calls 29187->29188 29188->29184 29190 f1858a 29189->29190 29193 f1858f 29189->29193 29342 f1c140 103 API calls __setmbcp 29190->29342 29192 f1e40d ___crtLCMapStringA 60 API calls 29198 f185d8 29192->29198 29193->29192 29194 f16fd7 29193->29194 29194->29076 29306 f17ec6 60 API calls 3 library calls 29194->29306 29195 f18656 29345 f1a5ab 60 API calls 4 library calls 29195->29345 29198->29194 29198->29195 29343 f1c4a1 60 API calls __fclose_nolock 29198->29343 29344 f1a451 5 API calls __fltout2 29198->29344 29201 f17ff8 29200->29201 29346 f1db99 29201->29346 29203 f18016 __initterm_e _doexit 29203->29079 29205 f18521 29204->29205 29208 f18526 29204->29208 29350 f1c140 103 API calls __setmbcp 29205->29350 29207 f16ffa 29210 f14d57 CreateMutexA 29207->29210 29208->29207 29351 f1e2cd 70 API calls x_ismbbtype_l 29208->29351 29211 f15159 EnumWindows 29210->29211 29212 f14d79 GetLastError 29210->29212 29215 f15168 29211->29215 29213 f15150 CloseHandle 29212->29213 29214 f14d8a 29212->29214 29213->29211 29352 f14b1b 29214->29352 29215->29086 29299 f1813b 29215->29299 30241 f18068 29299->30241 29302->29057 29303->29061 29304->29068 29305->29072 29306->29076 29307->29080 29308->29051 29310->29095 29311->29099 29312->29105 29313->29112 29315 f18cdd GetModuleHandleA 29314->29315 29316 f18cbc 29314->29316 29318 f18cd5 29315->29318 29319 f18cec GetProcAddress 29315->29319 29316->29315 29317 f18cc6 TlsGetValue 29316->29317 29320 f18cd1 29317->29320 29318->29115 29319->29318 29320->29315 29320->29318 29321->29122 29322->29109 29323->29126 29324->29128 29325->29130 29326->29123 29327->29109 29328->29137 29329->29147 29330->29150 29331->29173 29332->29177 29335 f186a9 29333->29335 29337 f1872d 29335->29337 29340 f1e2cd 70 API calls x_ismbbtype_l 29335->29340 29336 f1884d 29336->29184 29336->29186 29337->29336 29341 f1e2cd 70 API calls x_ismbbtype_l 29337->29341 29339->29179 29340->29335 29341->29337 29342->29193 29343->29198 29344->29198 29345->29194 29347 f1db9f 29346->29347 29348 f18ca4 ___crtInitCritSecAndSpinCount 4 API calls 29347->29348 29349 f1dbb7 29347->29349 29348->29347 29349->29203 29350->29208 29351->29208 29353 f14b44 29352->29353 29354 f14c47 29352->29354 29353->29354 27084 6d0dd948 27086 6d0dd94f 27084->27086 27085 6d0dd96b 27129 6d0d6391 167 API calls 3 library calls 27085->27129 27086->27085 27112 6d0d6210 27086->27112 27091 6d0ddabd 27094 6d0ddae9 27091->27094 27130 6d0db8f8 197 API calls _strrchr 27091->27130 27093 6d0dd99d CreateFileA 27095 6d0dd9bf GetFileTime 27093->27095 27096 6d0dda96 GetLastError 27093->27096 27131 6d0dfc2e 27094->27131 27098 6d0dd9ef LocalFileTimeToFileTime 27095->27098 27099 6d0dda4b GetLastError 27095->27099 27096->27085 27101 6d0dda35 GetLastError 27098->27101 27102 6d0dda07 SetFileTime 27098->27102 27103 6d0dda5f 27099->27103 27100 6d0de3ae 27101->27103 27105 6d0dda68 CloseHandle 27102->27105 27106 6d0dda20 GetLastError 27102->27106 27127 6d0d6391 167 API calls 3 library calls 27103->27127 27105->27091 27109 6d0dda78 GetLastError 27105->27109 27106->27103 27108 6d0dda65 27108->27105 27128 6d0d6391 167 API calls 3 library calls 27109->27128 27111 6d0dda91 27111->27091 27135 6d0d6028 27112->27135 27117 6d0dfc2e ___ansicp 4 API calls 27118 6d0d6254 27117->27118 27119 6d0d7269 27118->27119 27120 6d0d7293 GetVersionExA 27119->27120 27121 6d0d7288 27119->27121 27122 6d0d72dd 27120->27122 27125 6d0d72b3 27120->27125 27123 6d0dfc2e ___ansicp 4 API calls 27121->27123 27122->27121 27124 6d0d72f5 27123->27124 27124->27091 27124->27093 27125->27122 28021 6d0d7089 182 API calls 27125->28021 27127->27108 27128->27111 27129->27091 27130->27094 27132 6d0dfc38 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 27131->27132 27133 6d0dfc36 27131->27133 27132->27100 27133->27100 27136 6d0d6034 27135->27136 27137 6d0d605a 27136->27137 27169 6d0d5f75 97 API calls _vswprintf_s 27136->27169 27139 6d0d609f 27137->27139 27140 6d0d60c8 GetWindowsDirectoryA 27139->27140 27141 6d0d615f 27139->27141 27143 6d0d60ef 27140->27143 27144 6d0d60df OutputDebugStringA 27140->27144 27141->27144 27174 6d0dfc12 27141->27174 27170 6d0d6064 27143->27170 27168 6d0d61fa 27144->27168 27149 6d0d6183 27177 6d0dfb18 27149->27177 27150 6d0dfc2e ___ansicp 4 API calls 27153 6d0d6209 27150->27153 27152 6d0d611b CreateDirectoryA 27155 6d0d612e GetLastError 27152->27155 27156 6d0d6142 27152->27156 27153->27117 27155->27144 27155->27156 27158 6d0d6064 97 API calls 27156->27158 27158->27141 27160 6d0d619e 27162 6d0d6064 97 API calls 27160->27162 27161 6d0d61c4 27163 6d0d6064 97 API calls 27161->27163 27164 6d0d61bf 27162->27164 27163->27164 27183 6d0df855 27164->27183 27166 6d0d61f4 27216 6d0df7d4 27166->27216 27168->27150 27169->27137 27171 6d0d6070 27170->27171 27172 6d0d6097 27171->27172 27229 6d0d5f75 97 API calls _vswprintf_s 27171->27229 27172->27144 27172->27152 27230 6d0dfb39 27174->27230 27176 6d0d6171 27176->27144 27176->27149 27800 6d0dfa69 27177->27800 27180 6d0dfa48 27814 6d0df9a2 27180->27814 27186 6d0df861 ___crtInitCritSecAndSpinCount 27183->27186 27184 6d0df86f 27848 6d0e33d9 61 API calls __getptd 27184->27848 27186->27184 27188 6d0df935 27186->27188 27850 6d0e35e0 27186->27850 27187 6d0df874 27849 6d0e32d7 5 API calls ___ansicp 27187->27849 27828 6d0e38cd 27188->27828 27193 6d0e35e0 __fileno 61 API calls 27195 6d0df8b9 27193->27195 27194 6d0df94d 27834 6d0e399b 27194->27834 27200 6d0e35e0 __fileno 61 API calls 27195->27200 27210 6d0df8d5 27195->27210 27196 6d0df884 ___crtInitCritSecAndSpinCount 27196->27166 27198 6d0e35e0 __fileno 61 API calls 27201 6d0df8f2 27198->27201 27203 6d0df8c5 27200->27203 27204 6d0df91a 27201->27204 27207 6d0e35e0 __fileno 61 API calls 27201->27207 27206 6d0e35e0 __fileno 61 API calls 27203->27206 27204->27184 27204->27188 27206->27210 27211 6d0df8fe 27207->27211 27209 6d0df971 27857 6d0df995 LeaveCriticalSection LeaveCriticalSection __fcloseall 27209->27857 27210->27184 27210->27198 27211->27204 27213 6d0e35e0 __fileno 61 API calls 27211->27213 27214 6d0df90a 27213->27214 27215 6d0e35e0 __fileno 61 API calls 27214->27215 27215->27204 27217 6d0df7e0 ___crtInitCritSecAndSpinCount 27216->27217 27218 6d0df7f4 27217->27218 27219 6d0df811 27217->27219 27963 6d0e33d9 61 API calls __getptd 27218->27963 27221 6d0e38cd __fcloseall 62 API calls 27219->27221 27227 6d0df809 ___crtInitCritSecAndSpinCount 27219->27227 27223 6d0df829 27221->27223 27222 6d0df7f9 27964 6d0e32d7 5 API calls ___ansicp 27222->27964 27947 6d0df758 27223->27947 27227->27168 27229->27172 27231 6d0dfb45 ___crtInitCritSecAndSpinCount 27230->27231 27232 6d0dfb58 27231->27232 27233 6d0dfb6a 27231->27233 27294 6d0e33d9 61 API calls __getptd 27232->27294 27235 6d0dfb78 27233->27235 27236 6d0dfb9d 27233->27236 27295 6d0e33d9 61 API calls __getptd 27235->27295 27252 6d0e3d12 27236->27252 27239 6d0dfb7d 27296 6d0e32d7 5 API calls ___ansicp 27239->27296 27241 6d0dfba2 27242 6d0dfba9 27241->27242 27243 6d0dfbb6 27241->27243 27297 6d0e33d9 61 API calls __getptd 27242->27297 27245 6d0dfbdd 27243->27245 27246 6d0dfbbd 27243->27246 27272 6d0e3a6b 27245->27272 27298 6d0e33d9 61 API calls __getptd 27246->27298 27250 6d0dfb5d ___crtInitCritSecAndSpinCount @_EH4_CallFilterFunc@8 27250->27176 27253 6d0e3d1e ___crtInitCritSecAndSpinCount 27252->27253 27300 6d0e4a24 27253->27300 27255 6d0e3d99 27307 6d0e3e2f 27255->27307 27256 6d0e3d9d 27341 6d0e40d3 27256->27341 27259 6d0e3e24 ___crtInitCritSecAndSpinCount 27259->27241 27261 6d0e3d2c 27261->27255 27261->27256 27310 6d0e495c 27261->27310 27339 6d0e3907 62 API calls __setmbcp 27261->27339 27340 6d0e396e LeaveCriticalSection LeaveCriticalSection _doexit 27261->27340 27262 6d0e3dbc 27359 6d0e80a8 61 API calls 2 library calls 27262->27359 27266 6d0e3dcc 27267 6d0e3dea EnterCriticalSection 27266->27267 27268 6d0e3dd7 27266->27268 27267->27255 27360 6d0e037b 61 API calls 5 library calls 27268->27360 27271 6d0e3ddf 27271->27255 27273 6d0e3a8d 27272->27273 27274 6d0e3aa1 27273->27274 27284 6d0e3ac0 27273->27284 27384 6d0e33d9 61 API calls __getptd 27274->27384 27276 6d0e3aa6 27385 6d0e32d7 5 API calls ___ansicp 27276->27385 27278 6d0e3cac 27390 6d0e33d9 61 API calls __getptd 27278->27390 27279 6d0e3cc6 27381 6d0e9402 27279->27381 27282 6d0e3cb1 27391 6d0e32d7 5 API calls ___ansicp 27282->27391 27283 6d0dfbe8 27299 6d0dfc03 LeaveCriticalSection LeaveCriticalSection __fcloseall 27283->27299 27284->27278 27293 6d0e3c5c 27284->27293 27386 6d0e97d4 71 API calls __fassign 27284->27386 27287 6d0e3c41 27287->27278 27387 6d0e9648 96 API calls 27287->27387 27289 6d0e3c56 27289->27293 27388 6d0e9648 96 API calls 27289->27388 27291 6d0e3c73 27291->27293 27389 6d0e9648 96 API calls 27291->27389 27293->27278 27293->27279 27294->27250 27295->27239 27296->27250 27297->27250 27298->27250 27299->27250 27301 6d0e4a4c EnterCriticalSection 27300->27301 27302 6d0e4a39 27300->27302 27301->27261 27303 6d0e495c __mtinitlocknum 60 API calls 27302->27303 27304 6d0e4a3f 27303->27304 27304->27301 27361 6d0e0f00 61 API calls 3 library calls 27304->27361 27306 6d0e4a4b 27306->27301 27362 6d0e4940 LeaveCriticalSection 27307->27362 27309 6d0e3e36 27309->27259 27311 6d0e4968 ___crtInitCritSecAndSpinCount 27310->27311 27312 6d0e4978 27311->27312 27313 6d0e4990 27311->27313 27363 6d0e7c80 61 API calls 2 library calls 27312->27363 27316 6d0e40d3 __setmbcp 61 API calls 27313->27316 27319 6d0e499e ___crtInitCritSecAndSpinCount 27313->27319 27315 6d0e497d 27364 6d0e7af6 61 API calls 3 library calls 27315->27364 27318 6d0e49a9 27316->27318 27321 6d0e49bf 27318->27321 27322 6d0e49b0 27318->27322 27319->27261 27320 6d0e4984 27365 6d0e0f5e GetModuleHandleA GetProcAddress ExitProcess ___crtCorExitProcess 27320->27365 27323 6d0e4a24 __setmbcp 61 API calls 27321->27323 27366 6d0e33d9 61 API calls __getptd 27322->27366 27326 6d0e49c6 27323->27326 27328 6d0e49ce 27326->27328 27329 6d0e49fa 27326->27329 27367 6d0e80a8 61 API calls 2 library calls 27328->27367 27370 6d0e037b 61 API calls 5 library calls 27329->27370 27332 6d0e49d9 27338 6d0e49eb 27332->27338 27368 6d0e037b 61 API calls 5 library calls 27332->27368 27333 6d0e4a00 27371 6d0e4a16 LeaveCriticalSection _doexit 27333->27371 27336 6d0e49e5 27369 6d0e33d9 61 API calls __getptd 27336->27369 27338->27333 27339->27261 27340->27261 27342 6d0e4186 27341->27342 27352 6d0e40e5 27341->27352 27379 6d0e41b6 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress ___crtInitCritSecAndSpinCount 27342->27379 27344 6d0e418c 27380 6d0e33d9 61 API calls __getptd 27344->27380 27349 6d0e4142 HeapAlloc 27349->27352 27350 6d0e40f6 27350->27352 27372 6d0e7c80 61 API calls 2 library calls 27350->27372 27373 6d0e7af6 61 API calls 3 library calls 27350->27373 27374 6d0e0f5e GetModuleHandleA GetProcAddress ExitProcess ___crtCorExitProcess 27350->27374 27352->27349 27352->27350 27353 6d0e4172 27352->27353 27356 6d0e4177 27352->27356 27358 6d0e3da7 27352->27358 27375 6d0e407f 61 API calls 3 library calls 27352->27375 27376 6d0e41b6 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress ___crtInitCritSecAndSpinCount 27352->27376 27377 6d0e33d9 61 API calls __getptd 27353->27377 27378 6d0e33d9 61 API calls __getptd 27356->27378 27358->27255 27358->27262 27359->27266 27360->27271 27361->27306 27362->27309 27363->27315 27364->27320 27366->27319 27367->27332 27368->27336 27369->27338 27370->27333 27371->27319 27372->27350 27373->27350 27375->27352 27376->27352 27377->27356 27378->27358 27379->27344 27380->27358 27392 6d0e9345 27381->27392 27383 6d0e941d 27383->27283 27384->27276 27385->27283 27386->27287 27387->27289 27388->27291 27389->27293 27390->27282 27391->27283 27395 6d0e9351 ___crtInitCritSecAndSpinCount 27392->27395 27393 6d0e935d 27479 6d0e33d9 61 API calls __getptd 27393->27479 27395->27393 27397 6d0e938e 27395->27397 27396 6d0e9362 27480 6d0e32d7 5 API calls ___ansicp 27396->27480 27403 6d0e8cf7 27397->27403 27402 6d0e9371 ___crtInitCritSecAndSpinCount 27402->27383 27404 6d0e8d22 27403->27404 27482 6d0eaedb 27404->27482 27407 6d0e8d4d 27488 6d0e0f9d 27407->27488 27412 6d0e8d68 27413 6d0e8d9e 27412->27413 27419 6d0e8e4c 27412->27419 27599 6d0e33f1 61 API calls __getptd 27413->27599 27415 6d0e8da3 27600 6d0e33d9 61 API calls __getptd 27415->27600 27417 6d0e8dad 27601 6d0e32d7 5 API calls ___ansicp 27417->27601 27494 6d0e89c4 27419->27494 27421 6d0e8ef2 27422 6d0e8ef9 27421->27422 27423 6d0e8f10 CreateFileA 27421->27423 27602 6d0e33f1 61 API calls __getptd 27422->27602 27425 6d0e8f6c GetFileType 27423->27425 27426 6d0e8f38 27423->27426 27429 6d0e8f9b 27425->27429 27430 6d0e8f77 CloseHandle 27425->27430 27428 6d0e8f53 GetLastError 27426->27428 27427 6d0e8efe 27603 6d0e33d9 61 API calls __getptd 27427->27603 27604 6d0e3409 61 API calls 3 library calls 27428->27604 27513 6d0e874a 27429->27513 27430->27428 27437 6d0e8dbc 27481 6d0e93cf LeaveCriticalSection __locking 27437->27481 27453 6d0e8f08 27479->27396 27480->27402 27481->27402 27483 6d0eaeea 27482->27483 27484 6d0e8d3e 27482->27484 27659 6d0e33d9 61 API calls __getptd 27483->27659 27484->27407 27597 6d0e32d7 5 API calls ___ansicp 27484->27597 27486 6d0eaeef 27660 6d0e32d7 5 API calls ___ansicp 27486->27660 27489 6d0e0fac 27488->27489 27491 6d0e0fc1 27489->27491 27661 6d0e33d9 61 API calls __getptd 27489->27661 27491->27412 27598 6d0e32d7 5 API calls ___ansicp 27491->27598 27492 6d0e0fb1 27662 6d0e32d7 5 API calls ___ansicp 27492->27662 27495 6d0e89d0 ___crtInitCritSecAndSpinCount 27494->27495 27496 6d0e495c __mtinitlocknum 61 API calls 27495->27496 27497 6d0e89e0 27496->27497 27498 6d0e4a24 __setmbcp 61 API calls 27497->27498 27500 6d0e89e5 ___crtInitCritSecAndSpinCount 27497->27500 27499 6d0e89f4 27498->27499 27502 6d0e8ad3 27499->27502 27504 6d0e4a24 __setmbcp 61 API calls 27499->27504 27505 6d0e8a76 EnterCriticalSection 27499->27505 27511 6d0e8b41 27499->27511 27512 6d0e8a4a 27499->27512 27664 6d0e8a98 LeaveCriticalSection _doexit 27499->27664 27500->27421 27665 6d0e1911 27502->27665 27504->27499 27505->27499 27507 6d0e8a86 LeaveCriticalSection 27505->27507 27507->27499 27684 6d0e8b5f LeaveCriticalSection _doexit 27511->27684 27512->27499 27663 6d0e80a8 61 API calls 2 library calls 27512->27663 27514 6d0e87b1 27513->27514 27516 6d0e8758 27513->27516 27516->27514 27597->27407 27598->27412 27599->27415 27600->27417 27601->27437 27602->27427 27603->27453 27604->27453 27659->27486 27660->27484 27661->27492 27662->27491 27663->27512 27664->27499 27666 6d0e17ee __calloc_impl 61 API calls 27665->27666 27667 6d0e192b 27666->27667 27668 6d0e33d9 _write_string 61 API calls 27667->27668 27671 6d0e194a 27667->27671 27671->27511 27684->27500 27801 6d0dfa7c 27800->27801 27802 6d0dfaf6 27800->27802 27801->27802 27804 6d0dfa81 27801->27804 27812 6d0e33d9 61 API calls __getptd 27802->27812 27806 6d0dfa89 27804->27806 27807 6d0dfa92 GetLocalTime 27804->27807 27805 6d0dfa8e 27813 6d0e32d7 5 API calls ___ansicp 27805->27813 27811 6d0e33d9 61 API calls __getptd 27806->27811 27808 6d0d618c 27807->27808 27808->27180 27811->27805 27812->27805 27813->27808 27815 6d0df9b5 27814->27815 27816 6d0dfa26 27814->27816 27815->27816 27817 6d0df9ba 27815->27817 27826 6d0e33d9 61 API calls __getptd 27816->27826 27819 6d0df9cc GetLocalTime 27817->27819 27820 6d0df9c3 27817->27820 27823 6d0d6195 27819->27823 27825 6d0e33d9 61 API calls __getptd 27820->27825 27821 6d0df9c8 27827 6d0e32d7 5 API calls ___ansicp 27821->27827 27823->27160 27823->27161 27825->27821 27826->27821 27827->27823 27829 6d0e38de 27828->27829 27830 6d0e38f6 EnterCriticalSection 27828->27830 27829->27830 27831 6d0e38e5 27829->27831 27830->27194 27832 6d0e4a24 __setmbcp 61 API calls 27831->27832 27833 6d0e38f3 27832->27833 27833->27194 27835 6d0e35e0 __fileno 61 API calls 27834->27835 27836 6d0e39aa 27835->27836 27858 6d0e844d 27836->27858 27838 6d0df957 27841 6d0e093c 27838->27841 27839 6d0e39b0 27839->27838 27840 6d0e40d3 __setmbcp 61 API calls 27839->27840 27840->27838 27842 6d0df967 27841->27842 27847 6d0e095e _memcpy_s 27841->27847 27856 6d0e3a33 95 API calls __fclose_nolock 27842->27856 27845 6d0e35e0 __fileno 61 API calls 27845->27847 27846 6d0e70d3 __locking 95 API calls 27846->27847 27847->27842 27847->27845 27847->27846 27870 6d0e24a1 27847->27870 27891 6d0e364d 27847->27891 27848->27187 27849->27196 27851 6d0e35ef 27850->27851 27852 6d0df8ad 27850->27852 27945 6d0e33d9 61 API calls __getptd 27851->27945 27852->27193 27852->27210 27854 6d0e35f4 27946 6d0e32d7 5 API calls ___ansicp 27854->27946 27856->27209 27857->27196 27859 6d0e845a 27858->27859 27860 6d0e8469 27858->27860 27867 6d0e33d9 61 API calls __getptd 27859->27867 27865 6d0e848d 27860->27865 27868 6d0e33d9 61 API calls __getptd 27860->27868 27863 6d0e845f 27863->27839 27864 6d0e847d 27869 6d0e32d7 5 API calls ___ansicp 27864->27869 27865->27839 27867->27863 27868->27864 27869->27865 27871 6d0e35e0 __fileno 61 API calls 27870->27871 27872 6d0e24b0 27871->27872 27873 6d0e24bb 27872->27873 27874 6d0e24d2 27872->27874 27932 6d0e33d9 61 API calls __getptd 27873->27932 27876 6d0e24d6 27874->27876 27879 6d0e24e3 27874->27879 27933 6d0e33d9 61 API calls __getptd 27876->27933 27878 6d0e2534 27880 6d0e253e 27878->27880 27881 6d0e25bd 27878->27881 27879->27878 27882 6d0e2529 27879->27882 27883 6d0e844d __locking 61 API calls 27879->27883 27888 6d0e24c0 27879->27888 27885 6d0e2555 27880->27885 27889 6d0e2571 27880->27889 27884 6d0e70d3 __locking 95 API calls 27881->27884 27882->27878 27897 6d0e83f9 27882->27897 27883->27882 27884->27888 27887 6d0e70d3 __locking 95 API calls 27885->27887 27887->27888 27888->27847 27889->27888 27900 6d0e82db 27889->27900 27892 6d0e3666 27891->27892 27896 6d0e3687 27891->27896 27893 6d0e35e0 __fileno 61 API calls 27892->27893 27892->27896 27894 6d0e3680 27893->27894 27895 6d0e70d3 __locking 95 API calls 27894->27895 27895->27896 27896->27847 27898 6d0e1911 ___crtGetStringTypeA 61 API calls 27897->27898 27899 6d0e8410 27898->27899 27899->27878 27932->27888 27933->27888 27945->27854 27946->27852 27948 6d0df76c 27947->27948 27949 6d0df788 27947->27949 28005 6d0e33d9 61 API calls __getptd 27948->28005 27951 6d0e364d __fclose_nolock 95 API calls 27949->27951 27956 6d0df781 27949->27956 27953 6d0df794 27951->27953 27952 6d0df771 28006 6d0e32d7 5 API calls ___ansicp 27952->28006 27966 6d0e3617 27953->27966 27965 6d0df848 LeaveCriticalSection LeaveCriticalSection __fcloseall 27956->27965 27958 6d0e35e0 __fileno 61 API calls 27959 6d0df7a2 27958->27959 27970 6d0e34cf 27959->27970 27963->27222 27964->27227 27965->27227 27967 6d0e3627 27966->27967 27968 6d0df79c 27966->27968 27967->27968 28008 6d0e037b 61 API calls 5 library calls 27967->28008 27968->27958 27971 6d0e34db ___crtInitCritSecAndSpinCount 27970->27971 27972 6d0e34ff 27971->27972 27973 6d0e34e5 27971->27973 27975 6d0e3519 27972->27975 27976 6d0e3504 27972->27976 28009 6d0e33d9 61 API calls __getptd 27973->28009 28005->27952 28006->27956 28008->27968 28021->27122 30273 6d0df250 30274 6d0df351 30273->30274 30275 6d0df273 GetVersionExA 30273->30275 30276 6d0df38c 30274->30276 30277 6d0df357 30274->30277 30278 6d0df28e 30275->30278 30279 6d0df295 30275->30279 30280 6d0df3dd 30276->30280 30281 6d0df391 30276->30281 30277->30278 30283 6d0df376 30277->30283 30440 6d0e1190 61 API calls _doexit 30277->30440 30284 6d0dfc2e ___ansicp 4 API calls 30278->30284 30325 6d0e2139 HeapCreate 30279->30325 30280->30278 30448 6d0e15f7 73 API calls 2 library calls 30280->30448 30444 6d0e12dd 6 API calls ___crtInitCritSecAndSpinCount 30281->30444 30283->30278 30441 6d0e1b96 62 API calls __setmbcp 30283->30441 30290 6d0df3f8 30284->30290 30287 6d0df396 30291 6d0e1911 ___crtGetStringTypeA 61 API calls 30287->30291 30288 6d0df2e7 30288->30278 30335 6d0e166a GetModuleHandleA 30288->30335 30293 6d0df3a2 30291->30293 30293->30278 30296 6d0df3ae 30293->30296 30295 6d0df380 30442 6d0e130c 64 API calls 2 library calls 30295->30442 30445 6d0e1264 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 30296->30445 30297 6d0df2f1 30300 6d0df2fc GetCommandLineA 30297->30300 30318 6d0df2f5 30297->30318 30369 6d0e1f9b 30300->30369 30301 6d0df385 30443 6d0e219e VirtualFree HeapFree HeapFree HeapDestroy 30301->30443 30306 6d0df3c0 30308 6d0df3c7 30306->30308 30309 6d0df3d1 30306->30309 30446 6d0e134e 61 API calls 4 library calls 30308->30446 30447 6d0e037b 61 API calls 5 library calls 30309->30447 30310 6d0df316 30311 6d0df31a 30310->30311 30411 6d0e1edb 30310->30411 30438 6d0e130c 64 API calls 2 library calls 30311->30438 30316 6d0df3ce 30316->30278 30317 6d0df3d7 30317->30278 30437 6d0e219e VirtualFree HeapFree HeapFree HeapDestroy 30318->30437 30320 6d0df33a 30320->30278 30439 6d0e1b96 62 API calls __setmbcp 30320->30439 30326 6d0e215d 30325->30326 30327 6d0e2161 30325->30327 30326->30288 30449 6d0e20d7 61 API calls 3 library calls 30327->30449 30329 6d0e2166 30330 6d0e2194 30329->30330 30331 6d0e2170 30329->30331 30330->30288 30450 6d0e4a5c HeapAlloc 30331->30450 30333 6d0e217a 30333->30330 30334 6d0e217f HeapDestroy 30333->30334 30334->30326 30336 6d0e167e 30335->30336 30337 6d0e1687 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 30335->30337 30451 6d0e130c 64 API calls 2 library calls 30336->30451 30341 6d0e16d1 TlsAlloc 30337->30341 30340 6d0e1683 30340->30297 30342 6d0e177e 30341->30342 30343 6d0e171b TlsSetValue 30341->30343 30342->30297 30343->30342 30344 6d0e1728 30343->30344 30452 6d0e11a4 4 API calls 3 library calls 30344->30452 30346 6d0e172d 30453 6d0e11eb TlsGetValue 30346->30453 30349 6d0e11eb ___crtInitCritSecAndSpinCount 4 API calls 30350 6d0e1748 30349->30350 30351 6d0e11eb ___crtInitCritSecAndSpinCount 4 API calls 30350->30351 30352 6d0e1758 30351->30352 30353 6d0e11eb ___crtInitCritSecAndSpinCount 4 API calls 30352->30353 30354 6d0e1768 30353->30354 30460 6d0e488e 61 API calls 30354->30460 30356 6d0e1775 30357 6d0e1779 30356->30357 30462 6d0e1264 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 30356->30462 30461 6d0e130c 64 API calls 2 library calls 30357->30461 30360 6d0e1793 30360->30357 30463 6d0e818b 61 API calls __calloc_impl 30360->30463 30362 6d0e17ac 30362->30357 30464 6d0e1264 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress 30362->30464 30364 6d0e17c6 30365 6d0e17cd 30364->30365 30366 6d0e17d6 30364->30366 30465 6d0e037b 61 API calls 5 library calls 30365->30465 30466 6d0e134e 61 API calls 4 library calls 30366->30466 30370 6d0e1fb9 GetEnvironmentStringsW 30369->30370 30376 6d0e1fd8 30369->30376 30371 6d0e1fc1 30370->30371 30372 6d0e1fcd GetLastError 30370->30372 30373 6d0e1ff4 GetEnvironmentStringsW 30371->30373 30379 6d0e2003 30371->30379 30372->30376 30377 6d0df30c 30373->30377 30373->30379 30374 6d0e207a GetEnvironmentStrings 30374->30377 30378 6d0e208a 30374->30378 30375 6d0e2071 30375->30374 30375->30377 30376->30371 30376->30375 30394 6d0e1957 30377->30394 30383 6d0e40d3 __setmbcp 61 API calls 30378->30383 30379->30379 30380 6d0e2018 WideCharToMultiByte 30379->30380 30381 6d0e2066 FreeEnvironmentStringsW 30380->30381 30382 6d0e2037 30380->30382 30381->30377 30384 6d0e40d3 __setmbcp 61 API calls 30382->30384 30385 6d0e20a4 30383->30385 30386 6d0e203d 30384->30386 30387 6d0e20ab FreeEnvironmentStringsA 30385->30387 30388 6d0e20b7 _memcpy_s 30385->30388 30386->30381 30389 6d0e2045 WideCharToMultiByte 30386->30389 30387->30377 30392 6d0e20c1 FreeEnvironmentStringsA 30388->30392 30390 6d0e2057 30389->30390 30391 6d0e205f 30389->30391 30467 6d0e037b 61 API calls 5 library calls 30390->30467 30391->30381 30392->30377 30468 6d0e22a4 30394->30468 30396 6d0e1963 GetStartupInfoA 30397 6d0e1911 ___crtGetStringTypeA 61 API calls 30396->30397 30405 6d0e1984 30397->30405 30398 6d0e1b88 ___crtInitCritSecAndSpinCount 30398->30310 30399 6d0e1b04 GetStdHandle 30404 6d0e1ace 30399->30404 30400 6d0e1911 ___crtGetStringTypeA 61 API calls 30400->30405 30401 6d0e1b6a SetHandleCount 30401->30398 30402 6d0e1b16 GetFileType 30402->30404 30403 6d0e1a50 30403->30404 30406 6d0e1a79 GetFileType 30403->30406 30407 6d0e1a84 30403->30407 30404->30399 30404->30401 30404->30402 30410 6d0e1b2d 30404->30410 30405->30398 30405->30400 30405->30403 30405->30404 30406->30403 30406->30407 30407->30398 30407->30403 30469 6d0e80a8 61 API calls 2 library calls 30407->30469 30410->30398 30410->30404 30470 6d0e80a8 61 API calls 2 library calls 30410->30470 30412 6d0e1ef5 GetModuleFileNameA 30411->30412 30413 6d0e1ef0 30411->30413 30415 6d0e1f1c 30412->30415 30477 6d0e5c37 104 API calls __setmbcp 30413->30477 30471 6d0e1cf4 30415->30471 30417 6d0df326 30417->30320 30422 6d0e1be9 30417->30422 30419 6d0e40d3 __setmbcp 61 API calls 30420 6d0e1f5e 30419->30420 30420->30417 30421 6d0e1cf4 71 API calls 30420->30421 30421->30417 30423 6d0e1bfc 30422->30423 30426 6d0e1c01 30422->30426 30480 6d0e5c37 104 API calls __setmbcp 30423->30480 30425 6d0df32f 30425->30320 30433 6d0e1024 30425->30433 30426->30425 30426->30426 30427 6d0e1911 ___crtGetStringTypeA 61 API calls 30426->30427 30431 6d0e1c4a 30427->30431 30428 6d0e1cc8 30483 6d0e037b 61 API calls 5 library calls 30428->30483 30431->30425 30431->30428 30481 6d0e5f98 61 API calls 2 library calls 30431->30481 30482 6d0e32d7 5 API calls ___ansicp 30431->30482 30434 6d0e1032 30433->30434 30484 6d0e7cbe 30434->30484 30436 6d0e1050 __initterm_e _doexit 30436->30320 30437->30278 30438->30318 30439->30311 30440->30283 30441->30295 30442->30301 30443->30278 30444->30287 30445->30306 30446->30316 30447->30317 30448->30278 30449->30329 30450->30333 30451->30340 30452->30346 30454 6d0e1224 GetModuleHandleA 30453->30454 30455 6d0e1203 30453->30455 30456 6d0e121c 30454->30456 30457 6d0e1233 GetProcAddress 30454->30457 30455->30454 30458 6d0e120d TlsGetValue 30455->30458 30456->30349 30457->30456 30459 6d0e1218 30458->30459 30459->30454 30459->30456 30460->30356 30461->30342 30462->30360 30463->30362 30464->30364 30465->30357 30466->30342 30467->30391 30468->30396 30469->30407 30470->30410 30474 6d0e1d1b 30471->30474 30473 6d0e1ebf 30473->30417 30473->30419 30476 6d0e1d9f 30474->30476 30478 6d0e8234 71 API calls x_ismbbtype_l 30474->30478 30476->30473 30479 6d0e8234 71 API calls x_ismbbtype_l 30476->30479 30477->30412 30478->30474 30479->30476 30480->30426 30481->30431 30482->30431 30483->30425 30485 6d0e7cc4 30484->30485 30486 6d0e11eb ___crtInitCritSecAndSpinCount 4 API calls 30485->30486 30487 6d0e7cdc 30485->30487 30486->30485 30487->30436 30488 6d0de873 30619 6d0db23f 30488->30619 30491 6d0d6210 160 API calls 30492 6d0de8ad 30491->30492 30493 6d0d6210 160 API calls 30492->30493 30494 6d0de8c3 30493->30494 30650 6d0dac14 30494->30650 30497 6d0de8ec RegOpenKeyExA 30500 6d0de967 30497->30500 30501 6d0de90a RegQueryValueExA 30497->30501 30498 6d0de8d4 30859 6d0d93df 173 API calls ___ansicp 30498->30859 30860 6d0d6391 167 API calls 3 library calls 30500->30860 30503 6d0de944 30501->30503 30504 6d0de957 RegCloseKey 30501->30504 30502 6d0de8d9 30502->30497 30513 6d0de8dd 30502->30513 30507 6d0d6210 160 API calls 30503->30507 30504->30500 30505 6d0de991 30504->30505 30508 6d0d6210 160 API calls 30505->30508 30510 6d0de94f 30507->30510 30512 6d0de9ab 30508->30512 30509 6d0dea51 30511 6d0deceb 30509->30511 30509->30513 30514 6d0deaa7 30509->30514 30510->30504 30515 6d0dedbb 30511->30515 30517 6d0ded08 RegOpenKeyExA 30511->30517 30516 6d0db5f6 197 API calls 30512->30516 30513->30509 30894 6d0d85ae 30513->30894 30657 6d0d72fc 30514->30657 30518 6d0d6210 160 API calls 30515->30518 30519 6d0de9c2 30516->30519 30521 6d0ded29 RegDeleteValueA 30517->30521 30522 6d0ded8d 30517->30522 30523 6d0dede0 30518->30523 30861 6d0d8c66 30519->30861 30527 6d0ded6c 30521->30527 30528 6d0ded3e 30521->30528 30903 6d0d6391 167 API calls 3 library calls 30522->30903 30820 6d0db5f6 30523->30820 30538 6d0d6210 160 API calls 30527->30538 30536 6d0ded7d RegCloseKey 30528->30536 30902 6d0d6391 167 API calls 3 library calls 30528->30902 30531 6d0dec69 30534 6d0d91c4 293 API calls 30531->30534 30532 6d0deac0 30539 6d0deac8 30532->30539 30540 6d0debb1 30532->30540 30541 6d0dec7e 30534->30541 30536->30515 30536->30522 30545 6d0ded67 30538->30545 30552 6d0deafc 30539->30552 30675 6d0d91c4 30539->30675 30702 6d0db4e4 30540->30702 30541->30552 30566 6d0d91c4 293 API calls 30541->30566 30544 6d0dee17 30556 6d0dee1e DestroyWindow 30544->30556 30557 6d0dee54 30544->30557 30545->30536 30546 6d0deb2d 30899 6d0daad4 187 API calls ___ansicp 30546->30899 30547 6d0de9d7 30567 6d0d6210 160 API calls 30547->30567 30548 6d0dea09 30892 6d0d8484 187 API calls ___ansicp 30548->30892 30549 6d0deb47 30900 6d0dab73 187 API calls ___ansicp 30549->30900 30550 6d0dea3a 30893 6d0da978 187 API calls ___ansicp 30550->30893 30551 6d0deb13 30898 6d0daa25 187 API calls ___ansicp 30551->30898 30562 6d0db5f6 197 API calls 30552->30562 30555 6d0d72fc 196 API calls 30555->30544 30568 6d0dee29 GetLastError 30556->30568 30569 6d0dee4e 30556->30569 30847 6d0da365 30557->30847 30562->30511 30565 6d0deb4c 30575 6d0dea0e 30565->30575 30576 6d0dea47 30565->30576 30610 6d0dec4c 30566->30610 30567->30509 30904 6d0d6391 167 API calls 3 library calls 30568->30904 30569->30557 30572 6d0deb18 30572->30575 30572->30576 30573 6d0dea3f 30573->30575 30573->30576 30574 6d0deb32 30574->30575 30574->30576 30575->30547 30591 6d0d6210 160 API calls 30576->30591 30578 6d0debdf 30587 6d0debf4 30578->30587 30724 6d0dcec8 30578->30724 30579 6d0debc9 30585 6d0d6210 160 API calls 30579->30585 30581 6d0deaf2 30584 6d0d6210 160 API calls 30581->30584 30583 6d0deca1 30592 6d0d6210 160 API calls 30583->30592 30584->30552 30585->30552 30586 6d0dee67 30588 6d0d85ae CharNextA 30586->30588 30587->30552 30814 6d0d9ca1 30587->30814 30595 6d0dee73 30588->30595 30591->30509 30592->30552 30905 6d0da5d2 184 API calls 2 library calls 30595->30905 30598 6d0deecf 30855 6d0d6be5 30598->30855 30600 6d0dee84 30602 6d0deeaf 30600->30602 30603 6d0dee88 30600->30603 30601 6d0d91c4 293 API calls 30604 6d0dec2f 30601->30604 30604->30552 30609 6d0d91c4 293 API calls 30604->30609 30609->30610 30610->30583 30613 6d0deb9b 30610->30613 30611 6d0def20 30612 6d0d6210 160 API calls 30611->30612 30901 6d0d6391 167 API calls 3 library calls 30613->30901 30909 6d0d6c43 30619->30909 30622 6d0db27c 30914 6d0d6391 167 API calls 3 library calls 30622->30914 30623 6d0db2a1 FindFirstFileA 30625 6d0db2ba GetLastError 30623->30625 30626 6d0db2e3 FindClose 30623->30626 30915 6d0d6391 167 API calls 3 library calls 30625->30915 30628 6d0db48b 30626->30628 30642 6d0db2fb _strnlen 30626->30642 30629 6d0dfc12 151 API calls 30628->30629 30632 6d0db49f 30629->30632 30631 6d0dfc2e ___ansicp 4 API calls 30633 6d0db4dd 30631->30633 30634 6d0df855 97 API calls 30632->30634 30635 6d0db299 30632->30635 30633->30491 30637 6d0db4b2 30634->30637 30635->30631 30636 6d0db42f 30923 6d0d6391 167 API calls 3 library calls 30636->30923 30638 6d0df7d4 __fcloseall 100 API calls 30637->30638 30638->30635 30641 6d0df7d4 __fcloseall 100 API calls 30641->30642 30642->30628 30642->30636 30642->30641 30643 6d0dfc12 151 API calls 30642->30643 30648 6d0db3c6 30642->30648 30916 6d0dfc92 30642->30916 30921 6d0e0d4a 75 API calls __fread_nolock 30642->30921 30643->30642 30645 6d0df7d4 __fcloseall 100 API calls 30646 6d0db3e3 FindFirstFileA 30645->30646 30646->30628 30647 6d0db403 FindClose 30646->30647 30647->30648 30648->30642 30648->30645 30649 6d0db42d 30648->30649 30922 6d0e0a5d 97 API calls 4 library calls 30648->30922 30649->30628 30926 6d0d71e9 30650->30926 30653 6d0dac2b 30653->30497 30653->30498 30658 6d0d71e9 183 API calls 30657->30658 30659 6d0d731a 30658->30659 30660 6d0d7269 183 API calls 30659->30660 30666 6d0d73ff 30659->30666 30662 6d0d7327 30660->30662 30661 6d0dfc2e ___ansicp 4 API calls 30663 6d0d7412 30661->30663 30664 6d0d73bc 30662->30664 30665 6d0d7338 30662->30665 30662->30666 30663->30531 30663->30532 30664->30666 30668 6d0d69f7 175 API calls 30664->30668 30665->30666 31023 6d0d69f7 30665->31023 30666->30661 30673 6d0d7398 30668->30673 30670 6d0d7351 LoadStringA 30671 6d0d7377 GetLastError 30670->30671 30670->30673 31042 6d0d6391 167 API calls 3 library calls 30671->31042 30673->30666 31035 6d0d6b07 30673->31035 30676 6d0d91f0 30675->30676 30677 6d0d921c 30676->30677 30678 6d0dcec8 232 API calls 30676->30678 30701 6d0d91f5 30676->30701 30681 6d0d9253 30677->30681 30682 6d0d9395 30677->30682 30677->30701 30678->30677 30679 6d0dfc2e ___ansicp 4 API calls 30680 6d0d93d6 30679->30680 30680->30581 30680->30613 30684 6d0d85ae CharNextA 30681->30684 31127 6d0d6391 167 API calls 3 library calls 30682->31127 30685 6d0d926d 30684->30685 30686 6d0d85ae CharNextA 30685->30686 30687 6d0d9279 30686->30687 31047 6d0d8ee0 30687->31047 30690 6d0d934b GetLastError 30691 6d0d9357 30690->30691 30690->30701 31126 6d0d6391 167 API calls 3 library calls 30691->31126 30693 6d0d92a6 31113 6d0d8e56 30693->31113 30694 6d0d9290 30694->30693 30695 6d0db5f6 197 API calls 30694->30695 30695->30693 30701->30679 30703 6d0db507 GetVersionExA 30702->30703 30717 6d0db54a 30702->30717 30704 6d0db552 30703->30704 30709 6d0db527 30703->30709 30708 6d0dfc92 61 API calls 30704->30708 30705 6d0dfc2e ___ansicp 4 API calls 30707 6d0db5ef 30705->30707 30706 6d0db540 30710 6d0d6210 160 API calls 30706->30710 30707->30552 30707->30578 30707->30579 30711 6d0db55d 30708->30711 30709->30704 30709->30706 30710->30717 30712 6d0db569 30711->30712 31276 6d0da211 173 API calls 30711->31276 30714 6d0db5bc 30712->30714 30716 6d0db578 30712->30716 31277 6d0d6391 167 API calls 3 library calls 30714->31277 30718 6d0d85e5 169 API calls 30716->30718 30717->30705 30719 6d0db58c 30718->30719 30720 6d0db5ad 30719->30720 30721 6d0db59d 30719->30721 30723 6d0d6210 160 API calls 30720->30723 30722 6d0d6210 160 API calls 30721->30722 30722->30717 30723->30717 30725 6d0dcf00 30724->30725 30726 6d0d7269 183 API calls 30725->30726 30727 6d0dcf05 30726->30727 30728 6d0dcf40 30727->30728 31319 6d0dac39 174 API calls 2 library calls 30727->31319 30729 6d0dcf5d GetModuleHandleA 30728->30729 30733 6d0dcf4d 30728->30733 31278 6d0d9a79 GetModuleFileNameA 30729->31278 30732 6d0dcf16 30732->30728 30734 6d0dcf1a 30732->30734 30736 6d0d85ae CharNextA 30733->30736 30737 6d0dcf35 30733->30737 31320 6d0d6391 167 API calls 3 library calls 30734->31320 30738 6d0dcf80 30736->30738 30739 6d0dfc2e ___ansicp 4 API calls 30737->30739 31288 6d0da078 30738->31288 30741 6d0dd3a7 30739->30741 30741->30587 30742 6d0dcf87 30780 6d0dcf8b 30742->30780 31292 6d0da303 30742->31292 31324 6d0d6391 167 API calls 3 library calls 30780->31324 30815 6d0d9cbc 30814->30815 30816 6d0d9cac 30814->30816 30815->30552 30815->30601 31331 6d0d99e4 30816->31331 30819 6d0d6210 160 API calls 30819->30815 30821 6d0db63d 30820->30821 30822 6d0db64a 30821->30822 30823 6d0db642 30821->30823 31397 6d0d9d7d 30822->31397 31422 6d0db8f8 197 API calls _strrchr 30823->31422 30829 6d0db68f 30831 6d0db6da 30829->30831 30832 6d0db69f SetFocus 30829->30832 30830 6d0db6f1 30830->30831 30834 6d0db708 30830->30834 30835 6d0db792 30830->30835 30833 6d0dfc2e ___ansicp 4 API calls 30831->30833 30832->30831 30836 6d0db6aa GetLastError 30832->30836 30837 6d0db6ed 30833->30837 30838 6d0db70d CreateDialogParamA 30834->30838 30839 6d0db735 30834->30839 31424 6d0d9cd8 169 API calls 30835->31424 30836->30831 30840 6d0db6b4 30836->30840 30837->30544 30837->30555 30838->30839 30842 6d0db73c GetLastError 30839->30842 30843 6d0db758 SetDlgItemTextA 30839->30843 30840->30831 31423 6d0d6391 167 API calls 3 library calls 30840->31423 30842->30840 30843->30831 30845 6d0db772 GetLastError 30843->30845 30844 6d0db7aa MessageBoxA 30844->30831 30845->30840 30850 6d0da381 30847->30850 30854 6d0da3b6 30847->30854 30848 6d0dfc2e ___ansicp 4 API calls 30849 6d0da3c5 30848->30849 30849->30586 30849->30598 30851 6d0d85ae CharNextA 30850->30851 30850->30854 30852 6d0da3aa 30851->30852 31428 6d0d9f49 GetFileAttributesA 30852->31428 30854->30848 30856 6d0d6bf3 30855->30856 30858 6d0d6c1d 30856->30858 31444 6d0df736 97 API calls _vswprintf_s 30856->31444 30858->30611 30907 6d0dd3b0 180 API calls ___ansicp 30858->30907 30859->30502 30860->30505 30862 6d0d7269 183 API calls 30861->30862 30863 6d0d8c71 30862->30863 30877 6d0d8c75 30863->30877 31445 6d0d8be6 30863->31445 30867 6d0d8d1d 30867->30509 30867->30546 30867->30547 30867->30548 30867->30549 30867->30550 30867->30551 30868 6d0d71e9 183 API calls 30869 6d0d8c92 30868->30869 30870 6d0d70ae 188 API calls 30869->30870 30869->30877 30871 6d0d8ca0 30870->30871 30872 6d0d8ca4 30871->30872 30873 6d0d8cb7 30871->30873 31499 6d0d895f 187 API calls ___ansicp 30872->31499 31453 6d0d88b4 30873->31453 30877->30867 31488 6d0d874e 30877->31488 30878 6d0d8cc0 31500 6d0d8a07 187 API calls ___ansicp 30878->31500 30879 6d0d8cd3 30881 6d0d7157 186 API calls 30879->30881 30882 6d0d8cd8 30881->30882 30882->30877 31467 6d0d8ab1 30882->31467 30891 6d0d8ca9 30891->30867 30891->30877 30892->30575 30893->30573 30895 6d0d85cc 30894->30895 30896 6d0d85be CharNextA 30894->30896 30897 6d0da3ce 177 API calls ___ansicp 30895->30897 30896->30895 30896->30896 30897->30514 30898->30572 30899->30574 30900->30565 30901->30552 30902->30545 30903->30515 30904->30569 30905->30600 30907->30611 30910 6d0d6be5 97 API calls 30909->30910 30912 6d0d6c60 30910->30912 30911 6d0d6c83 30911->30622 30911->30623 30912->30911 30924 6d0d6391 167 API calls 3 library calls 30912->30924 30914->30635 30915->30635 30918 6d0dfc9a 30916->30918 30917 6d0e40d3 __setmbcp 61 API calls 30917->30918 30918->30917 30919 6d0dfcb6 30918->30919 30925 6d0e41b6 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress ___crtInitCritSecAndSpinCount 30918->30925 30919->30642 30921->30642 30922->30648 30923->30628 30924->30911 30925->30918 30927 6d0d7208 30926->30927 30928 6d0d7213 GetVersionExA 30926->30928 30931 6d0dfc2e ___ansicp 4 API calls 30927->30931 30929 6d0d724a 30928->30929 30930 6d0d7233 30928->30930 30929->30927 30930->30929 30962 6d0d7089 182 API calls 30930->30962 30932 6d0d7262 30931->30932 30932->30653 30934 6d0d70ae 30932->30934 30935 6d0d70d8 GetVersionExA 30934->30935 30936 6d0d70cd 30934->30936 30937 6d0d7126 30935->30937 30943 6d0d70f8 30935->30943 30939 6d0dfc2e ___ansicp 4 API calls 30936->30939 30942 6d0d7133 30937->30942 30987 6d0d6dab 30937->30987 30941 6d0d7150 30939->30941 30941->30653 30949 6d0d7157 30941->30949 30999 6d0d691d 9 API calls ___ansicp 30942->30999 30943->30937 30963 6d0d6eaf 30943->30963 30946 6d0d7138 30946->30936 30950 6d0d7181 GetVersionExA 30949->30950 30959 6d0d7176 30949->30959 30951 6d0d71b8 30950->30951 30952 6d0d71a1 30950->30952 30954 6d0d6eaf 178 API calls 30951->30954 30958 6d0d71c5 30951->30958 30952->30951 30957 6d0d6f9c 178 API calls 30952->30957 30953 6d0dfc2e ___ansicp 4 API calls 30955 6d0d71e2 30953->30955 30956 6d0d71c1 30954->30956 30955->30653 30956->30958 30956->30959 30957->30951 31022 6d0d691d 9 API calls ___ansicp 30958->31022 30959->30953 30961 6d0d71ca 30961->30959 30962->30929 30964 6d0d6edc GetSystemDirectoryA 30963->30964 30965 6d0d6ece 30963->30965 30966 6d0d6f5b GetLastError 30964->30966 30967 6d0d6ef5 30964->30967 30969 6d0dfc2e ___ansicp 4 API calls 30965->30969 30974 6d0d6f2c 30966->30974 31000 6d0d6cec 30967->31000 30970 6d0d6f95 30969->30970 30970->30937 30975 6d0d6f9c 30970->30975 30972 6d0d6f07 30972->30965 31014 6d0d6872 174 API calls 2 library calls 30972->31014 30974->30965 31015 6d0d6391 167 API calls 3 library calls 30974->31015 30976 6d0d6fc9 GetSystemDirectoryA 30975->30976 30977 6d0d6fbb 30975->30977 30978 6d0d7048 GetLastError 30976->30978 30979 6d0d6fe2 30976->30979 30981 6d0dfc2e ___ansicp 4 API calls 30977->30981 30982 6d0d7019 30978->30982 30980 6d0d6cec 169 API calls 30979->30980 30985 6d0d6ff4 30980->30985 30983 6d0d7082 30981->30983 30982->30977 31019 6d0d6391 167 API calls 3 library calls 30982->31019 30983->30937 30985->30977 31018 6d0d6872 174 API calls 2 library calls 30985->31018 30988 6d0d6dd8 GetSystemDirectoryA 30987->30988 30989 6d0d6dca 30987->30989 30990 6d0d6e6e GetLastError 30988->30990 30991 6d0d6df1 30988->30991 30994 6d0dfc2e ___ansicp 4 API calls 30989->30994 30992 6d0d6e2c 30990->30992 30993 6d0d6cec 169 API calls 30991->30993 30992->30989 31021 6d0d6391 167 API calls 3 library calls 30992->31021 30997 6d0d6e03 30993->30997 30996 6d0d6ea8 30994->30996 30996->30936 30996->30942 30997->30989 31020 6d0d6872 174 API calls 2 library calls 30997->31020 30999->30946 31001 6d0d6d14 31000->31001 31002 6d0d6d51 31000->31002 31003 6d0d6c43 167 API calls 31001->31003 31005 6d0d6d81 FindFirstFileA 31002->31005 31006 6d0d6d60 31002->31006 31004 6d0d6d1b 31003->31004 31004->31005 31007 6d0d6d1f 31004->31007 31009 6d0d6d3c 31005->31009 31010 6d0d6d9a FindClose 31005->31010 31017 6d0d6391 167 API calls 3 library calls 31006->31017 31016 6d0d6391 167 API calls 3 library calls 31007->31016 31012 6d0dfc2e ___ansicp 4 API calls 31009->31012 31010->31009 31013 6d0d6d4d 31012->31013 31013->30972 31014->30974 31015->30965 31016->31009 31017->31009 31018->30982 31019->30977 31020->30992 31021->30989 31022->30961 31024 6d0d6a0b 31023->31024 31025 6d0d6a13 LoadLibraryA 31023->31025 31024->30666 31024->30670 31026 6d0d6a2e GetProcAddress GetProcAddress GetProcAddress 31025->31026 31027 6d0d6ad4 GetLastError 31025->31027 31029 6d0d6a7c GetLastError 31026->31029 31031 6d0d6a67 31026->31031 31045 6d0d6391 167 API calls 3 library calls 31027->31045 31043 6d0d6391 167 API calls 3 library calls 31029->31043 31031->31024 31031->31029 31032 6d0d6aa3 FreeLibrary 31032->31024 31033 6d0d6ab6 GetLastError 31032->31033 31044 6d0d6391 167 API calls 3 library calls 31033->31044 31036 6d0d6b42 31035->31036 31037 6d0d6b10 FreeLibrary 31035->31037 31036->30666 31037->31036 31038 6d0d6b1b GetLastError 31037->31038 31038->31036 31039 6d0d6b25 31038->31039 31046 6d0d6391 167 API calls 3 library calls 31039->31046 31041 6d0d6b3e 31041->30666 31042->30673 31043->31032 31044->31024 31045->31024 31046->31041 31048 6d0d8f2d 31047->31048 31049 6d0d8f13 31047->31049 31050 6d0d6cec 169 API calls 31048->31050 31051 6d0dcec8 232 API calls 31049->31051 31052 6d0d8f46 31050->31052 31053 6d0d8f1a 31051->31053 31054 6d0d8f4e 31052->31054 31055 6d0d913b 31052->31055 31053->31048 31056 6d0d8f1e SetLastError 31053->31056 31057 6d0d6cec 169 API calls 31054->31057 31058 6d0d6210 160 API calls 31055->31058 31059 6d0d9170 31056->31059 31061 6d0d8f55 31057->31061 31062 6d0d9147 31058->31062 31060 6d0dfc2e ___ansicp 4 API calls 31059->31060 31063 6d0d91bb 31060->31063 31064 6d0d90c8 31061->31064 31066 6d0d6cec 169 API calls 31061->31066 31065 6d0dfc92 61 API calls 31062->31065 31063->30690 31063->30694 31067 6d0d6210 160 API calls 31064->31067 31078 6d0d90de 31065->31078 31068 6d0d8f69 31066->31068 31069 6d0d90d4 31067->31069 31071 6d0d8f90 31068->31071 31073 6d0d6cec 169 API calls 31068->31073 31072 6d0dfc92 61 API calls 31069->31072 31070 6d0d9160 31070->31059 31210 6d0d6391 167 API calls 3 library calls 31070->31210 31075 6d0d6c43 167 API calls 31071->31075 31072->31078 31077 6d0d8f7a 31073->31077 31079 6d0d8fa7 31075->31079 31077->31071 31081 6d0d8f7e 31077->31081 31078->31070 31178 6d0d8d2e 31078->31178 31082 6d0d8fad 31079->31082 31083 6d0d8fdf 31079->31083 31080 6d0d918f 31085 6d0d85e5 169 API calls 31080->31085 31108 6d0d8f88 31080->31108 31084 6d0d6210 160 API calls 31081->31084 31084->31108 31085->31108 31114 6d0d8c66 205 API calls 31113->31114 31115 6d0d8e5e 31114->31115 31126->30701 31127->30701 31179 6d0d6c43 167 API calls 31178->31179 31180 6d0d8d62 31179->31180 31181 6d0d8d76 31180->31181 31182 6d0d8d66 31180->31182 31210->31080 31276->30712 31277->30717 31279 6d0d9aae GetLastError 31278->31279 31280 6d0d9ad6 GetShortPathNameA 31278->31280 31281 6d0d9ac5 31279->31281 31283 6d0d9aec _strnlen 31280->31283 31328 6d0d6391 167 API calls 3 library calls 31281->31328 31284 6d0d9afe GetLastError 31283->31284 31287 6d0d9acf _strnlen 31283->31287 31284->31281 31285 6d0dfc2e ___ansicp 4 API calls 31286 6d0d9b5a 31285->31286 31286->30733 31287->31285 31289 6d0da08a 31288->31289 31291 6d0da0a3 31288->31291 31290 6d0da095 CharNextA 31289->31290 31289->31291 31290->31290 31290->31291 31291->30742 31293 6d0d6b4f 31292->31293 31294 6d0da32c CharLowerA 31293->31294 31295 6d0da34a 31294->31295 31296 6d0dfc2e ___ansicp 4 API calls 31295->31296 31319->30732 31320->30737 31324->30737 31328->31287 31332 6d0d9a04 31331->31332 31334 6d0d99f9 31331->31334 31335 6d0d95fd LoadLibraryA 31332->31335 31334->30815 31334->30819 31336 6d0d997a GetLastError 31335->31336 31337 6d0d9640 GetProcAddress 31335->31337 31338 6d0d99be 31336->31338 31339 6d0d9987 31336->31339 31340 6d0d965d 31337->31340 31341 6d0d984e GetProcAddress 31337->31341 31342 6d0d6210 160 API calls 31338->31342 31339->31338 31346 6d0d9998 GetLastError 31339->31346 31340->31341 31374 6d0d9678 31340->31374 31343 6d0d9959 31341->31343 31344 6d0d9863 31341->31344 31345 6d0d99b9 31342->31345 31347 6d0d6210 160 API calls 31343->31347 31344->31343 31348 6d0d9880 31344->31348 31350 6d0dfc2e ___ansicp 4 API calls 31345->31350 31391 6d0d6391 167 API calls 3 library calls 31346->31391 31351 6d0d992a 31347->31351 31375 6d0e0721 31348->31375 31353 6d0d99db 31350->31353 31354 6d0d996b FreeLibrary 31351->31354 31353->31334 31354->31345 31356 6d0d9831 31356->31354 31357 6d0e0721 61 API calls 31358 6d0d98bc 31357->31358 31359 6d0e0721 61 API calls 31358->31359 31364 6d0e0721 61 API calls 31364->31374 31372 6d0e06fa 91 API calls 31372->31374 31373 6d0d6210 160 API calls 31373->31374 31374->31356 31374->31364 31374->31372 31374->31373 31376 6d0e0731 31375->31376 31377 6d0e0750 31375->31377 31392 6d0e33d9 61 API calls __getptd 31376->31392 31384 6d0d98a8 31377->31384 31394 6d0e33d9 61 API calls __getptd 31377->31394 31380 6d0e0736 31393 6d0e32d7 5 API calls ___ansicp 31380->31393 31381 6d0e076a 31395 6d0e32d7 5 API calls ___ansicp 31381->31395 31384->31357 31391->31345 31392->31380 31393->31384 31394->31381 31395->31384 31400 6d0d9da3 31397->31400 31398 6d0d9f33 31399 6d0dfc2e ___ansicp 4 API calls 31398->31399 31401 6d0d9f40 31399->31401 31400->31398 31402 6d0d9f03 31400->31402 31403 6d0d9dec 31400->31403 31404 6d0d9e46 31400->31404 31417 6d0d9d2d 31401->31417 31402->31398 31405 6d0d9f18 GetDlgItem SendMessageA 31402->31405 31406 6d0d9e67 31403->31406 31407 6d0d9df0 GetDlgItem SendMessageA SendMessageA SendMessageA ShowWindow 31403->31407 31404->31406 31408 6d0d9e4b GetDlgItem SendMessageA 31404->31408 31405->31398 31425 6d0d9cd8 169 API calls 31406->31425 31407->31406 31408->31406 31410 6d0d9e86 SetDlgItemTextA 31411 6d0d9e9f GetLastError 31410->31411 31412 6d0d9ec7 SetDlgItemTextA 31410->31412 31426 6d0d6391 167 API calls 3 library calls 31411->31426 31412->31402 31414 6d0d9ede GetLastError 31412->31414 31427 6d0d6391 167 API calls 3 library calls 31414->31427 31415 6d0d9ec4 31415->31412 31418 6d0d9d66 PeekMessageA 31417->31418 31419 6d0d9d74 31418->31419 31420 6d0d9d41 GetMessageA 31418->31420 31419->30829 31419->30830 31419->30831 31420->31418 31421 6d0d9d52 TranslateMessage DispatchMessageA 31420->31421 31421->31418 31422->30822 31423->30831 31424->30844 31425->31410 31426->31415 31427->31402 31429 6d0d9fac 31428->31429 31430 6d0d9f6e GetLastError 31428->31430 31432 6d0da02f DeleteFileA 31429->31432 31437 6d0d9fb5 _strnlen 31429->31437 31431 6d0d9f79 31430->31431 31441 6d0d9f9a 31430->31441 31431->31441 31442 6d0d6391 167 API calls 3 library calls 31431->31442 31433 6d0da037 31432->31433 31434 6d0da03b GetLastError 31433->31434 31433->31441 31443 6d0d6391 167 API calls 3 library calls 31434->31443 31436 6d0dfc2e ___ansicp 4 API calls 31439 6d0da06f 31436->31439 31440 6d0d9fd4 SHFileOperationA 31437->31440 31439->30854 31440->31433 31441->31436 31442->31441 31443->31441 31444->30858 31446 6d0d8c05 31445->31446 31447 6d0d8c10 GetVersionExA 31445->31447 31450 6d0dfc2e ___ansicp 4 API calls 31446->31450 31448 6d0d8c47 31447->31448 31449 6d0d8c30 31447->31449 31448->31446 31449->31448 31503 6d0d7089 182 API calls 31449->31503 31451 6d0d8c5f 31450->31451 31451->30868 31451->30877 31454 6d0d88de GetVersionExA 31453->31454 31455 6d0d88d3 31453->31455 31456 6d0d892c 31454->31456 31462 6d0d88fe 31454->31462 31458 6d0dfc2e ___ansicp 4 API calls 31455->31458 31457 6d0d6dab 178 API calls 31456->31457 31459 6d0d8935 31456->31459 31457->31459 31460 6d0d8958 31458->31460 31461 6d0d893e 31459->31461 31504 6d0d691d 9 API calls ___ansicp 31459->31504 31460->30878 31460->30879 31461->31455 31462->31456 31464 6d0d6eaf 178 API calls 31462->31464 31465 6d0d8923 31464->31465 31465->31456 31466 6d0d6f9c 178 API calls 31465->31466 31466->31456 31468 6d0d8adb GetVersionExA 31467->31468 31469 6d0d8ad0 31467->31469 31470 6d0d8afb 31468->31470 31471 6d0d8b12 31468->31471 31473 6d0dfc2e ___ansicp 4 API calls 31469->31473 31470->31471 31476 6d0d6f9c 178 API calls 31470->31476 31472 6d0d6eaf 178 API calls 31471->31472 31474 6d0d8b1b 31471->31474 31472->31474 31475 6d0d8b3e 31473->31475 31477 6d0d8b24 31474->31477 31505 6d0d691d 9 API calls ___ansicp 31474->31505 31475->30877 31479 6d0d8b45 31475->31479 31476->31471 31477->31469 31480 6d0d8b6f GetVersionExA 31479->31480 31486 6d0d8b64 31479->31486 31481 6d0d8b90 31480->31481 31483 6d0d6f9c 178 API calls 31481->31483 31485 6d0d8b9e 31481->31485 31482 6d0dfc2e ___ansicp 4 API calls 31484 6d0d8bdf 31482->31484 31483->31485 31484->30877 31485->31486 31486->31482 31506 6d0d871f GetSystemDefaultLCID 31488->31506 31490 6d0d8753 31491 6d0d8770 31490->31491 31513 6d0d86f0 GetKeyboardType GetKeyboardType 31490->31513 31492 6d0d6210 160 API calls 31491->31492 31494 6d0d877a 31492->31494 31494->30867 31495 6d0d875d 31495->31491 31496 6d0d8761 31495->31496 31497 6d0d6210 160 API calls 31496->31497 31498 6d0d876b 31497->31498 31498->30867 31499->30891 31500->30891 31503->31448 31504->31461 31505->31477 31507 6d0d872c 31506->31507 31508 6d0d873b 31506->31508 31509 6d0d6210 160 API calls 31507->31509 31510 6d0d6210 160 API calls 31508->31510 31511 6d0d8736 31509->31511 31512 6d0d8745 31510->31512 31511->31490 31512->31490 31513->31495 28022 6d0df484 28023 6d0df46b 28022->28023 28026 6d0df43f ___crtInitCritSecAndSpinCount 28023->28026 28034 6d0df401 28023->28034 28035 6d0df40c 28034->28035 28036 6d0df411 28034->28036 28038 6d0e2217 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 28035->28038 28038->28036 26780 73acc16c 26781 73acc179 26780->26781 26786 73ac813a 26781->26786 26784 73acc1ac 26785 73ac813a ___crtLCMapStringA 61 API calls 26785->26784 26793 73ac8017 26786->26793 26788 73ac8173 26788->26784 26788->26785 26789 73ac8154 26789->26788 26806 73ac9c85 61 API calls _raise 26789->26806 26791 73ac816a 26791->26788 26807 73ac9c85 61 API calls _raise 26791->26807 26794 73ac8023 __locking 26793->26794 26795 73ac803b 26794->26795 26805 73ac805a _memset 26794->26805 26808 73ac9c85 61 API calls _raise 26795->26808 26797 73ac8040 26809 73ac9b83 5 API calls ___ansicp 26797->26809 26799 73ac80cc HeapAlloc 26799->26805 26802 73ac8050 __locking 26802->26789 26805->26799 26805->26802 26810 73acadd9 26805->26810 26817 73acb376 5 API calls 2 library calls 26805->26817 26818 73ac8113 LeaveCriticalSection _doexit 26805->26818 26819 73acb674 TlsGetValue TlsGetValue GetModuleHandleA GetProcAddress _raise 26805->26819 26806->26791 26807->26788 26808->26797 26809->26802 26811 73acadee 26810->26811 26812 73acae01 EnterCriticalSection 26810->26812 26820 73acad11 26811->26820 26812->26805 26814 73acadf4 26814->26812 26849 73ac7729 61 API calls 3 library calls 26814->26849 26816 73acae00 26816->26812 26817->26805 26818->26805 26819->26805 26821 73acad1d __locking 26820->26821 26822 73acad2d 26821->26822 26823 73acad45 26821->26823 26850 73accbba 61 API calls 2 library calls 26822->26850 26826 73acad53 __locking 26823->26826 26836 73acad43 26823->26836 26825 73acad32 26851 73acca30 61 API calls 3 library calls 26825->26851 26826->26814 26829 73acad5e 26831 73acad74 26829->26831 26832 73acad65 26829->26832 26830 73acad39 26852 73ac7787 GetModuleHandleA GetProcAddress ExitProcess ___crtCorExitProcess 26830->26852 26835 73acadd9 __getstream 61 API calls 26831->26835 26854 73ac9c85 61 API calls _raise 26832->26854 26838 73acad7b 26835->26838 26836->26823 26853 73acb6f5 61 API calls 6 library calls 26836->26853 26837 73acad6a 26837->26826 26839 73acadaf 26838->26839 26840 73acad83 26838->26840 26858 73ac6f02 61 API calls 4 library calls 26839->26858 26855 73accfd8 61 API calls 4 library calls 26840->26855 26843 73acad8e 26844 73acada0 26843->26844 26856 73ac6f02 61 API calls 4 library calls 26843->26856 26859 73acadcb LeaveCriticalSection _doexit 26844->26859 26847 73acad9a 26857 73ac9c85 61 API calls _raise 26847->26857 26849->26816 26850->26825 26851->26830 26853->26829 26854->26837 26855->26843 26856->26847 26857->26844 26858->26844 26859->26837 30266 73ac6975 183 API calls __locking 30267 6d0e37f2 30268 6d0e37ff 30267->30268 30269 6d0e1911 ___crtGetStringTypeA 61 API calls 30268->30269 30270 6d0e3819 30269->30270 30271 6d0e1911 ___crtGetStringTypeA 61 API calls 30270->30271 30272 6d0e3832 30270->30272 30271->30272

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 275 f14d57-f14d73 CreateMutexA 276 f15159-f15167 EnumWindows 275->276 277 f14d79-f14d84 GetLastError 275->277 280 f15168-f1516a 276->280 278 f15150-f15153 CloseHandle 277->278 279 f14d8a-f14da3 call f14b1b 277->279 278->276 283 f14da5-f14dcd call f1390a call f147af 279->283 284 f14dcf-f14dda call f14c60 279->284 296 f14e11-f14e18 283->296 290 f14eb0 284->290 291 f14de0-f14de2 284->291 293 f14eb2-f14eb9 290->293 294 f14de4-f14de6 291->294 295 f14e1d-f14e24 call f1422e 291->295 297 f14ebb-f14ecb call f147af 293->297 298 f14ecc-f14ecf 293->298 294->295 299 f14de8-f14e0e call f1390a call f147af 294->299 305 f14e26-f14e4a call f1390a 295->305 306 f14e5d-f14e64 call f13c3f 295->306 304 f15141-f1514e CloseHandle 296->304 297->298 298->304 299->296 304->280 315 f14e54-f14e58 305->315 316 f14e4c-f14e53 call f147af 305->316 317 f14e66-f14e86 call f1390a 306->317 318 f14e88-f14e90 call f13f72 306->318 315->304 316->315 317->293 325 f14e92-f14ead call f1390a 318->325 326 f14ed4-f14efe SetErrorMode LoadLibraryA SetErrorMode 318->326 325->290 328 f15110-f15134 GetLastError call f1390a call f1495a 326->328 329 f14f04-f14f41 GetProcAddress * 3 326->329 340 f15139 328->340 332 f150b4-f150ec GetLastError call f1390a FreeLibrary 329->332 333 f14f47-f14f4f 329->333 332->340 341 f150ee-f150f6 GetLastError 332->341 333->332 336 f14f55-f14f57 333->336 336->332 339 f14f5d-f14f6c 336->339 345 f14f79-f14f7f 339->345 346 f14f6e-f14f74 339->346 344 f15140 340->344 341->340 343 f150f8-f1510e call f1390a 341->343 343->340 344->304 349 f15005-f15008 345->349 350 f14f85-f14f9f DirectXSetupA call f14090 345->350 346->345 348 f14f76 346->348 348->345 353 f1509a-f150a7 DirectXSetupA 349->353 354 f1500e-f15011 349->354 358 f14fa1-f14fb4 call f147af GetAsyncKeyState 350->358 359 f14fe0-f14fe3 350->359 356 f150aa call f14090 353->356 354->353 357 f15017-f1501d 354->357 365 f150af 356->365 357->353 361 f1501f-f15021 357->361 380 f14fc2-f14fdb call f137b8 call f14163 ExitWindowsEx 358->380 381 f14fb6-f14fc0 call f137b8 358->381 362 f14fe5-f14fea call f1495a 359->362 363 f14fef-f14ffa call f147af 359->363 366 f15023-f15030 #17 361->366 367 f15077-f15095 call f1390a 361->367 362->344 378 f14fff-f15000 363->378 365->344 372 f15032-f1503b FreeLibrary 366->372 373 f1506d-f15075 call f16964 366->373 367->344 374 f15067 372->374 375 f1503d-f15045 GetLastError 372->375 373->356 374->373 375->374 382 f15047-f15065 call f1390a 375->382 378->344 380->344 381->378 382->373
                                                                                                  APIs
                                                                                                  • CreateMutexA.KERNEL32(00000000,00000000,DirectX Setup), ref: 00F14D68
                                                                                                  • GetLastError.KERNEL32 ref: 00F14D79
                                                                                                  • SetErrorMode.KERNEL32(00008001), ref: 00F14EE0
                                                                                                  • LoadLibraryA.KERNEL32(dsetup.dll), ref: 00F14EE9
                                                                                                  • SetErrorMode.KERNEL32(00000000), ref: 00F14EF5
                                                                                                  • GetProcAddress.KERNEL32(73AC0000,DirectXSetupA), ref: 00F14F10
                                                                                                  • GetProcAddress.KERNEL32(DirectXSetupSetCallback), ref: 00F14F22
                                                                                                  • GetProcAddress.KERNEL32(DirectXSetupShowEULA), ref: 00F14F34
                                                                                                  • DirectXSetupA.DSETUP(00000000,00000000,02010098), ref: 00F14F8C
                                                                                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 00F14FD5
                                                                                                  • GetAsyncKeyState.USER32(00000010), ref: 00F14FAB
                                                                                                    • Part of subcall function 00F1390A: GetLastError.KERNEL32 ref: 00F13AC7
                                                                                                    • Part of subcall function 00F14163: GetCurrentProcess.KERNEL32 ref: 00F14176
                                                                                                    • Part of subcall function 00F14163: OpenProcessToken.ADVAPI32(00000000,000F01FF,?), ref: 00F14186
                                                                                                    • Part of subcall function 00F14163: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00F1419C
                                                                                                    • Part of subcall function 00F14163: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00F141CB
                                                                                                    • Part of subcall function 00F14163: CloseHandle.KERNEL32(?), ref: 00F141D4
                                                                                                    • Part of subcall function 00F14163: FreeLibrary.KERNEL32(73AC0000), ref: 00F141E4
                                                                                                    • Part of subcall function 00F14163: GetLastError.KERNEL32 ref: 00F141EE
                                                                                                  • CloseHandle.KERNEL32(?), ref: 00F15144
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F1393B
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F13944
                                                                                                    • Part of subcall function 00F1390A: _strrchr.LIBCMT ref: 00F1398A
                                                                                                    • Part of subcall function 00F147AF: LoadStringW.USER32(00000064,?,00000104), ref: 00F147F5
                                                                                                    • Part of subcall function 00F147AF: GetLastError.KERNEL32(00000000), ref: 00F1480C
                                                                                                    • Part of subcall function 00F147AF: LoadStringW.USER32(?,?,00000104), ref: 00F14858
                                                                                                    • Part of subcall function 00F147AF: GetLastError.KERNEL32(String ID: %d,?), ref: 00F1486A
                                                                                                    • Part of subcall function 00F1422E: GetVersionExA.KERNEL32(?), ref: 00F14254
                                                                                                    • Part of subcall function 00F1390A: FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00F13A9A
                                                                                                    • Part of subcall function 00F1390A: LocalFree.KERNEL32(?), ref: 00F13ABF
                                                                                                    • Part of subcall function 00F147AF: LoadStringW.USER32(0000006F,?,00000104), ref: 00F148A6
                                                                                                    • Part of subcall function 00F147AF: GetLastError.KERNEL32(String ID: %d,0000006F), ref: 00F148B7
                                                                                                    • Part of subcall function 00F147AF: ___swprintf_l.LIBCMT ref: 00F1491E
                                                                                                    • Part of subcall function 00F147AF: MessageBoxW.USER32(?,?,?), ref: 00F14940
                                                                                                    • Part of subcall function 00F13F72: RegCreateKeyExA.ADVAPI32(80000002,Software\Microsoft\DirectX,00000000,00000000,00000000,00000002,00000000,?,00000000), ref: 00F13F98
                                                                                                  • CloseHandle.KERNEL32(?), ref: 00F15153
                                                                                                  • EnumWindows.USER32(Function_00004288,00000000), ref: 00F1515F
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Error$Last$Load$AddressCloseHandleProcString$CreateFreeLibraryMessageModeProcessTokenWindows__wstrtime$AdjustAsyncCurrentDirectEnumExitFormatLocalLookupMutexOpenPrivilegePrivilegesSetupStateValueVersion___swprintf_l_strrchr
                                                                                                  • String ID: Current logon user doesn't have the Administrator privilege.$DirectX Setup$DirectXSetupA$DirectXSetupSetCallback$DirectXSetupShowEULA$FreeLibrary()$GetProcAddress()$Invalid command line switch, using command ID %d without flat image.$Invalid command line switch.$LoadLibrary()$Module: dsetup.dll$SetDXSetupRegValue() failed.$This version of DirectX is not compatible with WindowsNT 4.0.$Unknown install command.$User did not reboot$User rebooted$WinMain$dsetup.dll$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp
                                                                                                  • API String ID: 1300868845-2194485137
                                                                                                  • Opcode ID: 03901eb808b6976da41ebbd4b6cc9b0c7d291b45d90a5bed6822131907821e09
                                                                                                  • Instruction ID: e05983116c8f7c4b77cb8de921813cd90d8dcac257438dbeb4082aa346096bdb
                                                                                                  • Opcode Fuzzy Hash: 03901eb808b6976da41ebbd4b6cc9b0c7d291b45d90a5bed6822131907821e09
                                                                                                  • Instruction Fuzzy Hash: 55918972E8030CBBDB216BB15C0AEDB3D69B7D4F21B240315F614A21C1D7A5D9C1BBA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 717 f13647-f1366a 718 f13670-f13685 GetWindowsDirectoryA 717->718 719 f1370e-f1371f call f17642 717->719 720 f13697-f136ba call f1360c 718->720 721 f13687 718->721 728 f13721-f13726 719->728 729 f1372b-f13744 call f17548 call f17478 719->729 732 f136c3-f136d4 CreateDirectoryA 720->732 733 f136bc-f136c1 720->733 723 f1368c-f13692 OutputDebugStringA 721->723 726 f137a5-f137b2 call f1765e 723->726 728->723 743 f13746-f1376a call f1360c 729->743 744 f1376c-f1378c call f1360c 729->744 736 f136d6-f136e1 GetLastError 732->736 737 f136ea-f1370c call f1360c 732->737 733->723 736->737 739 f136e3-f136e8 736->739 737->719 737->733 739->723 749 f1378f-f1379d call f17285 call f17204 743->749 744->749 753 f137a2 749->753 753->726
                                                                                                  APIs
                                                                                                  • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00F1367D
                                                                                                  • OutputDebugStringA.KERNEL32(DXSETUP_DPF(): Unable to open log file.), ref: 00F1368C
                                                                                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 00F136CC
                                                                                                  • GetLastError.KERNEL32 ref: 00F136D6
                                                                                                  • __wstrtime.LIBCMT ref: 00F1372F
                                                                                                  • __wstrtime.LIBCMT ref: 00F13738
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Directory__wstrtime$CreateDebugErrorLastOutputStringWindows
                                                                                                  • String ID: %s %s: %s: %s$%s %s: %s: (null)$%s%s$%s%s%s$C:\Windows\Logs\DirectX.log$DXSETUP_DPF(): GetWindowsDirectory() failed.$DXSETUP_DPF(): Unable to open log file.$DXSETUP_DPF(): failed to create log directory.$DXSETUP_DPF(): path name too long.$DXSetup$Logs\DirectX.log$\Logs$b:
                                                                                                  • API String ID: 1979891910-370489754
                                                                                                  • Opcode ID: 7b030973bcc5673611f654419ccf028516c7cb0c564956625635755a80274c8f
                                                                                                  • Instruction ID: 644599b056f570e1c4822c63723f9cb8eaac3f5008e66db3b1a9a2fc7d9725b2
                                                                                                  • Opcode Fuzzy Hash: 7b030973bcc5673611f654419ccf028516c7cb0c564956625635755a80274c8f
                                                                                                  • Instruction Fuzzy Hash: 6E31F6F2E043187ADB10E6A1DC4AFEA77ACAB08750F0001A9F705E2181E775DBC87666
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  • FindFirstFileA.KERNEL32(?,?,?,?,Logs\DirectX.log), ref: 6D0DB2AF
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 6D0DB2BB
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime$ErrorFileFindFirstLast_strrchr
                                                                                                  • String ID: $$CSetup::CheckOnLogFile$FindFirstFile()$Logs\DirectX.log$Out of memory.$Unable to create path string, %s%s.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp$fopen()$fread() returned zero.
                                                                                                  • API String ID: 1269276653-3498366787
                                                                                                  • Opcode ID: ae16843d76e75c2c3cef105a6bfe383eb140d2f193f1a02889ae8b7f053fd9ab
                                                                                                  • Instruction ID: 28249b34ab7ca92358de450fd66e3639978ee723a2468f2b1814f257cf2af352
                                                                                                  • Opcode Fuzzy Hash: ae16843d76e75c2c3cef105a6bfe383eb140d2f193f1a02889ae8b7f053fd9ab
                                                                                                  • Instruction Fuzzy Hash: CE51E875A493197BFBA097658C49FEE3ABCDF09314F5041A7BB0CB60C1DF709A804A55
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetVersionExA.KERNEL32(?), ref: 00F13C6C
                                                                                                  • LoadLibraryA.KERNEL32(advpack.dll), ref: 00F13CA8
                                                                                                  • GetProcAddress.KERNEL32(00000000,IsNTAdmin), ref: 00F13CBC
                                                                                                  • GetLastError.KERNEL32(Module: %s, Function: %s,advpack.dll,IsNTAdmin), ref: 00F13CE7
                                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00F13D08
                                                                                                  • GetLastError.KERNEL32(Unable to load %s.,advpack.dll), ref: 00F13D17
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLastLibrary$AddressFreeLoadProcVersion
                                                                                                  • String ID: GetProcAddress()$IsAdmin$IsNTAdmin$LoadLibrary()$Module: %s, Function: %s$Unable to load %s.$advpack.dll$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
                                                                                                  • API String ID: 3600083760-2055996021
                                                                                                  • Opcode ID: a49e453901562608bc6d63b0e4c2ae9407d661758c387f209470d09fc913d0c2
                                                                                                  • Instruction ID: d9a6ab56e4fa31342fc8122dd9ff3530a47240760eaa37e78613fe83d9f0a498
                                                                                                  • Opcode Fuzzy Hash: a49e453901562608bc6d63b0e4c2ae9407d661758c387f209470d09fc913d0c2
                                                                                                  • Instruction Fuzzy Hash: 3521D671E4021CEBD7209B719C4AFEA76BCBB58751F4440A8F20DA1182CB758EC4EF61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 92bca36f56078eec2e35f7b984d40fc909c90492897afb3b9ed950f047f782f5
                                                                                                  • Instruction ID: 73572873e290019994e4aa2b418f1f3a585e7d37f0d92cb5c11132c9c25a8b4e
                                                                                                  • Opcode Fuzzy Hash: 92bca36f56078eec2e35f7b984d40fc909c90492897afb3b9ed950f047f782f5
                                                                                                  • Instruction Fuzzy Hash: AD125F319006A88FDB21CF24CD46BAA77B9EF19313F4441DAE81AE7298D731DA81DF51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ebc08cdd38819ff230f708db63e1dc4403f134917496b4006bbaa399be64e109
                                                                                                  • Instruction ID: e2927dd977606708d86f93cb449cbd51fcd41fb713b289f2d9ef0206631cf5a5
                                                                                                  • Opcode Fuzzy Hash: ebc08cdd38819ff230f708db63e1dc4403f134917496b4006bbaa399be64e109
                                                                                                  • Instruction Fuzzy Hash: DB125B31D04629CFEB21CF24DC44BAEB7B5EF45392F8045D6EA19A7281DB319A81CF91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 69d6fd01f613244f1dabddbf1f4a44874faae86ef1b571c9915cd54b805a0548
                                                                                                  • Instruction ID: 62e2684e4bed8341ee650d9ae66f178166d8d24d709b83712336028f33499ead
                                                                                                  • Opcode Fuzzy Hash: 69d6fd01f613244f1dabddbf1f4a44874faae86ef1b571c9915cd54b805a0548
                                                                                                  • Instruction Fuzzy Hash: F3124871D04A289FDB20CF28DC44BEAB7B5AB09322F4441A6E91AE7191D7309EC5EF51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FindFirstFileA.KERNEL32(?,?,?,00000104,?,\ntkrnlpa.exe,00000104), ref: 6D0D6D8F
                                                                                                  • FindClose.KERNEL32(00000000), ref: 6D0D6D9B
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Find__wstrtime$CloseFileFirst_strrchr
                                                                                                  • String ID: IsFileAvailable$StringCchCopy()$Unable to create path string, %s%s.$\ntkrnlpa.exe$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
                                                                                                  • API String ID: 317478765-446419479
                                                                                                  • Opcode ID: f546ec6fd7b09e6a3d7ed09489eece62ecd9e07e43af1a45693bdad747563ebf
                                                                                                  • Instruction ID: 03d879ff784c6d4c4af3ac768d1289be4a9c698159737f8a19a3ad1e0cefe214
                                                                                                  • Opcode Fuzzy Hash: f546ec6fd7b09e6a3d7ed09489eece62ecd9e07e43af1a45693bdad747563ebf
                                                                                                  • Instruction Fuzzy Hash: 92117371E4430C76FB90DB659C48FFF77ACDB56714F900527B918E7081EE70A54086A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FindFirstFileA.KERNEL32(?,?), ref: 00F14554
                                                                                                  • FindClose.KERNEL32(00000000), ref: 00F14560
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F1393B
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F13944
                                                                                                    • Part of subcall function 00F1390A: _strrchr.LIBCMT ref: 00F1398A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Find__wstrtime$CloseFileFirst_strrchr
                                                                                                  • String ID: IsFileAvailable$StringCchCopy()$Unable to create path string, %s%s.$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
                                                                                                  • API String ID: 317478765-495664935
                                                                                                  • Opcode ID: 8a87dbc6446ab0e8ce8fff709eae3eaf012ff6fdd062b98438f8296a0922f415
                                                                                                  • Instruction ID: 4a357f85eca3e54455b47879ea5ccf62cf9af1060d37d71c79fc061fc14d9499
                                                                                                  • Opcode Fuzzy Hash: 8a87dbc6446ab0e8ce8fff709eae3eaf012ff6fdd062b98438f8296a0922f415
                                                                                                  • Instruction Fuzzy Hash: BC11ECB2E4030877D710AA654C06FEF37ADAB95750F540511B519F7080E974EAC4BA71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 0 6d0de873-6d0de8d2 call 6d0db23f call 6d0d6210 * 2 call 6d0dac14 9 6d0de8ec-6d0de908 RegOpenKeyExA 0->9 10 6d0de8d4-6d0de8db call 6d0d93df 0->10 12 6d0de97a-6d0de986 9->12 13 6d0de90a-6d0de942 RegQueryValueExA 9->13 10->9 21 6d0de8dd-6d0de8e7 10->21 14 6d0de98b-6d0de991 call 6d0d6391 12->14 16 6d0de944-6d0de951 call 6d0d6210 13->16 17 6d0de957-6d0de965 RegCloseKey 13->17 18 6d0de994-6d0de9a6 call 6d0d6210 14->18 16->17 17->18 19 6d0de967-6d0de978 17->19 29 6d0de9ab-6d0de9ca call 6d0db5f6 call 6d0d8c66 18->29 19->14 25 6d0dea58-6d0dea6b 21->25 27 6d0dea71-6d0dea77 25->27 28 6d0decf0-6d0decf6 25->28 30 6d0dea79-6d0deaa2 call 6d0d6b4f call 6d0d85ae call 6d0da3ce 27->30 31 6d0deaa7-6d0deaba call 6d0d72fc 27->31 32 6d0decfc-6d0ded02 28->32 33 6d0dedbe-6d0dee0e call 6d0d6210 call 6d0db5f6 28->33 61 6d0de9d0 29->61 62 6d0dea52 29->62 30->31 52 6d0dec69-6d0dec86 call 6d0d91c4 31->52 53 6d0deac0-6d0deac2 31->53 32->33 36 6d0ded08-6d0ded27 RegOpenKeyExA 32->36 69 6d0dee17-6d0dee1c 33->69 70 6d0dee10-6d0dee12 call 6d0d72fc 33->70 41 6d0ded29-6d0ded3c RegDeleteValueA 36->41 42 6d0deda0-6d0dedac 36->42 48 6d0ded6c-6d0ded7c call 6d0d6210 41->48 49 6d0ded3e-6d0ded41 41->49 46 6d0dedb1-6d0dedbb call 6d0d6391 42->46 46->33 57 6d0ded7d-6d0ded8b RegCloseKey 48->57 49->57 58 6d0ded43-6d0ded6a call 6d0d6391 49->58 90 6d0deccc-6d0deceb call 6d0db5f6 52->90 102 6d0dec88-6d0dec9f call 6d0d91c4 52->102 63 6d0deac8-6d0deacb 53->63 64 6d0debb1-6d0debbe call 6d0db4e4 53->64 57->33 92 6d0ded8d-6d0ded9e 57->92 58->57 61->62 72 6d0deb2d-6d0deb34 call 6d0daad4 61->72 73 6d0deb6f-6d0deb74 61->73 74 6d0dea09-6d0dea10 call 6d0d8484 61->74 75 6d0deb68-6d0deb6d 61->75 76 6d0de9eb-6d0de9f0 61->76 77 6d0deb84 61->77 78 6d0deb47-6d0deb4e call 6d0dab73 61->78 79 6d0dea26-6d0dea2b 61->79 80 6d0de9e1-6d0de9e6 61->80 81 6d0deb61-6d0deb66 61->81 82 6d0deb7d-6d0deb82 61->82 83 6d0de9ff-6d0dea04 61->83 84 6d0dea3a-6d0dea41 call 6d0da978 61->84 85 6d0de9f5-6d0de9fa 61->85 86 6d0de9d7-6d0de9dc 61->86 87 6d0deb76-6d0deb7b 61->87 88 6d0dea30-6d0dea35 61->88 89 6d0deb13-6d0deb1a call 6d0daa25 61->89 62->25 63->90 91 6d0dead1-6d0deaec call 6d0d91c4 63->91 64->90 114 6d0debc4-6d0debc7 64->114 97 6d0dee1e-6d0dee27 DestroyWindow 69->97 98 6d0dee54-6d0dee65 call 6d0da365 69->98 70->69 137 6d0deb36-6d0deb3b 72->137 138 6d0deb40-6d0deb45 72->138 95 6d0deb89-6d0deb96 call 6d0d6210 73->95 128 6d0dea1c-6d0dea21 74->128 129 6d0dea12-6d0dea17 74->129 75->95 76->95 77->95 121 6d0deb5a-6d0deb5f 78->121 122 6d0deb50-6d0deb55 78->122 79->95 80->95 81->95 82->95 83->95 130 6d0deb0c-6d0deb11 84->130 131 6d0dea47 84->131 85->95 86->95 87->95 88->95 135 6d0deb1c-6d0deb21 89->135 136 6d0deb26-6d0deb2b 89->136 90->28 133 6d0deb9b-6d0debac 91->133 134 6d0deaf2-6d0deb07 call 6d0d6210 91->134 92->46 95->25 111 6d0dee29-6d0dee4e GetLastError call 6d0d6391 97->111 112 6d0dee51 97->112 146 6d0dee67-6d0dee86 call 6d0d85ae call 6d0da5d2 98->146 147 6d0deee2-6d0deeea 98->147 140 6d0decae-6d0decba 102->140 141 6d0deca1-6d0deca6 call 6d0d6210 102->141 111->112 112->98 125 6d0debdf-6d0debe5 114->125 126 6d0debc9-6d0debda call 6d0d6210 114->126 121->95 139 6d0dea4c-6d0dea51 call 6d0d6210 122->139 148 6d0debe7-6d0debef call 6d0dcec8 125->148 149 6d0dec02-6d0dec14 call 6d0d9ca1 125->149 126->90 128->95 129->95 130->95 131->139 142 6d0decbf-6d0decc9 call 6d0d6391 133->142 134->90 135->139 136->95 137->139 138->95 139->62 140->142 162 6d0decab-6d0decac 141->162 142->90 177 6d0deeaf-6d0deecd call 6d0d6391 146->177 178 6d0dee88-6d0deea1 call 6d0d6210 146->178 155 6d0deeec-6d0def13 call 6d0d6be5 147->155 156 6d0deecf-6d0deee1 call 6d0dfc82 147->156 165 6d0debf4-6d0debfc 148->165 149->90 169 6d0dec1a-6d0dec37 call 6d0d91c4 149->169 172 6d0def19 155->172 173 6d0deff1 155->173 156->147 162->90 165->90 165->149 169->90 204 6d0dec3d-6d0dec47 call 6d0d91c4 169->204 172->173 180 6d0defae-6d0defb3 172->180 181 6d0def48-6d0def4d 172->181 182 6d0defea-6d0defef 172->182 183 6d0def2a-6d0def2f 172->183 184 6d0def66-6d0def6b 172->184 185 6d0def20-6d0def25 172->185 186 6d0defe3-6d0defe8 172->186 187 6d0defdc-6d0defe1 172->187 188 6d0defbc-6d0defd3 call 6d0d6b8b 172->188 189 6d0def5c-6d0def61 172->189 190 6d0def3e-6d0def43 172->190 191 6d0defd5-6d0defda 172->191 192 6d0defb5-6d0defba 172->192 193 6d0def94 172->193 194 6d0def34-6d0def39 172->194 195 6d0def77-6d0def8b call 6d0dd3b0 172->195 196 6d0def70-6d0def75 172->196 197 6d0def52-6d0def57 172->197 176 6d0deff6 173->176 198 6d0deffc-6d0deffe call 6d0d6b8b 176->198 177->147 178->147 216 6d0deea3-6d0deead 178->216 180->176 181->176 182->176 183->176 184->176 185->176 186->176 187->176 188->176 189->176 190->176 191->176 192->176 200 6d0def9a-6d0defac call 6d0d6b4f 193->200 194->176 195->200 214 6d0def8d-6d0def92 195->214 196->176 197->176 213 6d0df003-6d0df00a call 6d0d6210 198->213 200->213 212 6d0dec4c-6d0dec54 204->212 212->141 218 6d0dec56-6d0dec67 212->218 219 6d0df00f-6d0df02b call 6d0de409 call 6d0dfc2e 213->219 214->198 216->147 218->142
                                                                                                  APIs
                                                                                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\DirectX,00000000,00000001,?), ref: 6D0DE900
                                                                                                  • RegQueryValueExA.ADVAPI32(?,DXSetup,00000000,?,?,?), ref: 6D0DE93A
                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 6D0DE95D
                                                                                                    • Part of subcall function 6D0D93DF: GetVersionExA.KERNEL32(?), ref: 6D0D940C
                                                                                                    • Part of subcall function 6D0D93DF: LoadLibraryA.KERNEL32(advpack.dll), ref: 6D0D9448
                                                                                                    • Part of subcall function 6D0D93DF: GetProcAddress.KERNEL32(00000000,IsNTAdmin), ref: 6D0D945C
                                                                                                    • Part of subcall function 6D0D93DF: FreeLibrary.KERNEL32(00000000), ref: 6D0D94A8
                                                                                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\DirectX,00000000,00020006,?,00000012,00000000,00000000,00000000,?), ref: 6D0DED1F
                                                                                                  • RegDeleteValueA.ADVAPI32(?,ManagedDirectXVersion), ref: 6D0DED34
                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 6D0DED83
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                    • Part of subcall function 6D0D6391: FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 6D0D6521
                                                                                                    • Part of subcall function 6D0D6391: LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00066BDB), ref: 6D0D6546
                                                                                                  • DestroyWindow.USER32(?,00000012,00000000,00000000,00000000,?,00000012,00000000,00000000,00000000,?), ref: 6D0DEE1F
                                                                                                  • GetLastError.KERNEL32(Not fatal...), ref: 6D0DEE2E
                                                                                                    • Part of subcall function 6D0D72FC: LoadStringA.USER32(?,000003E9,?,00000040), ref: 6D0D736D
                                                                                                    • Part of subcall function 6D0D72FC: GetLastError.KERNEL32(00000000), ref: 6D0D7378
                                                                                                    • Part of subcall function 6D0D6391: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00066BDB,00000000), ref: 6D0D654E
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$CloseFreeLibraryLoadOpenValue__wstrtime$AddressDeleteDestroyFormatLocalMessageProcQueryStringVersionWindow_strrchr
                                                                                                  • String ID: %s %s$%s will be removed at reboot.$.NETframework is not installed.$04:38:03$=== SetupForDirectX() start ===$A cabinet file necessary for installation cannot be trusted.$CSetup::SetupForDirectX$Can't find a directory$Can't find inf file$Could not find $Current logon user doesn't have the Administrator privilege$DXRemoveFileAtReboot() failed. (Not fatal...)$DXSetup$DXSetupCommand = %d.$DXTempFolder$DestroyWindow()$Downloading failed, need to run setup again.$Feb2005_MDX_x86.MSI$File not copied$Found Alpha$InstallPlugIn() failed.$Installation ended with value %d = $Installation succeeded$Installation succeeded need restart$Installing on NEC OPK$Installing on NEC Win2K$Installing on NEC Win95$Installing on NEC Win98$Installing on NEC WinXP$Installing on Win2K$Installing on Win2K Server$Installing on Win95$Installing on Win98$Installing on WinNT 4.0$Installing on WinXP$Installing on WinXP (64bit)$Installing on WinXP SP (64bit)$Installing on WinXP SP1$Installing on WinXP SP2 (64bit)$Installing on WinXP SP2/SP3$Installing on Windows ME$Installing on Windows ME NEC$Installing on Windows Server 2003$Installing on Windows Server 2003 (64bit)$Installing on Windows Server 2003 SP1 (64bit)$Installing on Windows Server 2003 SP1/SP2$Internal or unsupported error$ManagedDirectXVersion$Mar 30 2011$Newer version already installed$Not fatal...$One or more DirectX component files are being used, need to exit all applications.$Out of disk space$Processor type is unsupported by DirectX 8$RegCloseKey()$RegDeleteValue()$RegOpenKeyEx()$SetupForDirectX(): %s is removed from DirectX key.$SetupForDirectX(): query dxsetup command: result = %d.$SetupForDirectX: InstallPlugIn() Succeeded.$SetupfForDirectX(): IA64 is not supported.$Software\Microsoft\DirectX$Source file not found$Unable to remove %s from DirectX key$Unknown OS$Unknown error$Unsupported window version$Version$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp$start finalizing: phase: %d - %d, total: %d - %d
                                                                                                  • API String ID: 3617327385-668854391
                                                                                                  • Opcode ID: 64c7a722e5413238ea6eb70b25018e0385a7c9c16ae5f48cdcfd2187e16d37e7
                                                                                                  • Instruction ID: 1a6d4ef9a46e7e17f305148fd3041dbd46edf106073a0b9f7c9a76e848b7e2ef
                                                                                                  • Opcode Fuzzy Hash: 64c7a722e5413238ea6eb70b25018e0385a7c9c16ae5f48cdcfd2187e16d37e7
                                                                                                  • Instruction Fuzzy Hash: FB02C77054871ABAF7E15B648C80FBFB6A8FB19314F51441BF69EE3182DF7099408B62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 224 73ac4b10-73ac4b30 225 73ac4ca9-73ac4cb5 224->225 226 73ac4b36-73ac4b4b GetCurrentDirectoryW 224->226 227 73ac4ced-73ac4cf3 225->227 228 73ac4cb7-73ac4ccb GetProcAddress 225->228 229 73ac4b4d-73ac4b5f GetLastError 226->229 230 73ac4b78-73ac4b8e GetModuleFileNameW 226->230 232 73ac4d2b-73ac4d31 227->232 233 73ac4cf5-73ac4d09 GetProcAddress 227->233 228->227 231 73ac4ccd-73ac4ce3 GetLastError 228->231 234 73ac4b64-73ac4b6e call 73ac64d5 229->234 235 73ac4ba9-73ac4bbb call 73ac6e8f 230->235 236 73ac4b90-73ac4ba7 GetLastError 230->236 231->227 239 73ac4d71-73ac4d77 232->239 240 73ac4d33-73ac4d47 GetProcAddress 232->240 233->232 237 73ac4d0b-73ac4d21 GetLastError 233->237 253 73ac4b71-73ac4b73 234->253 249 73ac4bc1-73ac4bd7 SetCurrentDirectoryW 235->249 250 73ac4c93-73ac4c9f 235->250 236->234 237->232 242 73ac4daf-73ac4db5 239->242 243 73ac4d79-73ac4d8d GetProcAddress 239->243 246 73ac4d69 240->246 247 73ac4d49-73ac4d5f GetLastError 240->247 251 73ac4ded-73ac4df3 242->251 252 73ac4db7-73ac4dcb GetProcAddress 242->252 243->242 248 73ac4d8f-73ac4da5 GetLastError 243->248 246->239 247->246 248->242 254 73ac4bd9-73ac4bf0 GetLastError 249->254 255 73ac4bf5-73ac4c0f call 73ac49bf 249->255 250->225 257 73ac4e2b-73ac4e31 251->257 258 73ac4df5-73ac4e09 GetProcAddress 251->258 252->251 256 73ac4dcd-73ac4de3 GetLastError 252->256 259 73ac4e6c-73ac4e7a call 73ac6df2 253->259 254->234 268 73ac4c3a-73ac4c51 LoadLibraryW SetCurrentDirectoryW 255->268 269 73ac4c11-73ac4c35 call 73ac64d5 255->269 256->251 263 73ac4e69-73ac4e6b 257->263 264 73ac4e33-73ac4e47 GetProcAddress 257->264 258->257 262 73ac4e0b-73ac4e21 GetLastError 258->262 262->257 263->259 264->263 267 73ac4e49-73ac4e5f GetLastError 264->267 267->263 271 73ac4c6f-73ac4c75 268->271 272 73ac4c53-73ac4c65 GetLastError 268->272 269->253 271->225 274 73ac4c77-73ac4c89 GetLastError 271->274 272->271 274->250
                                                                                                  APIs
                                                                                                  • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 73AC4B43
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC4B4E
                                                                                                  • GetModuleFileNameW.KERNEL32(?,00000104), ref: 73AC4B86
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC4B91
                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 73AC4BD3
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC4BDA
                                                                                                  • LoadLibraryW.KERNEL32(?,?,00000104,\DSETUP32.DLL), ref: 73AC4C3B
                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 73AC4C4D
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC4C54
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC4C78
                                                                                                  • GetProcAddress.KERNEL32(iDirectXSetup), ref: 73AC4CC2
                                                                                                  • GetLastError.KERNEL32(Module: dsetup32.dll, Function: iDirectXSetup), ref: 73AC4CD2
                                                                                                  • GetProcAddress.KERNEL32(DirectXSetupCallback), ref: 73AC4D00
                                                                                                  • GetLastError.KERNEL32(Module: dsetup32.dll, Function: DirectXSetupCallback), ref: 73AC4D10
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$CurrentDirectory$AddressProc$FileLibraryLoadModuleName
                                                                                                  • String ID: DirectXLoadString$DirectXSetupCallback$DirectXSetupSetCallback$DirectXSetupShowEULA$GetCurrentDirectory()$GetModuleFileName()$GetProcAddress()$LoadDSetup32$LoadLibrary()$Module: dsetup32.dll, Function: iDirectXSetupGetEULAA$Module: dsetup32.dll, Function: iDirectXSetupGetEULAW$Module: dsetup32.dll, Function: DirectXLoadString$Module: dsetup32.dll, Function: DirectXSetupCallback$Module: dsetup32.dll, Function: DirectXSetupSetCallback$Module: dsetup32.dll, Function: DirectXSetupShowEULA$Module: dsetup32.dll, Function: iDirectXSetup$SetCurrentDirectory()$Unable to create path string, %s%s.$Unable to find backslash.$\DSETUP32.DLL$\DSETUP32.DLL$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c$iDirectXSetup$iDirectXSetupGetEULAA$iDirectXSetupGetEULAW
                                                                                                  • API String ID: 3381434992-2627784856
                                                                                                  • Opcode ID: 883dcac28d81490e148d5caddf9c5dfa52a5d2cdc6f9c06aa70754cbb3f52e44
                                                                                                  • Instruction ID: 2ea6f7726721abd665f631d0db4303b2b62c68fadd8de30cf9e42f25f6e6835f
                                                                                                  • Opcode Fuzzy Hash: 883dcac28d81490e148d5caddf9c5dfa52a5d2cdc6f9c06aa70754cbb3f52e44
                                                                                                  • Instruction Fuzzy Hash: EC71C6BA740294BFEB037B699C57F963BBDFB08205714062BF969E904ED730C8518E58
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 392 6d0dcec8-6d0dcf07 call 6d0d6b4f call 6d0d7269 397 6d0dcf09-6d0dcf18 call 6d0dac39 392->397 398 6d0dcf40-6d0dcf46 392->398 397->398 407 6d0dcf1a-6d0dcf3b call 6d0d6391 397->407 399 6d0dcf5d-6d0dcf6d GetModuleHandleA call 6d0d9a79 398->399 400 6d0dcf48-6d0dcf4b 398->400 406 6d0dcf72-6d0dcf74 399->406 400->399 402 6d0dcf4d-6d0dcf5b call 6d0d6b4f 400->402 410 6d0dcf7a-6d0dcf89 call 6d0d85ae call 6d0da078 402->410 409 6d0dd379-6d0dd37c 406->409 406->410 415 6d0dd39b-6d0dd3a8 call 6d0dfc2e 407->415 413 6d0dd39a 409->413 421 6d0dcf8b-6d0dcf9c 410->421 422 6d0dcfa1-6d0dcfa9 call 6d0da303 410->422 413->415 423 6d0dd2be-6d0dd2cb call 6d0d6391 421->423 427 6d0dcfab-6d0dcfb4 422->427 428 6d0dcfc5 422->428 423->409 430 6d0dcfb6-6d0dcfb9 427->430 431 6d0dcfc0-6d0dcfc3 427->431 432 6d0dcfc7-6d0dcfcc 428->432 430->431 433 6d0dcfbb-6d0dcfbe 430->433 431->432 434 6d0dcfdf-6d0dcff1 call 6d0dac14 432->434 435 6d0dcfce-6d0dcfda call 6d0d6b4f 432->435 433->428 433->431 441 6d0dd03a-6d0dd044 GetTempPathA 434->441 442 6d0dcff3-6d0dd006 call 6d0d6c43 434->442 440 6d0dd395 call 6d0da77b 435->440 440->413 443 6d0dd0b5-6d0dd0bc call 6d0d7269 441->443 444 6d0dd046-6d0dd06e GetLastError call 6d0d6210 ExpandEnvironmentStringsA 441->444 452 6d0dd00c-6d0dd035 call 6d0d6391 442->452 453 6d0dd1cf-6d0dd1ed call 6d0d85ae call 6d0e01ea 442->453 457 6d0dd0be-6d0dd0c5 call 6d0d81fa 443->457 458 6d0dd0cb-6d0dd0d2 443->458 444->453 455 6d0dd074-6d0dd089 ExpandEnvironmentStringsA 444->455 452->409 473 6d0dd1ef-6d0dd1f8 call 6d0d6cec 453->473 474 6d0dd260-6d0dd26f call 6d0da078 453->474 455->453 462 6d0dd08f-6d0dd0b0 call 6d0d6210 call 6d0d75af 455->462 457->453 457->458 458->453 461 6d0dd0d8-6d0dd0e8 GetCurrentDirectoryA 458->461 465 6d0dd1bc-6d0dd1cd GetLastError call 6d0d6210 461->465 466 6d0dd0ee-6d0dd101 call 6d0da078 461->466 462->453 481 6d0dd1ce 465->481 479 6d0dd119-6d0dd12e call 6d0d66cc 466->479 480 6d0dd103-6d0dd114 466->480 485 6d0dd1fd-6d0dd1ff 473->485 487 6d0dd284-6d0dd2a6 GetTempFileNameA 474->487 488 6d0dd271-6d0dd282 474->488 479->453 495 6d0dd134-6d0dd13b 479->495 480->423 481->453 485->474 489 6d0dd201-6d0dd211 CreateDirectoryA 485->489 491 6d0dd2a8-6d0dd2b9 GetLastError 487->491 492 6d0dd2d0-6d0dd2e2 call 6d0da365 487->492 488->423 493 6d0dd24d-6d0dd25f call 6d0d6210 489->493 494 6d0dd213-6d0dd21e GetLastError 489->494 491->423 510 6d0dd2fa-6d0dd30a CreateDirectoryA 492->510 511 6d0dd2e4-6d0dd2f7 call 6d0d6391 492->511 493->474 494->474 496 6d0dd220-6d0dd24b call 6d0d6210 call 6d0d75af 494->496 499 6d0dd13d-6d0dd144 495->499 500 6d0dd146-6d0dd15c GetDriveTypeA 495->500 496->474 499->500 504 6d0dd16d-6d0dd18d call 6d0d6c43 499->504 505 6d0dd15e-6d0dd161 500->505 506 6d0dd1b0-6d0dd1ba call 6d0d6210 500->506 504->453 522 6d0dd18f-6d0dd1ab 504->522 505->506 512 6d0dd163-6d0dd166 505->512 506->481 518 6d0dd33c-6d0dd344 510->518 519 6d0dd30c-6d0dd33a GetLastError call 6d0d6391 510->519 511->510 512->504 513 6d0dd168-6d0dd16b 512->513 513->453 513->504 520 6d0dd354-6d0dd359 518->520 521 6d0dd346-6d0dd353 call 6d0e01ea 518->521 519->413 529 6d0dd37e-6d0dd38f call 6d0d6b8b 520->529 530 6d0dd35b-6d0dd370 520->530 521->520 528 6d0dd371-6d0dd376 call 6d0d6391 522->528 528->409 529->440 530->528
                                                                                                  APIs
                                                                                                    • Part of subcall function 6D0DAC39: RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion,00000000,00000001,?), ref: 6D0DAC6E
                                                                                                  • GetModuleHandleA.KERNEL32(00000000,?,?,?,00000104,?,?,?), ref: 6D0DCF66
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime$HandleModuleOpen_strrchr
                                                                                                  • String ID: %temp%$%tmp%$BuildPaths(): GetCurrentDirectory() failed, error = %d, continue...$BuildPaths(): GetTempPath(): Unable to get temp path due to code:%d, try to scan environment value.$BuildPaths(): Unable to get temp path from environment value, use system drive.$BuildPaths(): temp directory %s is created.$BuildPaths(): unable to create temp directory: %s, error = %d, use system drive.$BuildPaths(): unable to detect drive type, continue...$CSetup::BuildPaths$CreateDirectory()$DeleteTempDir() failed. (Not fatal...)$DirectX$GetTempFileName()$New temp path is too long, %s.$Unable to create path string, %s%s.$Unable to create path string, %stemp\.$Unable to find Program Files directory.$\$\$appendSlash() failed.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp$temp\
                                                                                                  • API String ID: 3670481093-1835560824
                                                                                                  • Opcode ID: 35a31961611e4144f19c23e69e8e0726c26fd7f88fc1eeb1e48d743c698c0a27
                                                                                                  • Instruction ID: cb15329a26384316171b56cfc465c0ad53ec5097de2ed5ec26c544850ae1f57e
                                                                                                  • Opcode Fuzzy Hash: 35a31961611e4144f19c23e69e8e0726c26fd7f88fc1eeb1e48d743c698c0a27
                                                                                                  • Instruction Fuzzy Hash: A2C1E2B554830A7AFB91A7758D44FFB76ACEB8A304F014457FA19E3081EB70DA408A71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  • _strnlen.LIBCMT ref: 6D0DA7A9
                                                                                                  • _strnlen.LIBCMT ref: 6D0DA7BD
                                                                                                  • CreateDirectoryA.KERNEL32(?,00000000,?,00000104,system,?,00000104,?,CSetup::BuildPaths,e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp,00000104), ref: 6D0DA82B
                                                                                                  • CreateDirectoryA.KERNEL32(?,00000000,?,00000104,inf,?,00000104,?), ref: 6D0DA85E
                                                                                                  • CreateDirectoryA.KERNEL32(?,00000000,?,00000104,help,?,00000104,?), ref: 6D0DA891
                                                                                                  • CreateDirectoryA.KERNEL32(?,00000000,?,00000104,directx,?,00000104,?), ref: 6D0DA8C4
                                                                                                  • CreateDirectoryA.KERNEL32(?,00000000,?,00000104,drivers,?,00000104,?), ref: 6D0DA8F3
                                                                                                  • CreateDirectoryA.KERNEL32(?,00000000,?,00000104,sysbckup,?,00000104,?), ref: 6D0DA922
                                                                                                  • GetLastError.KERNEL32 ref: 6D0DA928
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateDirectory$_strnlen$ErrorLast
                                                                                                  • String ID: CSetup::BuildPaths$CreateDirectory()$MakeTempSubDirectorys$Temp directory is too long, %s%s.$directx$drivers$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp$help$inf$sysbckup$system
                                                                                                  • API String ID: 2702963399-732964606
                                                                                                  • Opcode ID: d304e0609b4d2c822731fd6bcb4d26241d5531e17a2b33777f9681b706e1dc4b
                                                                                                  • Instruction ID: 2759ebc8a68089f846a3a4582ffd85f610456b350515d387fada4f3729db5b5f
                                                                                                  • Opcode Fuzzy Hash: d304e0609b4d2c822731fd6bcb4d26241d5531e17a2b33777f9681b706e1dc4b
                                                                                                  • Instruction Fuzzy Hash: 765165B690831D7AFB9096B49C80FDE73ACDF55758F510593B644E7081DF74AAC08AB0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000003,00000000,00000000), ref: 6D0DD9AA
                                                                                                  • GetFileTime.KERNEL32(?,?,?,?,?,40000000,00000000,00000000,00000003,00000000,00000000), ref: 6D0DD9DA
                                                                                                  • LocalFileTimeToFileTime.KERNEL32(?,?,?,40000000,00000000,00000000,00000003,00000000,00000000), ref: 6D0DD9FD
                                                                                                  • SetFileTime.KERNEL32(?,?,?,?,?,40000000,00000000,00000000,00000003,00000000,00000000), ref: 6D0DDA16
                                                                                                  • GetLastError.KERNEL32(00000000,?,40000000,00000000,00000000,00000003,00000000,00000000), ref: 6D0DDA21
                                                                                                  • GetLastError.KERNEL32(00000000,?,40000000,00000000,00000000,00000003,00000000,00000000), ref: 6D0DDA37
                                                                                                  • GetLastError.KERNEL32(00000000,?,40000000,00000000,00000000,00000003,00000000,00000000), ref: 6D0DDA4D
                                                                                                  • CloseHandle.KERNEL32(?), ref: 6D0DDA6E
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 6D0DDA79
                                                                                                  • GetLastError.KERNEL32(Unable to open %s.,?,?,40000000,00000000,00000000,00000003,00000000,00000000), ref: 6D0DDA9D
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorFileLast$Time$CloseCreateHandleLocal
                                                                                                  • String ID: CabCallback$CloseHandle()$CreateFile()$Extracted file %s from cab$GetFileTime()$LocalFileTimeToFileTime()$SPFILENOTIFY_FILEEXTRACTED: error = %d.$SetFileTime()$Unable to open %s.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
                                                                                                  • API String ID: 2084486756-1895325444
                                                                                                  • Opcode ID: 2f40f41a71a78966f20b4f9323b4225ec212812ed3036fdf02b79488f61d61ca
                                                                                                  • Instruction ID: 246a7758d85724878d8f80e30545b854d2ec94a79d62323febdaac6c2d6e3301
                                                                                                  • Opcode Fuzzy Hash: 2f40f41a71a78966f20b4f9323b4225ec212812ed3036fdf02b79488f61d61ca
                                                                                                  • Instruction Fuzzy Hash: 9241AE71644318BBFB918BA98C44FBA7BACEB4A210F808557F918F61D5DB30DA40CE71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 623 6d0d95fd-6d0d963a LoadLibraryA 624 6d0d997a-6d0d9985 GetLastError 623->624 625 6d0d9640-6d0d9657 GetProcAddress 623->625 626 6d0d99be-6d0d99c8 call 6d0d6210 624->626 627 6d0d9987-6d0d998a 624->627 628 6d0d965d-6d0d9672 625->628 629 6d0d984e-6d0d985d GetProcAddress 625->629 640 6d0d99c9-6d0d99dc call 6d0dfc2e 626->640 627->626 630 6d0d998c-6d0d998f 627->630 628->629 641 6d0d9678-6d0d9693 628->641 632 6d0d9960 629->632 633 6d0d9863-6d0d987a 629->633 630->626 634 6d0d9991-6d0d9996 630->634 637 6d0d9965-6d0d996a call 6d0d6210 632->637 643 6d0d9959-6d0d995e 633->643 644 6d0d9880-6d0d98dd call 6d0e0721 * 3 633->644 634->626 639 6d0d9998-6d0d99bc GetLastError call 6d0d6391 634->639 652 6d0d996b-6d0d9978 FreeLibrary 637->652 639->640 654 6d0d983d-6d0d9849 641->654 655 6d0d9699-6d0d96b7 641->655 643->637 666 6d0d98df-6d0d98e5 644->666 667 6d0d9939-6d0d9957 call 6d0d6391 644->667 652->640 654->652 660 6d0d96bd 655->660 661 6d0d9831-6d0d9839 655->661 663 6d0d96c2-6d0d96ca 660->663 661->654 663->661 665 6d0d96d0-6d0d96f0 663->665 673 6d0d96f6-6d0d9752 call 6d0e0721 * 3 665->673 674 6d0d9801-6d0d982b 665->674 666->667 669 6d0d98e7-6d0d98e9 666->669 667->652 669->667 672 6d0d98eb-6d0d98f1 669->672 675 6d0d98f8 672->675 676 6d0d98f3-6d0d98f6 672->676 673->674 692 6d0d9758-6d0d975e 673->692 674->661 674->663 678 6d0d98fb-6d0d9937 call 6d0e06fa * 3 call 6d0d6210 675->678 676->675 676->678 678->652 692->674 694 6d0d9764-6d0d9766 692->694 694->674 696 6d0d976c-6d0d9772 694->696 697 6d0d9779 696->697 698 6d0d9774-6d0d9777 696->698 699 6d0d977c-6d0d97b8 call 6d0e06fa * 3 call 6d0d6210 697->699 698->697 698->699 707 6d0d97bd-6d0d97ca 699->707 708 6d0d97cc-6d0d97cf 707->708 709 6d0d97d1-6d0d97d3 707->709 708->709 710 6d0d97ff 708->710 711 6d0d97d5-6d0d97d7 709->711 712 6d0d97e2-6d0d97eb 709->712 710->674 713 6d0d97dd-6d0d97e0 711->713 712->713 714 6d0d97ed-6d0d97f0 712->714 716 6d0d97f2 713->716 715 6d0d97f5 714->715 714->716 715->710 716->715
                                                                                                  APIs
                                                                                                  • LoadLibraryA.KERNEL32(mscoree.dll), ref: 6D0D962C
                                                                                                  • GetProcAddress.KERNEL32(00000000,CLRCreateInstance), ref: 6D0D964D
                                                                                                  • GetProcAddress.KERNEL32(?,GetCORVersion), ref: 6D0D9859
                                                                                                  • FreeLibrary.KERNEL32(?), ref: 6D0D9971
                                                                                                  • GetLastError.KERNEL32 ref: 6D0D9980
                                                                                                  • GetLastError.KERNEL32(Unable to load mscoree.dll.), ref: 6D0D999D
                                                                                                  Strings
                                                                                                  • GetCORVersion, xrefs: 6D0D984E
                                                                                                  • GetDotNETFrameworkVersion, xrefs: 6D0D9940, 6D0D99A5
                                                                                                  • Unable to load mscoree.dll., xrefs: 6D0D9998
                                                                                                  • mscoree.dll is not available., xrefs: 6D0D99BE
                                                                                                  • GetCORVersion() failed, function deprecated for .NET Framework 4.0., xrefs: 6D0D9959
                                                                                                  • GetCORVersion not found in mscoree.dll, function deprecated for .NET Framework 4.0., xrefs: 6D0D9960
                                                                                                  • CLR version number = %d.%d.%d, xrefs: 6D0D9920
                                                                                                  • LoadLibrary(), xrefs: 6D0D99A0
                                                                                                  • CLRCreateInstance, xrefs: 6D0D9647
                                                                                                  • CLR version number = %d.%d.%d, xrefs: 6D0D97B3
                                                                                                  • Unable to get CLR build number., xrefs: 6D0D9939
                                                                                                  • mscoree.dll, xrefs: 6D0D9619
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h, xrefs: 6D0D994A, 6D0D99AF
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressErrorLastLibraryProc$FreeLoad
                                                                                                  • String ID: CLR version number = %d.%d.%d$CLR version number = %d.%d.%d$CLRCreateInstance$GetCORVersion$GetCORVersion not found in mscoree.dll, function deprecated for .NET Framework 4.0.$GetCORVersion() failed, function deprecated for .NET Framework 4.0.$GetDotNETFrameworkVersion$LoadLibrary()$Unable to get CLR build number.$Unable to load mscoree.dll.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h$mscoree.dll$mscoree.dll is not available.
                                                                                                  • API String ID: 1490555712-1049337429
                                                                                                  • Opcode ID: 53244168210105b338c635b2f5ff64d02788b1f6872d2491e07d674b11b191df
                                                                                                  • Instruction ID: b0e786744856b64ab5e38b7cafa265721546762f7c7bf32473b78beffcd4c62e
                                                                                                  • Opcode Fuzzy Hash: 53244168210105b338c635b2f5ff64d02788b1f6872d2491e07d674b11b191df
                                                                                                  • Instruction Fuzzy Hash: 46A15BB19053199BEBA08FA5DCD0BAAB7B8FF44704F1044AFE64AA7141DB74D980CF24
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  • GetWindowsDirectoryA.KERNEL32(?,00000104,?,00000258), ref: 6D0D60D5
                                                                                                  • OutputDebugStringA.KERNEL32(DXSETUP_DPF(): Unable to open log file.,?,00000258), ref: 6D0D60E4
                                                                                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 6D0D6124
                                                                                                  • GetLastError.KERNEL32 ref: 6D0D612E
                                                                                                  • __wstrtime.LIBCMT ref: 6D0D6187
                                                                                                  • __wstrtime.LIBCMT ref: 6D0D6190
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Directory__wstrtime$CreateDebugErrorLastOutputStringWindows
                                                                                                  • String ID: %s %s: %s: %s$%s %s: %s: (null)$%s%s$%s%s%s$,fm$C:\Windows\Logs\DirectX.log$DXSETUP_DPF(): GetWindowsDirectory() failed.$DXSETUP_DPF(): Unable to open log file.$DXSETUP_DPF(): failed to create log directory.$DXSETUP_DPF(): path name too long.$Logs\DirectX.log$\Logs$dsetup32
                                                                                                  • API String ID: 1979891910-367957193
                                                                                                  • Opcode ID: ae673d6f654804c0ededb7666a6a9e633402b9028b4d6c5fd66d6e703c304d7c
                                                                                                  • Instruction ID: 00f5fbecf9522ca584665da7f21887b80b3d0ab5f5cf366f36dbf6df4b403f62
                                                                                                  • Opcode Fuzzy Hash: ae673d6f654804c0ededb7666a6a9e633402b9028b4d6c5fd66d6e703c304d7c
                                                                                                  • Instruction Fuzzy Hash: AA31726590871DBBF790D7E4DC44FBF77ACAB06604F848467FA08E3042EB31D61446A6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  • OutputDebugStringA.KERNEL32(DLL_PROCESS_ATTACH), ref: 73AC377E
                                                                                                  • CreateMutexA.KERNEL32(00000000,00000000,DSETUP DLL Mutex), ref: 73AC378B
                                                                                                  • GetLastError.KERNEL32(?,?,DSETUP DLL Mutex), ref: 73AC37A3
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC37D2
                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 73AC37FA
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC3809
                                                                                                  • OutputDebugStringA.KERNEL32(DLL_PROCESS_DETACH), ref: 73AC381F
                                                                                                  • CloseHandle.KERNEL32 ref: 73AC3839
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC3855
                                                                                                  • FreeLibrary.KERNEL32(6D0D0000), ref: 73AC3876
                                                                                                  • GetLastError.KERNEL32 ref: 73AC3880
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$CloseDebugHandleOutputString$CreateFreeLibraryMutex
                                                                                                  • String ID: CloseHandle()$CreateMutex()$DLL_PROCESS_ATTACH$DLL_PROCESS_DETACH$DSETUP DLL Mutex$DllMain$FreeLibrary()$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
                                                                                                  • API String ID: 619473299-1708209621
                                                                                                  • Opcode ID: 1bd22b2eb21b3c535303502d1e9bc5cd875acf1e1d7c5b39e770763fb5f9d1ea
                                                                                                  • Instruction ID: f5a774659180e35c46dd4e4f06ac21fa96acfb3d2c5c52d0a2d40c1de2532836
                                                                                                  • Opcode Fuzzy Hash: 1bd22b2eb21b3c535303502d1e9bc5cd875acf1e1d7c5b39e770763fb5f9d1ea
                                                                                                  • Instruction Fuzzy Hash: E0310A76B00390BFE7007B6A8C4BF5A76ACFB09751B24412BF91ED618DD729C4128BE4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  • GetWindowsDirectoryA.KERNEL32(?,00000104,?,00000258), ref: 73AC6248
                                                                                                  • OutputDebugStringA.KERNEL32(DXSETUP_DPF(): Unable to open log file.,?,00000258), ref: 73AC6257
                                                                                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 73AC6297
                                                                                                  • GetLastError.KERNEL32 ref: 73AC62A1
                                                                                                  • __wstrtime.LIBCMT ref: 73AC62FA
                                                                                                  • __wstrtime.LIBCMT ref: 73AC6303
                                                                                                    • Part of subcall function 73AC4A54: _vswprintf_s.LIBCMT ref: 73AC4A87
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Directory__wstrtime$CreateDebugErrorLastOutputStringWindows_vswprintf_s
                                                                                                  • String ID: %s %s: %s: %s$%s %s: %s: (null)$%s%s$%s%s%s$C:\Windows\Logs\DirectX.log$DSETUP$DXSETUP_DPF(): GetWindowsDirectory() failed.$DXSETUP_DPF(): Unable to open log file.$DXSETUP_DPF(): failed to create log directory.$DXSETUP_DPF(): path name too long.$Logs\DirectX.log$\Logs
                                                                                                  • API String ID: 2971342511-2926611891
                                                                                                  • Opcode ID: bf66dddc1860cf854c470858eaaf0dcbeaf7b676626c9c680630ba79c6080b26
                                                                                                  • Instruction ID: 668d834278058a2b461b21ceda7491b577687f0af8c96f15c1237f137bc56697
                                                                                                  • Opcode Fuzzy Hash: bf66dddc1860cf854c470858eaaf0dcbeaf7b676626c9c680630ba79c6080b26
                                                                                                  • Instruction Fuzzy Hash: 3D31F8B2E002DC6FEF15D7A58D4BFDB737CAB08200F08016BE995E6159EB34D6058A55
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  • LoadLibraryA.KERNEL32(sfc.dll), ref: 6D0D6A1B
                                                                                                  • GetProcAddress.KERNEL32(00000000,00000008), ref: 6D0D6A37
                                                                                                  • GetProcAddress.KERNEL32(00000009), ref: 6D0D6A46
                                                                                                  • GetProcAddress.KERNEL32(SRSetRestorePoint), ref: 6D0D6A58
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressProc$LibraryLoad
                                                                                                  • String ID: FreeLibrary()$GetProcAddress()$LoadLibrary()$LoadSfcDLL$Module: %s$SRSetRestorePoint$Unable to load %s.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\instcat.cpp$sfc.dll
                                                                                                  • API String ID: 2238633743-316262473
                                                                                                  • Opcode ID: b2fa9a1832c26609fc8d3bd0504efa79c5c94ea70beda90ba2dbada566ee2faa
                                                                                                  • Instruction ID: 724e363e1c46171e2d8835fa035ad4cd62e7327c3620d952a813f731a6ed7dc2
                                                                                                  • Opcode Fuzzy Hash: b2fa9a1832c26609fc8d3bd0504efa79c5c94ea70beda90ba2dbada566ee2faa
                                                                                                  • Instruction Fuzzy Hash: B121B679904319BFFF909F998C84FAA7A78EB56B80B50442FF545E3191EF7054008E93
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  APIs
                                                                                                  • GetWindowsDirectoryA.KERNEL32(0000028C,00000104,0000069C,00000104,DirectX.cab,00000598,00000104,directX.inf,?,?,?,6D0DF10C), ref: 6D0DB15C
                                                                                                  • GetLastError.KERNEL32(00000000,?,?,?,6D0DF10C), ref: 6D0DB167
                                                                                                  • GetSystemDirectoryA.KERNEL32(00000390,00000104,0000028C,00000104,0000028C,?,?,?,6D0DF10C), ref: 6D0DB1D2
                                                                                                  • GetLastError.KERNEL32(00000000,?,?,?,6D0DF10C), ref: 6D0DB1DD
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DirectoryErrorLast$SystemWindows
                                                                                                  • String ID: CSetup::CSetup$DXNT.cab$DirectX.cab$GetSystemDirectory()$GetWindowsDirectory()$appendSlash() failed.$directX.inf$dxnetsrv.inf$dxnt.inf$dxxp.inf$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
                                                                                                  • API String ID: 3455926257-880669496
                                                                                                  • Opcode ID: 9bdb7fe7f413c5927f0e92bf7e3a802828865e2112176fa048e73e6254b9f234
                                                                                                  • Instruction ID: 4da9eb9819c8455ff688b6136bea0a230f68fe4f628502c445ab4f7913337857
                                                                                                  • Opcode Fuzzy Hash: 9bdb7fe7f413c5927f0e92bf7e3a802828865e2112176fa048e73e6254b9f234
                                                                                                  • Instruction Fuzzy Hash: 81510FB1905B01AFE3B08F7B8880B97FAF8BF49304F81492FA5AED3541D774A0048B61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 982 f13f72-f13fa0 RegCreateKeyExA 983 f13fa2-f13fc2 call f1390a 982->983 984 f13fc7-f13fec RegSetValueExA 982->984 992 f14086-f14088 983->992 986 f14045-f1404d 984->986 987 f13fee-f14007 RegSetValueExA 984->987 991 f14052-f14058 call f1390a 986->991 989 f14009-f1402f call f1390a RegDeleteValueA 987->989 990 f1405e-f14069 RegCloseKey 987->990 1001 f14031-f14034 989->1001 1002 f1405b 989->1002 995 f14081-f14085 990->995 996 f1406b-f1407e call f1390a 990->996 991->1002 995->992 996->995 1001->1002 1003 f14036-f14043 1001->1003 1002->990 1003->991
                                                                                                  APIs
                                                                                                  • RegCreateKeyExA.ADVAPI32(80000002,Software\Microsoft\DirectX,00000000,00000000,00000000,00000002,00000000,?,00000000), ref: 00F13F98
                                                                                                  • RegSetValueExA.ADVAPI32(?,command,00000000,00000004,00000001,00000004), ref: 00F13FDA
                                                                                                  • RegSetValueExA.ADVAPI32(?,DXSetup,00000000,00000004,00000001,00000004), ref: 00F13FFF
                                                                                                  • RegDeleteValueA.ADVAPI32(?,Command), ref: 00F14027
                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00F14061
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F1393B
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F13944
                                                                                                    • Part of subcall function 00F1390A: _strrchr.LIBCMT ref: 00F1398A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value$__wstrtime$CloseCreateDelete_strrchr
                                                                                                  • String ID: Command$DXSetup$RegCloseKey()$RegCreateKeyEx()$RegDeleteValue()$RegSetValueEx()$SetDXSetupRegValue$Software\Microsoft\DirectX$command$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp
                                                                                                  • API String ID: 3730219414-2970793184
                                                                                                  • Opcode ID: b7eabb25ef6bb97f729c585c6a743b8b5be23a9e78d89d6bfe741347fd90131f
                                                                                                  • Instruction ID: 738a7d7cadfd8594d87f37fe2cb30cb6474dd22129785458e77842de6cc60d05
                                                                                                  • Opcode Fuzzy Hash: b7eabb25ef6bb97f729c585c6a743b8b5be23a9e78d89d6bfe741347fd90131f
                                                                                                  • Instruction Fuzzy Hash: DB21A3F2A8020CBEF7205A418CC7EFB392DEB45BA5F504524F704A51C1D2A19EC4B6B2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • _memset.LIBCMT ref: 6D0DE4A7
                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104,?,dxupdate.cab,?), ref: 6D0DE4D1
                                                                                                  • GetLastError.KERNEL32(00000000,?,dxupdate.cab,?), ref: 6D0DE4DC
                                                                                                  Strings
                                                                                                  • Unable to initialize CWinTrust., xrefs: 6D0DE650
                                                                                                  • CSetup::DXCheckTrust, xrefs: 6D0DE4E8, 6D0DE5DF, 6D0DE60A, 6D0DE627, 6D0DE657
                                                                                                  • dxupdate.cab, xrefs: 6D0DE467
                                                                                                  • MultiByteToWideChar(), xrefs: 6D0DE4E3
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp, xrefs: 6D0DE4F2, 6D0DE631, 6D0DE661
                                                                                                  • 0, xrefs: 6D0DE52B
                                                                                                  • %s is not trusted. The file may be damaged. Please check valid certificate is installed and Cryptographic Services are enabled., xrefs: 6D0DE5FF
                                                                                                  • DXCheckTrust(): %s is trusted., xrefs: 6D0DE5B4
                                                                                                  • %s is not trusted. The file is not signed properly., xrefs: 6D0DE5D4
                                                                                                  • WinVerifyTrust(), xrefs: 6D0DE5DA, 6D0DE605, 6D0DE622
                                                                                                  • %s is not trusted due to certificate problem. Please check valid certificate is installed and Cryptographic Services are enabled., xrefs: 6D0DE61C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ByteCharErrorLastMultiWide_memset
                                                                                                  • String ID: %s is not trusted due to certificate problem. Please check valid certificate is installed and Cryptographic Services are enabled.$%s is not trusted. The file is not signed properly.$%s is not trusted. The file may be damaged. Please check valid certificate is installed and Cryptographic Services are enabled.$0$CSetup::DXCheckTrust$DXCheckTrust(): %s is trusted.$MultiByteToWideChar()$Unable to initialize CWinTrust.$WinVerifyTrust()$dxupdate.cab$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
                                                                                                  • API String ID: 1545292163-1626623308
                                                                                                  • Opcode ID: 1a7913680664c3bb9377948538cb7e37f15197075a366528303a84c13a24555d
                                                                                                  • Instruction ID: 93b2f0a94530c3b4f517f62be4371d4a3b9d32df7be4f72436d605ad428f6859
                                                                                                  • Opcode Fuzzy Hash: 1a7913680664c3bb9377948538cb7e37f15197075a366528303a84c13a24555d
                                                                                                  • Instruction Fuzzy Hash: 7851B6719443197AFBA18F588C88BBDB7B8EB48344F5141ABE64CE61C1EB708A848F51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • OutputDebugStringA.KERNEL32(DLL_PROCESS_ATTACH), ref: 6D0DE74B
                                                                                                    • Part of subcall function 6D0DB021: GetWindowsDirectoryA.KERNEL32(0000028C,00000104,0000069C,00000104,DirectX.cab,00000598,00000104,directX.inf,?,?,?,6D0DF10C), ref: 6D0DB15C
                                                                                                    • Part of subcall function 6D0DB021: GetLastError.KERNEL32(00000000,?,?,?,6D0DF10C), ref: 6D0DB167
                                                                                                    • Part of subcall function 6D0DB021: GetSystemDirectoryA.KERNEL32(00000390,00000104,0000028C,00000104,0000028C,?,?,?,6D0DF10C), ref: 6D0DB1D2
                                                                                                    • Part of subcall function 6D0DB021: GetLastError.KERNEL32(00000000,?,?,?,6D0DF10C), ref: 6D0DB1DD
                                                                                                  • CreateMutexA.KERNEL32(00000000,00000000,DSETUP32 DLL Mutex), ref: 6D0DE78A
                                                                                                  • GetLastError.KERNEL32 ref: 6D0DE79C
                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 6D0DE7C5
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 6D0DE7D0
                                                                                                  • OutputDebugStringA.KERNEL32(DLL_PROCESS_DETACH), ref: 6D0DE7F3
                                                                                                  • CloseHandle.KERNEL32(?), ref: 6D0DE81B
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 6D0DE826
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$CloseDebugDirectoryHandleOutputString$CreateMutexSystemWindows
                                                                                                  • String ID: CloseHandle()$DLL_PROCESS_ATTACH$DLL_PROCESS_DETACH$DSETUP32 DLL Mutex$DllMain$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
                                                                                                  • API String ID: 3404843948-3774820900
                                                                                                  • Opcode ID: e15cdfc7f9f85dea4c2922b9d41b572cadcc255bc16a25b84821300b6193278d
                                                                                                  • Instruction ID: 128782fb877072367dbe458da00ca9a5cc8ea4e44d81178c776e0848446464d4
                                                                                                  • Opcode Fuzzy Hash: e15cdfc7f9f85dea4c2922b9d41b572cadcc255bc16a25b84821300b6193278d
                                                                                                  • Instruction Fuzzy Hash: 14318475608316BBFBC0AF79CC88B3E7AB9F70A755751883BFA99D3141EB3094408A51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetLastError.KERNEL32(00000003,00000000), ref: 6D0D8F20
                                                                                                  • SetLastError.KERNEL32(00000001,?,?,?,?,?,?,?), ref: 6D0D91A6
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast
                                                                                                  • String ID: CSetup::GetCDXUpdate$GetCDXUpdate(): Extracting %s from %s.$GetCDXUpdate(): Loading %s in %s.$GetCDXUpdate(): no DXUpdate.$SetupIterateCabinet()$Unable to create path string, %s%s.$Unable to find dxupdate.dll.$Unable to initialize CDXUpdate.$Unable to initialize CSetupAPI.$Unable to iterate through %s. The file may be damaged.$dxupdate.cab$dxupdate.dll$e:\bt\382730\setup\deliverables\dsetup\dsetup32\dxupdate.cpp
                                                                                                  • API String ID: 1452528299-2091673329
                                                                                                  • Opcode ID: dcbfaa0e91f066c15b1f470b4b501fd0273fc77b2a468157d114a0dc372f4a52
                                                                                                  • Instruction ID: debd8394663952d75cca9cd3a9aaf3c79b593e1ec4e8da014191fa5b0b161a31
                                                                                                  • Opcode Fuzzy Hash: dcbfaa0e91f066c15b1f470b4b501fd0273fc77b2a468157d114a0dc372f4a52
                                                                                                  • Instruction Fuzzy Hash: 08613730A483197AF7E567359C05FFF75AC9F8A748F410057FA08A70C1FFA19A408AA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetVersionExA.KERNEL32(?), ref: 6D0DD7DC
                                                                                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,WinNT@64), ref: 6D0DD84B
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 6D0DD86E
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CurrentErrorLastProcessVersion
                                                                                                  • String ID: ($IsWow64$IsWow64(): Windows 2000 or Windows 9x.$IsWow64(): not Wow64 process.$IsWow64(): running on Wow64.$IsWow64Process()$Unable to initialize CKernel32.$WinNT@64$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
                                                                                                  • API String ID: 722992446-1906961222
                                                                                                  • Opcode ID: 2e6f055966701d5757389866b8b8736809420b825ed19d655d35afa52e30fcc6
                                                                                                  • Instruction ID: 0d424857debe788db9d65856827a75e050f641401c0815a737253d5c9eb7bdba
                                                                                                  • Opcode Fuzzy Hash: 2e6f055966701d5757389866b8b8736809420b825ed19d655d35afa52e30fcc6
                                                                                                  • Instruction Fuzzy Hash: 3231F430944305AAFBA29B79C844BAD77F8EBCAB24F75456BF518A70C2DB3054848E31
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\DirectX,00000000,00000002,?), ref: 00F140AA
                                                                                                  • RegDeleteValueA.ADVAPI32(?,DXSetup), ref: 00F140C1
                                                                                                  • RegDeleteValueA.ADVAPI32(?,Command), ref: 00F140FA
                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00F1411F
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F1393B
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F13944
                                                                                                    • Part of subcall function 00F1390A: _strrchr.LIBCMT ref: 00F1398A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DeleteValue__wstrtime$CloseOpen_strrchr
                                                                                                  • String ID: Command$DXSetup$DelDXSetupRegValue$RegCloseKey().$RegDeleteValue()$RegOpenKeyEx()$Software\Microsoft\DirectX$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp
                                                                                                  • API String ID: 1208366470-3975958792
                                                                                                  • Opcode ID: 8dbce647d1b1c9b3071050c9e392e0818dd25c060092f06423546ad3abf91641
                                                                                                  • Instruction ID: 14644f33aec5d6039162234cb53f02f8aeeb3118f26023589a4d03c32461783b
                                                                                                  • Opcode Fuzzy Hash: 8dbce647d1b1c9b3071050c9e392e0818dd25c060092f06423546ad3abf91641
                                                                                                  • Instruction Fuzzy Hash: 06117C72B802087AFB2116164C0BFEB391DEBA6BA1F554124FB04B41D2E691DEC0F566
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetModuleFileNameA.KERNEL32(?,00000104), ref: 00F14C87
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 00F14C92
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F1393B
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F13944
                                                                                                    • Part of subcall function 00F1390A: _strrchr.LIBCMT ref: 00F1398A
                                                                                                  • _strrchr.LIBCMT ref: 00F14CC6
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime_strrchr$ErrorFileLastModuleName
                                                                                                  • String ID: GetModuleFileName()$IsFlatImage$IsFlatImage(): TRUE.$IsFlatImage(): path does not have back slash.$directx.cab$directx.inf$dxnt.cab$dxntunp.inf$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp
                                                                                                  • API String ID: 3943934939-995788670
                                                                                                  • Opcode ID: 2ee9c5322e1be418ce92a49fea33b6379a277fe7d098853c7871c7d9917f145c
                                                                                                  • Instruction ID: 3f6ede24eb437edb468573d2fef5e94f5f3aba5f7d3d14005069fcdabc97f2d0
                                                                                                  • Opcode Fuzzy Hash: 2ee9c5322e1be418ce92a49fea33b6379a277fe7d098853c7871c7d9917f145c
                                                                                                  • Instruction Fuzzy Hash: D8213F75A843087EEB10E770EC42FE677ECAB54354F400061FA45D64C1EEA8EEC87662
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CreateMutexA.KERNEL32(00000000,00000000,***DirectXSetupA***), ref: 73AC4FC2
                                                                                                  • GetLastError.KERNEL32 ref: 73AC4FCE
                                                                                                  • iDirectXSetup.DSETUP32(?,?), ref: 73AC5008
                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 73AC501A
                                                                                                  • GetLastError.KERNEL32(Not fatal...), ref: 73AC5029
                                                                                                  Strings
                                                                                                  • CloseHandle(), xrefs: 73AC5030
                                                                                                  • DirectXSetupA, xrefs: 73AC5035
                                                                                                  • ***DirectXSetupA***, xrefs: 73AC4FB9
                                                                                                  • Not fatal..., xrefs: 73AC5024
                                                                                                  • DirectXSetupA(): hWnd: %08X dwFlags: %08X, xrefs: 73AC4FAC
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c, xrefs: 73AC503F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$CloseCreateDirectHandleMutexSetup
                                                                                                  • String ID: ***DirectXSetupA***$CloseHandle()$DirectXSetupA$DirectXSetupA(): hWnd: %08X dwFlags: %08X$Not fatal...$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
                                                                                                  • API String ID: 1105574552-1566507652
                                                                                                  • Opcode ID: d4c94e10ca5feb95c8bc479559f45add2feac1f13990b8aeea62fb5435eb3460
                                                                                                  • Instruction ID: 3c611d8f36cf0ea826b328b4b66252f004443feab78fc2952204fd533527556f
                                                                                                  • Opcode Fuzzy Hash: d4c94e10ca5feb95c8bc479559f45add2feac1f13990b8aeea62fb5435eb3460
                                                                                                  • Instruction Fuzzy Hash: C611EC73B00290BFEB013A9B9D07F9B7B6CEB55351F14412BFD1AD6159DB60C41146E1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __get_daylight.LIBCMT ref: 73ACF7E8
                                                                                                  • __get_wpgmptr.LIBCMT ref: 73ACF803
                                                                                                  • CreateFileA.KERNEL32(00000000,00000080,00000000,0000000C,00000001,00000080,00000000,00000109,00000000,00000000), ref: 73ACF9DA
                                                                                                  • GetLastError.KERNEL32 ref: 73ACFA02
                                                                                                  • __dosmaperr.LIBCMT ref: 73ACFA09
                                                                                                  • GetFileType.KERNEL32(00000000), ref: 73ACFA1C
                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 73ACFA42
                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 73ACFA6E
                                                                                                  • __locking.LIBCMT ref: 73ACFD62
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseFileHandle$CreateErrorLastType__dosmaperr__get_daylight__get_wpgmptr__locking
                                                                                                  • String ID: @
                                                                                                  • API String ID: 690964824-2766056989
                                                                                                  • Opcode ID: d40ed3f1b0542ec5eb41ca2dfb627649572e188dea9dc549c41006d835e8f9b2
                                                                                                  • Instruction ID: ff9163b7ecfe3e74bd58eb94784fb997dec51fb22223f16ed8c1e042344df1ff
                                                                                                  • Opcode Fuzzy Hash: d40ed3f1b0542ec5eb41ca2dfb627649572e188dea9dc549c41006d835e8f9b2
                                                                                                  • Instruction Fuzzy Hash: 5802243190528B9FEB128F64C8A7B9DBBB5EB09314F28465FE462962ECD735C944CB01
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __get_daylight.LIBCMT ref: 6D0E8D39
                                                                                                  • __get_wpgmptr.LIBCMT ref: 6D0E8D54
                                                                                                  • CreateFileA.KERNEL32(6D0D7D8D,00000080,6D0D7D8D,0000000C,00000001,00000080,00000000,00000109,00000000,00000000), ref: 6D0E8F2B
                                                                                                  • GetLastError.KERNEL32 ref: 6D0E8F53
                                                                                                  • __dosmaperr.LIBCMT ref: 6D0E8F5A
                                                                                                  • GetFileType.KERNEL32(00000000), ref: 6D0E8F6D
                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 6D0E8F93
                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 6D0E8FBF
                                                                                                  • __locking.LIBCMT ref: 6D0E92B3
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseFileHandle$CreateErrorLastType__dosmaperr__get_daylight__get_wpgmptr__locking
                                                                                                  • String ID: @
                                                                                                  • API String ID: 690964824-2766056989
                                                                                                  • Opcode ID: 787e7a0a9b00eabb15c52e6cfe447efce734e4ec955e5f56a2d12bc526f5f6f4
                                                                                                  • Instruction ID: 8ee0476b7f62280259c592dffaeb8b853b088eca6ce38d1da9f5f39fc35dbe54
                                                                                                  • Opcode Fuzzy Hash: 787e7a0a9b00eabb15c52e6cfe447efce734e4ec955e5f56a2d12bc526f5f6f4
                                                                                                  • Instruction Fuzzy Hash: 1C02003190824A9EFF168F68DC81BBDBBF0FB85398F644669E560D72E1D7358984CB01
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __get_daylight.LIBCMT ref: 00F1FFA9
                                                                                                  • __get_wpgmptr.LIBCMT ref: 00F1FFC4
                                                                                                  • CreateFileA.KERNEL32(?,00000080,?,0000000C,00000001,00000080,00000000,00000109,00000000,00000000), ref: 00F2019B
                                                                                                  • GetLastError.KERNEL32 ref: 00F201C3
                                                                                                  • __dosmaperr.LIBCMT ref: 00F201CA
                                                                                                  • GetFileType.KERNEL32(00000000), ref: 00F201DD
                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00F20203
                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00F2022F
                                                                                                  • __locking.LIBCMT ref: 00F20523
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseFileHandle$CreateErrorLastType__dosmaperr__get_daylight__get_wpgmptr__locking
                                                                                                  • String ID: @
                                                                                                  • API String ID: 690964824-2766056989
                                                                                                  • Opcode ID: ca0824079b2d598ee5e4c289de6e71b0d245c2d8fe07cd6b13750f3fd15eda49
                                                                                                  • Instruction ID: 7869f4f41285493d5f40731955e3b448566790d5f43ae2329f09a6fc88957d33
                                                                                                  • Opcode Fuzzy Hash: ca0824079b2d598ee5e4c289de6e71b0d245c2d8fe07cd6b13750f3fd15eda49
                                                                                                  • Instruction Fuzzy Hash: C3023733C046199FEB21DF68EC867AD7BB0EB01324F284669E551971E2DB398D84FB41
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F1393B
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F13944
                                                                                                    • Part of subcall function 00F1390A: _strrchr.LIBCMT ref: 00F1398A
                                                                                                  • CharLowerA.USER32(00000004), ref: 00F14BC6
                                                                                                  • lstrcmpiA.KERNEL32(00000000,00F28000), ref: 00F14BE5
                                                                                                  • _strtok.LIBCMT ref: 00F14C24
                                                                                                    • Part of subcall function 00F17D7D: __getptd.LIBCMT ref: 00F17D9B
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime$CharLower__getptd_strrchr_strtoklstrcmpi
                                                                                                  • String ID: CommandLine: %s$No command line switch$ParseCommandLine$StringCchCopyA()$Unable to allocate memory block.$Unable to copy string %s.$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp
                                                                                                  • API String ID: 1047108780-590517559
                                                                                                  • Opcode ID: 5edba768f5e660fb3cd49dcca2eb1a37df4d3d1b5d064fe7f26d5bc9d16e3858
                                                                                                  • Instruction ID: ab2ba0236af60582519c0e1e94723e17c279469b890e99599ac34c93a1293960
                                                                                                  • Opcode Fuzzy Hash: 5edba768f5e660fb3cd49dcca2eb1a37df4d3d1b5d064fe7f26d5bc9d16e3858
                                                                                                  • Instruction Fuzzy Hash: 5F31D6B2D09248BFDB20DF50CC85EDE7AA8EBC0764F204429F605A6150E375EDC0BA92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetFileAttributesA.KERNEL32(00000104,00000000), ref: 6D0D9F63
                                                                                                  • GetLastError.KERNEL32 ref: 6D0D9F6E
                                                                                                  • _strnlen.LIBCMT ref: 6D0D9FCF
                                                                                                  • SHFileOperationA.SHELL32(?,?,00000104,00000104,?,00000104), ref: 6D0DA020
                                                                                                  • DeleteFileA.KERNEL32(00000104,?,00000104), ref: 6D0DA02F
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  • GetLastError.KERNEL32(Unable to remove %s.,00000104,?,00000104), ref: 6D0DA041
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File$ErrorLast__wstrtime$AttributesDeleteOperation_strnlen_strrchr
                                                                                                  • String ID: DXRemoveFile$GetFileAttributes()$Unable to remove %s.$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
                                                                                                  • API String ID: 3110083123-1900097680
                                                                                                  • Opcode ID: 41e6d251eb06029057d705e7a17642a96d9f0e3f103324f03a340b50a0099ccf
                                                                                                  • Instruction ID: 2ff0b3e2adff26aad96c39f03949dba79bfcef27f574367b0d7e7d8f32478070
                                                                                                  • Opcode Fuzzy Hash: 41e6d251eb06029057d705e7a17642a96d9f0e3f103324f03a340b50a0099ccf
                                                                                                  • Instruction Fuzzy Hash: 7D21DB71904318AFEB509FA49C45FEDB7B8EF0A354F5041A7EA48E7181DB705A508FA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetModuleFileNameA.KERNEL32(?,?,00000104,?), ref: 6D0D9AA4
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 6D0D9AAF
                                                                                                  • GetShortPathNameA.KERNEL32(?,?,00000104,00000104), ref: 6D0D9AE0
                                                                                                  • _strnlen.LIBCMT ref: 6D0D9AF2
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 6D0D9B00
                                                                                                  • _strnlen.LIBCMT ref: 6D0D9B1E
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLastName_strnlen$FileModulePathShort
                                                                                                  • String ID: GetModuleFileName()$GetShortPathName()$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h$getWorkingDirectory
                                                                                                  • API String ID: 1941469614-905520932
                                                                                                  • Opcode ID: 1fa7f60a223fa62259fc8a81c684d2b47bb894ca27dd5859f120176eca8ccd8a
                                                                                                  • Instruction ID: ffaadf3d6874eab36aaccfef620a33006b6a878fba7e5d3337ea94200a892c62
                                                                                                  • Opcode Fuzzy Hash: 1fa7f60a223fa62259fc8a81c684d2b47bb894ca27dd5859f120176eca8ccd8a
                                                                                                  • Instruction Fuzzy Hash: E421F8362087166AF7919B79ADA4FFFBBACEB42328F510017F909D7182EE709500C671
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                    • Part of subcall function 00F1935E: GetModuleHandleA.KERNEL32(00000000), ref: 00F19365
                                                                                                  • GetStartupInfoA.KERNEL32(?,000000F0), ref: 00F16EED
                                                                                                  • GetVersionExA.KERNEL32(00000094), ref: 00F16F0B
                                                                                                  • _fast_error_exit.LIBCMT ref: 00F16F81
                                                                                                  • _fast_error_exit.LIBCMT ref: 00F16F92
                                                                                                  • __amsg_exit.LIBCMT ref: 00F16FA6
                                                                                                  • GetCommandLineA.KERNEL32 ref: 00F16FAC
                                                                                                  • ___crtGetEnvironmentStringsA.LIBCMT ref: 00F16FB7
                                                                                                  • __amsg_exit.LIBCMT ref: 00F16FCC
                                                                                                  • __amsg_exit.LIBCMT ref: 00F16FDD
                                                                                                  • __amsg_exit.LIBCMT ref: 00F16FEF
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __amsg_exit$_fast_error_exit$CommandEnvironmentHandleInfoLineModuleStartupStringsVersion___crt
                                                                                                  • String ID:
                                                                                                  • API String ID: 4221928475-0
                                                                                                  • Opcode ID: f188fcebd1d714487bcacd7553b67c8fe8a6fcef8d3913452dabeb95ac552ef6
                                                                                                  • Instruction ID: 86ff56c4d636b31859c833be4a9db35799494b02f50eb1c932d5ae849066e48e
                                                                                                  • Opcode Fuzzy Hash: f188fcebd1d714487bcacd7553b67c8fe8a6fcef8d3913452dabeb95ac552ef6
                                                                                                  • Instruction Fuzzy Hash: 9E31A2719083099ADB34BF70DD06BE976B8AF04360F1000A9F509E61D2EFBC99C2BB51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetVersionExA.KERNEL32(?), ref: 6D0DB518
                                                                                                  Strings
                                                                                                  • (, xrefs: 6D0DB534
                                                                                                  • Unable to initialize CKernel32., xrefs: 6D0DB5BC
                                                                                                  • IsIA64, xrefs: 6D0DB5C5
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp, xrefs: 6D0DB5CF
                                                                                                  • IsIA64(): IA64., xrefs: 6D0DB59D
                                                                                                  • IsIA64(): Windows 2000 or Windows 9x, xrefs: 6D0DB540
                                                                                                  • IsIA64(): not IA64., xrefs: 6D0DB5AD
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Version
                                                                                                  • String ID: ($IsIA64$IsIA64(): IA64.$IsIA64(): Windows 2000 or Windows 9x$IsIA64(): not IA64.$Unable to initialize CKernel32.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
                                                                                                  • API String ID: 1889659487-181654248
                                                                                                  • Opcode ID: 7160316471a38bab07cdf55c32996bfbb92b26957e57e12f2a78ad436967fe2f
                                                                                                  • Instruction ID: 7076a790e648209ee4ea0cd599752c9d94f3dfc62357f6b7cff3dcb3b7d9e1b8
                                                                                                  • Opcode Fuzzy Hash: 7160316471a38bab07cdf55c32996bfbb92b26957e57e12f2a78ad436967fe2f
                                                                                                  • Instruction Fuzzy Hash: 26214930908316AAFBE0DB788C01BAD77F49B15324F50456BE519E31C9EF705A808B65
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4a36347ad87b75bdfb457557eaf07157e2bccca026e1e661624a870d547d6126
                                                                                                  • Instruction ID: 1af7efd33c6cad7f516e71816afd37c898bb2be6deedf77f3ac4fcaaf2ac0ab7
                                                                                                  • Opcode Fuzzy Hash: 4a36347ad87b75bdfb457557eaf07157e2bccca026e1e661624a870d547d6126
                                                                                                  • Instruction Fuzzy Hash: 9812C030A242858FDB528F78C8467AABBF5EF06304F18459FE4639B2EDE3749441CB51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3e7998f1541ec41adffe459b6a4938fb588047acbb3e3da01af40b112ac69991
                                                                                                  • Instruction ID: 2824b6cf86f8bcaa955c7c77f3103c1ffc6568453c726eb038db8dd67e108180
                                                                                                  • Opcode Fuzzy Hash: 3e7998f1541ec41adffe459b6a4938fb588047acbb3e3da01af40b112ac69991
                                                                                                  • Instruction Fuzzy Hash: 7E12AF70E082868FFB128F68C8407BEBBF1FF86384F544599D5619B2A3D7B09542CB52
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetVersionExA.KERNEL32(?), ref: 73AC67DD
                                                                                                  • __heap_term.LIBCMT ref: 73AC684E
                                                                                                  • GetCommandLineA.KERNEL32 ref: 73AC6855
                                                                                                  • ___crtGetEnvironmentStringsA.LIBCMT ref: 73AC6860
                                                                                                    • Part of subcall function 73AC87C4: GetEnvironmentStringsW.KERNEL32(?,?,?,73AC6865), ref: 73AC87E2
                                                                                                    • Part of subcall function 73AC87C4: GetEnvironmentStringsW.KERNEL32(?,?,?,73AC6865), ref: 73AC881D
                                                                                                    • Part of subcall function 73AC8180: GetStartupInfoA.KERNEL32(?,73AD27A8,00000054,73AC686F), ref: 73AC8195
                                                                                                    • Part of subcall function 73AC8180: GetFileType.KERNEL32(00000024), ref: 73AC82A3
                                                                                                    • Part of subcall function 73AC8180: ___crtInitCritSecAndSpinCount.LIBCMT ref: 73AC82D7
                                                                                                  • __mtterm.LIBCMT ref: 73AC6873
                                                                                                    • Part of subcall function 73AC7B35: TlsFree.KERNEL32(00000005,73AC68DE), ref: 73AC7B60
                                                                                                    • Part of subcall function 73AC7B35: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,73AC68DE), ref: 73ACACB6
                                                                                                    • Part of subcall function 73AC7B35: DeleteCriticalSection.KERNEL32(00000005,?,?,73AC68DE), ref: 73ACACE0
                                                                                                  • __mtterm.LIBCMT ref: 73AC68D9
                                                                                                  • __heap_term.LIBCMT ref: 73AC68DE
                                                                                                  • ___set_flsgetvalue.LIBCMT ref: 73AC68EA
                                                                                                    • Part of subcall function 73AC7B06: TlsGetValue.KERNEL32(73AC7C41), ref: 73AC7B0C
                                                                                                    • Part of subcall function 73AC7B06: TlsSetValue.KERNEL32(00000000), ref: 73AC7B29
                                                                                                    • Part of subcall function 73AC813A: __calloc_impl.LIBCMT ref: 73AC814F
                                                                                                    • Part of subcall function 73AC6F02: ___sbh_find_block.LIBCMT ref: 73AC6F2B
                                                                                                    • Part of subcall function 73AC6F02: HeapFree.KERNEL32(00000000,00000000,73AD26A0,0000000C,73ACADB5,00000000,73AD27E8,0000000C,73ACADF4,00000000,-0000000F,?,73AC8098,00000004,73AD2788,0000000C), ref: 73AC6F6A
                                                                                                    • Part of subcall function 73AC6F02: GetLastError.KERNEL32(?,73AC8098,00000004,73AD2788,0000000C,73ACDAD8,00000000,00000000,00000000,00000000,00000000,?,73AC7C67,00000001,00000214), ref: 73AC6F7B
                                                                                                  • __freeptd.LIBCMT ref: 73AC693C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnvironmentStrings$CriticalDeleteFreeSectionValue___crt__heap_term__mtterm$CommandCountCritErrorFileHeapInfoInitLastLineSpinStartupTypeVersion___sbh_find_block___set_flsgetvalue__calloc_impl__freeptd
                                                                                                  • String ID:
                                                                                                  • API String ID: 4055056290-0
                                                                                                  • Opcode ID: 5df1387d3663d1341e94c53607837c6dfdaef1cbb6920e0f27e356bcc07dac3a
                                                                                                  • Instruction ID: a67ffbe262ebc108e77a08593a4e96e63fb73bcd3819d86676c8f824ac768bc7
                                                                                                  • Opcode Fuzzy Hash: 5df1387d3663d1341e94c53607837c6dfdaef1cbb6920e0f27e356bcc07dac3a
                                                                                                  • Instruction Fuzzy Hash: AB41B1725143D09FEB12EB768A03759B2B9FB45250F28442FD91AD22BCDF71C4428B62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetVersionExA.KERNEL32(?), ref: 6D0DF284
                                                                                                  • __heap_term.LIBCMT ref: 6D0DF2F5
                                                                                                  • GetCommandLineA.KERNEL32 ref: 6D0DF2FC
                                                                                                  • ___crtGetEnvironmentStringsA.LIBCMT ref: 6D0DF307
                                                                                                    • Part of subcall function 6D0E1F9B: GetEnvironmentStringsW.KERNEL32(?,?,?,6D0DF30C), ref: 6D0E1FB9
                                                                                                    • Part of subcall function 6D0E1F9B: GetEnvironmentStringsW.KERNEL32(?,?,?,6D0DF30C), ref: 6D0E1FF4
                                                                                                    • Part of subcall function 6D0E1957: GetStartupInfoA.KERNEL32(?,6D0EB520,00000054,6D0DF316), ref: 6D0E196C
                                                                                                    • Part of subcall function 6D0E1957: GetFileType.KERNEL32(00000024), ref: 6D0E1A7A
                                                                                                    • Part of subcall function 6D0E1957: ___crtInitCritSecAndSpinCount.LIBCMT ref: 6D0E1AAE
                                                                                                  • __mtterm.LIBCMT ref: 6D0DF31A
                                                                                                    • Part of subcall function 6D0E130C: TlsFree.KERNEL32(00000011,6D0DF385), ref: 6D0E1337
                                                                                                    • Part of subcall function 6D0E130C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,6D0DF385), ref: 6D0E4901
                                                                                                    • Part of subcall function 6D0E130C: DeleteCriticalSection.KERNEL32(00000011,?,?,6D0DF385), ref: 6D0E492B
                                                                                                  • __mtterm.LIBCMT ref: 6D0DF380
                                                                                                  • __heap_term.LIBCMT ref: 6D0DF385
                                                                                                  • ___set_flsgetvalue.LIBCMT ref: 6D0DF391
                                                                                                    • Part of subcall function 6D0E12DD: TlsGetValue.KERNEL32(6D0E1418,?,?,6D0DFCAF,6D0D7D8D,?,?,6D0D770E,00066BDC,?,?,00000000,?,?,6D0D77A6,SETUP_AGREEMENT_ENG), ref: 6D0E12E3
                                                                                                    • Part of subcall function 6D0E12DD: TlsSetValue.KERNEL32(00000000,?,6D0DFCAF,6D0D7D8D,?,?,6D0D770E,00066BDC,?,?,00000000,?,?,6D0D77A6,SETUP_AGREEMENT_ENG,000012F1), ref: 6D0E1300
                                                                                                    • Part of subcall function 6D0E1911: __calloc_impl.LIBCMT ref: 6D0E1926
                                                                                                    • Part of subcall function 6D0E037B: ___sbh_find_block.LIBCMT ref: 6D0E03A4
                                                                                                    • Part of subcall function 6D0E037B: HeapFree.KERNEL32(00000000,6D0D7D8D,6D0EB418,0000000C,6D0E4A00,00000000,6D0EB5E8,0000000C,6D0E4A3F,6D0D7D8D,00066BCC,?,6D0E186F,00000004,6D0EB500,0000000C), ref: 6D0E03E3
                                                                                                    • Part of subcall function 6D0E037B: GetLastError.KERNEL32(?,6D0E186F,00000004,6D0EB500,0000000C,6D0E81A1,6D0D7D8D,00066BDB,00000000,00000000,00000000,?,6D0E143E,00000001,00000214), ref: 6D0E03F4
                                                                                                  • __freeptd.LIBCMT ref: 6D0DF3E3
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: EnvironmentStrings$CriticalDeleteFreeSectionValue___crt__heap_term__mtterm$CommandCountCritErrorFileHeapInfoInitLastLineSpinStartupTypeVersion___sbh_find_block___set_flsgetvalue__calloc_impl__freeptd
                                                                                                  • String ID:
                                                                                                  • API String ID: 4055056290-0
                                                                                                  • Opcode ID: 1674c30c86c562d66a59bb015a86c489231d454c29b553ee1f46cf99e5ebda91
                                                                                                  • Instruction ID: 7231ea069ac7d98a2a74e118c24763917ca10a7b730161159d1dd246e0a1309e
                                                                                                  • Opcode Fuzzy Hash: 1674c30c86c562d66a59bb015a86c489231d454c29b553ee1f46cf99e5ebda91
                                                                                                  • Instruction Fuzzy Hash: 8741C33554C3869EFB95EB75894076D3BF8EF46798F12C4ABDA28D3140DF3084418A62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __fassign__wsopen_s
                                                                                                  • String ID: $UNICODE$UTF-16LE$UTF-8$ccs=
                                                                                                  • API String ID: 2488987356-1656882147
                                                                                                  • Opcode ID: d7dd8d876382a78fa44bc547512b3a41542b4b3f71d47d5b315512215c35fab8
                                                                                                  • Instruction ID: 5a0d84972985de1fe90264b4538b6c947c9fa1ba5be0efaa19d1742f86eb10bf
                                                                                                  • Opcode Fuzzy Hash: d7dd8d876382a78fa44bc547512b3a41542b4b3f71d47d5b315512215c35fab8
                                                                                                  • Instruction Fuzzy Hash: E171C3B18042C9AEDB028F558A47399BBB4EB09314F14B06FD8D7A629DD379C2439F11
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __fassign__wsopen_s
                                                                                                  • String ID: $UNICODE$UTF-16LE$UTF-8$ccs=
                                                                                                  • API String ID: 2488987356-1656882147
                                                                                                  • Opcode ID: 414523112d03bbcaef435f82757f6f9d73ec6e7c385301e5c4e678180ba4d98f
                                                                                                  • Instruction ID: 02411996c4ce65f78920a44d3136be54ee660a8f3237ba4a5ef7a0692403fb51
                                                                                                  • Opcode Fuzzy Hash: 414523112d03bbcaef435f82757f6f9d73ec6e7c385301e5c4e678180ba4d98f
                                                                                                  • Instruction Fuzzy Hash: 3971B37180820AAEFB158F5A84447ED7FF0BF0D396F54C06EE96A96172D378C681AF00
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __fassign__wsopen_s
                                                                                                  • String ID: $UNICODE$UTF-16LE$UTF-8$ccs=
                                                                                                  • API String ID: 2488987356-1656882147
                                                                                                  • Opcode ID: 585d4db108d1b611ea289e9e80e9b7e50fd8a11052c76347f12fb19ff58207b1
                                                                                                  • Instruction ID: 95d35376d579453e7dea3192a2ff871993b61835dafcc758fe710427ca0dc93e
                                                                                                  • Opcode Fuzzy Hash: 585d4db108d1b611ea289e9e80e9b7e50fd8a11052c76347f12fb19ff58207b1
                                                                                                  • Instruction Fuzzy Hash: E67196B2C05209EEDB259F6984457E97FA0EF05324F24C05EE85696191E3B88BC6FF43
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetSystemDirectoryA.KERNEL32(?,00000104,?,00000000), ref: 6D0D6DE7
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DirectorySystem
                                                                                                  • String ID: DXGetFileVersion() failed.$FRunningOnWinXP$GetSystemDirectory()$\ntkrnlpa.exe$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h
                                                                                                  • API String ID: 2188284642-531677455
                                                                                                  • Opcode ID: bbdaabdf9ea322054ff318d8d0288328dd424aaadb2c00070e431f1187504eb8
                                                                                                  • Instruction ID: 993849fae51dc8c84327b1cee2a034d0f0b74ae617ed285051d29291b89ac5cf
                                                                                                  • Opcode Fuzzy Hash: bbdaabdf9ea322054ff318d8d0288328dd424aaadb2c00070e431f1187504eb8
                                                                                                  • Instruction Fuzzy Hash: B221B031A04309AAFB90DB68CD04BEE73FCDB89714F900067B509E30C1DF70E6808AA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetSystemDirectoryA.KERNEL32(?,00000104,?,00000000), ref: 6D0D6EEB
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DirectorySystem
                                                                                                  • String ID: DXGetFileVersion() failed.$FRunningOnNETServer$GetSystemDirectory()$\ntkrnlpa.exe$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h
                                                                                                  • API String ID: 2188284642-3175186359
                                                                                                  • Opcode ID: d280f6601bf151812d6dc24fac0daed558b744d112cf3251a6d0c33f1ad71cde
                                                                                                  • Instruction ID: e17ef9477cd51d4f28031d704307ab434dc6219d350c25f731197142ef0870f5
                                                                                                  • Opcode Fuzzy Hash: d280f6601bf151812d6dc24fac0daed558b744d112cf3251a6d0c33f1ad71cde
                                                                                                  • Instruction Fuzzy Hash: D5219075A043096BFB80DB658C44FEA77BCDB89714F9000A7A519E30C2DFB096858AA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __fileno
                                                                                                  • String ID:
                                                                                                  • API String ID: 1873356214-0
                                                                                                  • Opcode ID: c2773bd8e7d99b98374cfd7d7c516fff8a1048795a09b1d7d0de16f2d29e4a9d
                                                                                                  • Instruction ID: a717798a60ce80d3d15dc3c43f1e9bef331d83d5fabb99798565ac9e97e56a63
                                                                                                  • Opcode Fuzzy Hash: c2773bd8e7d99b98374cfd7d7c516fff8a1048795a09b1d7d0de16f2d29e4a9d
                                                                                                  • Instruction Fuzzy Hash: 1C3146324047949FE7059BB48E43B8D37A5AF05330B28465BF429DA2FCDB3AC6958B94
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __fileno
                                                                                                  • String ID:
                                                                                                  • API String ID: 1873356214-0
                                                                                                  • Opcode ID: 531ed9d4c281107e6eb41fb8e67abd79ced319c23fd375b298558c03b8332902
                                                                                                  • Instruction ID: f9ae12393f04340f674a43abd69e1747aaf23aa54af055176d495218d1f6070c
                                                                                                  • Opcode Fuzzy Hash: 531ed9d4c281107e6eb41fb8e67abd79ced319c23fd375b298558c03b8332902
                                                                                                  • Instruction Fuzzy Hash: 793148328087456EF7015F35CC4179D7FE89F063A8F228265E124DB1E0EB39D6428699
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __fileno
                                                                                                  • String ID:
                                                                                                  • API String ID: 1873356214-0
                                                                                                  • Opcode ID: b5296e2f735d72cb789b0460323d23dde84a0d682d2483aa2d875a60bbb2bc8d
                                                                                                  • Instruction ID: df0680938c579b77989218cdd2ac446738ab1720b84bf6453ebd8a0e0e66da6e
                                                                                                  • Opcode Fuzzy Hash: b5296e2f735d72cb789b0460323d23dde84a0d682d2483aa2d875a60bbb2bc8d
                                                                                                  • Instruction Fuzzy Hash: 3331D63280A6545BC715BB788C82ADD37B09F01334F244614F839EA1D2DB3CCAC6BA96
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetStartupInfoA.KERNEL32(?,73AD27A8,00000054,73AC686F), ref: 73AC8195
                                                                                                    • Part of subcall function 73AC813A: __calloc_impl.LIBCMT ref: 73AC814F
                                                                                                  • GetFileType.KERNEL32(00000024), ref: 73AC82A3
                                                                                                  • ___crtInitCritSecAndSpinCount.LIBCMT ref: 73AC82D7
                                                                                                  • GetStdHandle.KERNEL32(-000000F6), ref: 73AC832E
                                                                                                  • GetFileType.KERNEL32(00000000), ref: 73AC8340
                                                                                                  • ___crtInitCritSecAndSpinCount.LIBCMT ref: 73AC836E
                                                                                                  • SetHandleCount.KERNEL32 ref: 73AC8399
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Count$CritFileHandleInitSpinType___crt$InfoStartup__calloc_impl
                                                                                                  • String ID:
                                                                                                  • API String ID: 3691444693-0
                                                                                                  • Opcode ID: fe30bb6e16a52541a9a03e3663655141802479fc71cab947abec2e8625c42f11
                                                                                                  • Instruction ID: 85b02522f29309d0416538991a82eb2c41320c08a68609646ee7392e2c38f8e1
                                                                                                  • Opcode Fuzzy Hash: fe30bb6e16a52541a9a03e3663655141802479fc71cab947abec2e8625c42f11
                                                                                                  • Instruction Fuzzy Hash: B861F372504BC1CFD7158B68C94A7197BE8FB0A324F29866ED4BB9B2E8DB30D402C711
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetStartupInfoA.KERNEL32(?,6D0EB520,00000054,6D0DF316), ref: 6D0E196C
                                                                                                    • Part of subcall function 6D0E1911: __calloc_impl.LIBCMT ref: 6D0E1926
                                                                                                  • GetFileType.KERNEL32(00000024), ref: 6D0E1A7A
                                                                                                  • ___crtInitCritSecAndSpinCount.LIBCMT ref: 6D0E1AAE
                                                                                                  • GetStdHandle.KERNEL32(-000000F6), ref: 6D0E1B05
                                                                                                  • GetFileType.KERNEL32(00000000), ref: 6D0E1B17
                                                                                                  • ___crtInitCritSecAndSpinCount.LIBCMT ref: 6D0E1B45
                                                                                                  • SetHandleCount.KERNEL32 ref: 6D0E1B70
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Count$CritFileHandleInitSpinType___crt$InfoStartup__calloc_impl
                                                                                                  • String ID:
                                                                                                  • API String ID: 3691444693-0
                                                                                                  • Opcode ID: 0fef31a3db42bcefa94f6387842eed96bb601cb35f28a00bdd84e85bdbf0357c
                                                                                                  • Instruction ID: 20cb29a20e97323448e7c3ebd0b56aaf7dbba5a199b7074ac8cbcb16047015fa
                                                                                                  • Opcode Fuzzy Hash: 0fef31a3db42bcefa94f6387842eed96bb601cb35f28a00bdd84e85bdbf0357c
                                                                                                  • Instruction Fuzzy Hash: 0261F231A087428FFB11CB69C88476DBBF0BF067A4F298659D9719B2D0EB30D446CB12
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetLastError.KERNEL32(?,?,?,00000104,?,?,00000104,?), ref: 6D0D934B
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast
                                                                                                  • String ID: CSetup::InstallPlugIn$DirectXUpdateInstallPlugIn() failed.$GetCDXUpdate() failed.$Temporary directory name is not initialized.$Working directory name is not initialized.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\dxupdate.cpp
                                                                                                  • API String ID: 1452528299-1736279303
                                                                                                  • Opcode ID: a56e62799ac0b547ffff798c9a146563e583255e596c2ed830ffba1e9e959442
                                                                                                  • Instruction ID: 98c4fb23445e2d362ccc119e7e67e6e51c41c5bfe76de183e80b13190dad10a7
                                                                                                  • Opcode Fuzzy Hash: a56e62799ac0b547ffff798c9a146563e583255e596c2ed830ffba1e9e959442
                                                                                                  • Instruction Fuzzy Hash: 2B51B4B1944319AFF7A0DF749C94FEAB7F8BB15308F01069BE559A3181DBB05A808B60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LoadStringA.USER32(?,000003E9,?,00000040), ref: 6D0D736D
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 6D0D7378
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime$ErrorLastLoadString_strrchr
                                                                                                  • String ID: DXSetRestorePoint$LoadString()$e$e:\bt\382730\setup\deliverables\dsetup\dsetup32\instcat.cpp
                                                                                                  • API String ID: 2420349584-3812728853
                                                                                                  • Opcode ID: e245386cfd95d2ff0eb8272e4da605b38dcc0f7ed932ae7ab939ab9bc6c65b01
                                                                                                  • Instruction ID: 214baaeaad0e8a93a8ad08520186bf2ba745653429f86afe615be46b9bf3f008
                                                                                                  • Opcode Fuzzy Hash: e245386cfd95d2ff0eb8272e4da605b38dcc0f7ed932ae7ab939ab9bc6c65b01
                                                                                                  • Instruction Fuzzy Hash: 7D218570E0435A9BFB91DFA588007AEBBF8EF85B84F51412BED06D7180EB709505CB52
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LoadLibraryA.KERNEL32(?,?,00000104,?), ref: 6D0D886C
                                                                                                  • GetLastError.KERNEL32(Unable to load %s.,?), ref: 6D0D8881
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  Strings
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h, xrefs: 6D0D8897
                                                                                                  • Unable to load %s., xrefs: 6D0D887C
                                                                                                  • CDllLoader::LoadLibraryA, xrefs: 6D0D888D
                                                                                                  • LoadLibrary(), xrefs: 6D0D8888
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime$ErrorLastLibraryLoad_strrchr
                                                                                                  • String ID: CDllLoader::LoadLibraryA$LoadLibrary()$Unable to load %s.$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
                                                                                                  • API String ID: 108046663-2531695590
                                                                                                  • Opcode ID: c5e95ff608ebadd99f8bbb7e82fde6f7a3805c138491e53dfc9722a3f1794fbb
                                                                                                  • Instruction ID: 37d6b59b15915a9c91ff898f6c7ce395070b18de950d84d728c4f2664c6f7d89
                                                                                                  • Opcode Fuzzy Hash: c5e95ff608ebadd99f8bbb7e82fde6f7a3805c138491e53dfc9722a3f1794fbb
                                                                                                  • Instruction Fuzzy Hash: 6CF0A0360443047BFB906BA1CC04FA63E6CDB15390B404023BE88D7092EB70A580CAA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __locking$__fileno__lseeki64
                                                                                                  • String ID: Fcm
                                                                                                  • API String ID: 3501863086-1393020460
                                                                                                  • Opcode ID: 2d2bc5923e2946bf4cfe55c453d2f2b56fc0ab4504f4ae804ec27a71c02c7225
                                                                                                  • Instruction ID: e2baee1f304ff6a1df06e9a71c728617c7305a6bf69359e82504008bcc3ae691
                                                                                                  • Opcode Fuzzy Hash: 2d2bc5923e2946bf4cfe55c453d2f2b56fc0ab4504f4ae804ec27a71c02c7225
                                                                                                  • Instruction Fuzzy Hash: F241C372504A039FF7318F79D950B6A7BE4AF863B8B11C619E8B9CB2A1D734D5408B90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FreeLibrary.KERNEL32(00000000,00000000,6D0D919D,?,?,?,?,?,?,?), ref: 6D0D85F1
                                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 6D0D85FB
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  Strings
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h, xrefs: 6D0D8617
                                                                                                  • FreeLibrary(), xrefs: 6D0D8608
                                                                                                  • CDllLoader::FreeLibrary, xrefs: 6D0D860D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime$ErrorFreeLastLibrary_strrchr
                                                                                                  • String ID: CDllLoader::FreeLibrary$FreeLibrary()$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
                                                                                                  • API String ID: 2808663981-1330908120
                                                                                                  • Opcode ID: 37b7abc58c48d2816cc245e76207aa60cd75031f0d08ec227c82cd75b027fbf0
                                                                                                  • Instruction ID: e06223d579b1a3be2bcea139b7715e3daa0e30767df55217820cfc2bf0be2b54
                                                                                                  • Opcode Fuzzy Hash: 37b7abc58c48d2816cc245e76207aa60cd75031f0d08ec227c82cd75b027fbf0
                                                                                                  • Instruction Fuzzy Hash: CCE048317543116BF7E06A75AC04BB622ECCF54625F5504AB7958D3082FF70C5418555
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FreeLibrary.KERNEL32(00000000,6D0D73FF), ref: 6D0D6B11
                                                                                                  • GetLastError.KERNEL32 ref: 6D0D6B1B
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  Strings
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\dsetup32\instcat.cpp, xrefs: 6D0D6B34
                                                                                                  • FreeLibrary(), xrefs: 6D0D6B28
                                                                                                  • UnLoadSfcDLL, xrefs: 6D0D6B2D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime$ErrorFreeLastLibrary_strrchr
                                                                                                  • String ID: FreeLibrary()$UnLoadSfcDLL$e:\bt\382730\setup\deliverables\dsetup\dsetup32\instcat.cpp
                                                                                                  • API String ID: 2808663981-3437185699
                                                                                                  • Opcode ID: 3f918cedd9198317d9c5b7b9509ba7af94863dcdbed172ab8c12addeddfbdd42
                                                                                                  • Instruction ID: 6b14fc12127e5a7b81f4d9351260e21ebe19bf22ccad8aecd53c900055ece6b0
                                                                                                  • Opcode Fuzzy Hash: 3f918cedd9198317d9c5b7b9509ba7af94863dcdbed172ab8c12addeddfbdd42
                                                                                                  • Instruction Fuzzy Hash: 21E0122874430A6BFFD09FA18C05FB571BCAB21F59FD0005BB849E20D3EF64E14085A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __locking$__fileno__lseeki64
                                                                                                  • String ID:
                                                                                                  • API String ID: 3501863086-0
                                                                                                  • Opcode ID: f454433ab07dbaf6de13f382ec6ad113bd4816bae6363f426146c6f3506a91b7
                                                                                                  • Instruction ID: d01f8ab9cbcfa08bce79b70430d20a45387884c3e30af44f7437fc8ef19f2fe0
                                                                                                  • Opcode Fuzzy Hash: f454433ab07dbaf6de13f382ec6ad113bd4816bae6363f426146c6f3506a91b7
                                                                                                  • Instruction Fuzzy Hash: 6741D5721047809FD7128F68C952B567BF9BF55234B14871FE4BB8B6E8DB34D8408B51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __locking$__fileno__lseeki64
                                                                                                  • String ID:
                                                                                                  • API String ID: 3501863086-0
                                                                                                  • Opcode ID: b6c0d8178482c87c88ccb1211a0009774ee8961f21775dda1946f297010f4861
                                                                                                  • Instruction ID: d31cbd68b0d8eddb6adf23fc37da2ddd8966276bc996dd0124941b05fa27317e
                                                                                                  • Opcode Fuzzy Hash: b6c0d8178482c87c88ccb1211a0009774ee8961f21775dda1946f297010f4861
                                                                                                  • Instruction Fuzzy Hash: DB41D772918B009EDB249F28CC61AE677D4AF41374B14C629E8BA8B2D1D774D880AB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __fileno.LIBCMT ref: 6D0E09E4
                                                                                                  • __locking.LIBCMT ref: 6D0E09EB
                                                                                                    • Part of subcall function 6D0E364D: __fileno.LIBCMT ref: 6D0E367B
                                                                                                    • Part of subcall function 6D0E364D: __locking.LIBCMT ref: 6D0E3682
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __fileno__locking
                                                                                                  • String ID: Fcm
                                                                                                  • API String ID: 2385650056-1393020460
                                                                                                  • Opcode ID: 02e2f43521c7a4e35838aa8e8277f96aefa119708a2ac267273df05b4f0f5f54
                                                                                                  • Instruction ID: 2020a81f2cd394b3139e3a46481c76ec110862c0c469092df0d4d974c66c4a04
                                                                                                  • Opcode Fuzzy Hash: 02e2f43521c7a4e35838aa8e8277f96aefa119708a2ac267273df05b4f0f5f54
                                                                                                  • Instruction Fuzzy Hash: 623173716087099FFB15CFABC484B9E7BF5EF853E4B24852DE86997250DBB0DA408B40
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __fileno__locking
                                                                                                  • String ID: Fcm
                                                                                                  • API String ID: 2385650056-1393020460
                                                                                                  • Opcode ID: 50394860220720d4416018d745a5e50297c336960fa7dd4b146ab0390e6b35af
                                                                                                  • Instruction ID: 26edcb62aa9f2677c835dae6bb3fe9a7a30b5cd4d9f9c8e51c7d2f763ee33cc6
                                                                                                  • Opcode Fuzzy Hash: 50394860220720d4416018d745a5e50297c336960fa7dd4b146ab0390e6b35af
                                                                                                  • Instruction Fuzzy Hash: 1901A232204B015FF7228A7DC885B57BBE9EF893B8F10C91DE5E9933A0DA74E8404A50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetSystemDefaultLCID.KERNEL32(6D0D8753,6D0D8D1D,?,6D0D8E5E,?,6D0D92F0), ref: 6D0D871F
                                                                                                  Strings
                                                                                                  • DirectXSetupIsJapanese == 0, xrefs: 6D0D873B
                                                                                                  • DirectXSetupIsJapanese == 1, xrefs: 6D0D872C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DefaultSystem
                                                                                                  • String ID: DirectXSetupIsJapanese == 0$DirectXSetupIsJapanese == 1
                                                                                                  • API String ID: 511829978-1705903668
                                                                                                  • Opcode ID: 8955b4e18f402ddd1f4b30882870614441c8660c5622c6d05cee447dd69788c2
                                                                                                  • Instruction ID: dcda8af6f07c7a9b2aca5be36a94e4dd01acab5422a6e26afabcc1520c875602
                                                                                                  • Opcode Fuzzy Hash: 8955b4e18f402ddd1f4b30882870614441c8660c5622c6d05cee447dd69788c2
                                                                                                  • Instruction Fuzzy Hash: D1C08C7549C71408B6C423B01D40B782251835231A7624C63F303C3CC1CF8880017012
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CloseHandle.KERNEL32(00000000,00000000,00000109,?,73ACFAFD,00000109), ref: 73ACBDFA
                                                                                                  • GetLastError.KERNEL32(?,73ACFAFD,00000109), ref: 73ACBE04
                                                                                                  • __dosmaperr.LIBCMT ref: 73ACBE33
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                  • String ID:
                                                                                                  • API String ID: 2583163307-0
                                                                                                  • Opcode ID: 8130705cd0a24ce25560f13b8026584745086f6a5461f3e8501cb8d34d336b0c
                                                                                                  • Instruction ID: 14dd55d3b504a64187d5f84749cc7eff25fa5298394825f5e873501940d07dc7
                                                                                                  • Opcode Fuzzy Hash: 8130705cd0a24ce25560f13b8026584745086f6a5461f3e8501cb8d34d336b0c
                                                                                                  • Instruction Fuzzy Hash: 7E012F335053D467D716127AAA1774626ADCF85730F29011FE927873E9DE52C841C251
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CloseHandle.KERNEL32(00000000,00000000,00000109,?,6D0E904E,00000109), ref: 6D0E3480
                                                                                                  • GetLastError.KERNEL32(?,6D0E904E,00000109), ref: 6D0E348A
                                                                                                  • __dosmaperr.LIBCMT ref: 6D0E34B9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                  • String ID:
                                                                                                  • API String ID: 2583163307-0
                                                                                                  • Opcode ID: 781b8db8e89529a6d778f3dc2521b0b067ed732fd9c8dbe3fd5bddc64cc1a02d
                                                                                                  • Instruction ID: 911d093e6552fa4768979048a28ad6ef2e56f1e6d3c86c01780ad8aee58cb1da
                                                                                                  • Opcode Fuzzy Hash: 781b8db8e89529a6d778f3dc2521b0b067ed732fd9c8dbe3fd5bddc64cc1a02d
                                                                                                  • Instruction Fuzzy Hash: B801483250C1252DF702137998087AB6ED48FCA3FAF22061AEE24971E1CF60E44141A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CloseHandle.KERNEL32(00000000,00000000,00000109,?,00F202BE,00000109), ref: 00F1A68D
                                                                                                  • GetLastError.KERNEL32(?,00F202BE,00000109), ref: 00F1A697
                                                                                                  • __dosmaperr.LIBCMT ref: 00F1A6C6
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                  • String ID:
                                                                                                  • API String ID: 2583163307-0
                                                                                                  • Opcode ID: ce2a5f70bd2048687751b1f1e94c935d4ebc73269e2a666cd61c6821ba4822c7
                                                                                                  • Instruction ID: 6a2c6eda6ca724ac43146c5e720c303e99c7127cb2802743bcf33fc2f223864f
                                                                                                  • Opcode Fuzzy Hash: ce2a5f70bd2048687751b1f1e94c935d4ebc73269e2a666cd61c6821ba4822c7
                                                                                                  • Instruction Fuzzy Hash: 7501493390631456CA2062395C09BDA37898F813F4F2E012AFD68C71D2DE6DDCC1B593
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000002,00000000,00000000,00BFBBEF,73ACFD67,73ACFD67,?,73ACDE82,00BFBBEF,00000000,00000000,00000002,00000000,00000000), ref: 73ACDC37
                                                                                                  • GetLastError.KERNEL32(?,73ACDE82,00BFBBEF,00000000,00000000,00000002,00000000,00000000,00000002), ref: 73ACDC44
                                                                                                  • __dosmaperr.LIBCMT ref: 73ACDC4F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorFileLastPointer__dosmaperr
                                                                                                  • String ID:
                                                                                                  • API String ID: 2336955059-0
                                                                                                  • Opcode ID: 2424882fc7722c770b26f63f5136476ab8b7d528f576897ec4575890ba74822a
                                                                                                  • Instruction ID: 59857d488069c0e1e501f1c5333ce5f9b42b24e57f4441e99900cc93476542e9
                                                                                                  • Opcode Fuzzy Hash: 2424882fc7722c770b26f63f5136476ab8b7d528f576897ec4575890ba74822a
                                                                                                  • Instruction Fuzzy Hash: F9010473A04289AFCF00DFA9CD4AA8D7BB9EB85220B25054BF411D72D4EAB0DD008760
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000002,00000000,00000000,00BFBBEF,6D0E92B8,6D0E92B8,?,6D0E6AD7,00BFBBEF,00000000,00000000,00000002,00000000,00000000), ref: 6D0E8293
                                                                                                  • GetLastError.KERNEL32(?,6D0E6AD7,00BFBBEF,00000000,00000000,00000002,00000000,00000000,00000002), ref: 6D0E82A0
                                                                                                  • __dosmaperr.LIBCMT ref: 6D0E82AB
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorFileLastPointer__dosmaperr
                                                                                                  • String ID:
                                                                                                  • API String ID: 2336955059-0
                                                                                                  • Opcode ID: 3629fb4fa48d7b08e21c6e7a31fd528fda01561c10a04d791b25e1b57e88c99c
                                                                                                  • Instruction ID: 837d2ce124138f6edcd5924f3a0d722284ef15b66a000598b9b8e3d67cdc59c1
                                                                                                  • Opcode Fuzzy Hash: 3629fb4fa48d7b08e21c6e7a31fd528fda01561c10a04d791b25e1b57e88c99c
                                                                                                  • Instruction Fuzzy Hash: 5001D632A14519AFDF00CFE9DC44A8E7FB9EB85360B65414AF910E7190EB70EE008B60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,00000000,?,?,?,?,00F1EF80,?,00000000,00000000,00000002,00000000,00000000), ref: 00F1ED35
                                                                                                  • GetLastError.KERNEL32(?,00F1EF80,?,00000000,00000000,00000002,00000000,00000000,?), ref: 00F1ED42
                                                                                                  • __dosmaperr.LIBCMT ref: 00F1ED4D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorFileLastPointer__dosmaperr
                                                                                                  • String ID:
                                                                                                  • API String ID: 2336955059-0
                                                                                                  • Opcode ID: e3b73bd2abae366fc6c83594c9e80dd230b6bef860758aefb1ec1e0b701f9bf2
                                                                                                  • Instruction ID: d2c59be1e0706b2883e23f2231ab48ef7fb49a5e6eca95ddec9ed545934bc243
                                                                                                  • Opcode Fuzzy Hash: e3b73bd2abae366fc6c83594c9e80dd230b6bef860758aefb1ec1e0b701f9bf2
                                                                                                  • Instruction Fuzzy Hash: 74018432E14149ABCF11CFA9EC459DD7BB9EF44320B254255F910E7191E670DE80AB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetFilePointer.KERNEL32(00000000,00000109,00000000,73ACFD42,00004000,00000109,?,73ACFD42,00000109,00000000,00000000), ref: 73AD1C67
                                                                                                  • GetLastError.KERNEL32(?,73ACFD42,00000109,00000000,00000000), ref: 73AD1C74
                                                                                                  • __dosmaperr.LIBCMT ref: 73AD1C83
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorFileLastPointer__dosmaperr
                                                                                                  • String ID:
                                                                                                  • API String ID: 2336955059-0
                                                                                                  • Opcode ID: 58d862f768e1ad6d9010835b0ef270434480fa8075744ac26a741601caff0614
                                                                                                  • Instruction ID: e72e399cc9fb12929b8461d9cc9b47f235a04ff0cd6163e83153df1a51fc70d4
                                                                                                  • Opcode Fuzzy Hash: 58d862f768e1ad6d9010835b0ef270434480fa8075744ac26a741601caff0614
                                                                                                  • Instruction Fuzzy Hash: FC01F433624655ABCB421BBADD0BB493BA9DB86330B250717F935CB2ECDE70C8018361
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetFilePointer.KERNEL32(00000000,00000109,00000000,6D0E9293,00004000,00000109,?,6D0E9293,00000109,00000000,00000000), ref: 6D0EADD1
                                                                                                  • GetLastError.KERNEL32(?,6D0E9293,00000109,00000000,00000000), ref: 6D0EADDE
                                                                                                  • __dosmaperr.LIBCMT ref: 6D0EADED
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorFileLastPointer__dosmaperr
                                                                                                  • String ID:
                                                                                                  • API String ID: 2336955059-0
                                                                                                  • Opcode ID: d0ede6e7355d1b23179a2df911d7430847f002336f155e4424deae531870e21c
                                                                                                  • Instruction ID: e38ddd04ad0d7d5eb5728a418e73aee62a3c0840a4224ecccb1502f5bb7f3411
                                                                                                  • Opcode Fuzzy Hash: d0ede6e7355d1b23179a2df911d7430847f002336f155e4424deae531870e21c
                                                                                                  • Instruction Fuzzy Hash: D5018632A185256FDA115BBD9C04F4E3A78AB4A3B6B724712FA31DB1E1DF30D81046A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetVersionExA.KERNEL32(?), ref: 6D0D8B81
                                                                                                  Strings
                                                                                                  • Installing on Windows %d.%d.%d, xrefs: 6D0D8BC5
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Version
                                                                                                  • String ID: Installing on Windows %d.%d.%d
                                                                                                  • API String ID: 1889659487-1252410366
                                                                                                  • Opcode ID: cf8c9d13d325d7af69cfeed24e582ef0f8520e81c0dabb533a41d678c6af71ec
                                                                                                  • Instruction ID: 73ba77edabfc0455edb5d670ee50608cfb60496b2ca5f70833d7e82f757170ef
                                                                                                  • Opcode Fuzzy Hash: cf8c9d13d325d7af69cfeed24e582ef0f8520e81c0dabb533a41d678c6af71ec
                                                                                                  • Instruction Fuzzy Hash: E701B5B1904325ABEBE49B788C01BAEB7B8EB46724F40459AE519E3181DB708955CFE0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __fileno.LIBCMT ref: 73ACC48D
                                                                                                  • __locking.LIBCMT ref: 73ACC494
                                                                                                    • Part of subcall function 73ACBFC7: __fileno.LIBCMT ref: 73ACBFF5
                                                                                                    • Part of subcall function 73ACBFC7: __locking.LIBCMT ref: 73ACBFFC
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __fileno__locking
                                                                                                  • String ID:
                                                                                                  • API String ID: 2385650056-0
                                                                                                  • Opcode ID: 16a9ec58f811e1472a81cfb106c98d50de9a502f0f79c04f642017c80660e77a
                                                                                                  • Instruction ID: e3a2cd139459bafeb29a3542c0109779948ef0fbbe01ffa096eaba29a07b85d4
                                                                                                  • Opcode Fuzzy Hash: 16a9ec58f811e1472a81cfb106c98d50de9a502f0f79c04f642017c80660e77a
                                                                                                  • Instruction Fuzzy Hash: 6D31E8316007849FDB15CF65C68ABEE77B9EF94260B24D01FE897C7298D670DA418B40
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __fileno.LIBCMT ref: 00F1AD7E
                                                                                                  • __locking.LIBCMT ref: 00F1AD85
                                                                                                    • Part of subcall function 00F1A85A: __fileno.LIBCMT ref: 00F1A888
                                                                                                    • Part of subcall function 00F1A85A: __locking.LIBCMT ref: 00F1A88F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __fileno__locking
                                                                                                  • String ID:
                                                                                                  • API String ID: 2385650056-0
                                                                                                  • Opcode ID: bfb6afbecca2cc93d3e23940c0fe19f15d0ba34b2ec945ddc6f7ff201cc985e2
                                                                                                  • Instruction ID: b9821c7f2a1fba31c28120c40986381f5970c1fef6ce99aa6e37daaddcb67f9f
                                                                                                  • Opcode Fuzzy Hash: bfb6afbecca2cc93d3e23940c0fe19f15d0ba34b2ec945ddc6f7ff201cc985e2
                                                                                                  • Instruction Fuzzy Hash: 70319331A02F05AFDF25CF69D884AEE77B5EF80361B24812DE855C7950D774DAC0AB42
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __FF_MSGBANNER.LIBCMT ref: 6D0E40F6
                                                                                                  • HeapAlloc.KERNEL32(00000000,6D0D7D7E,00066BDB,00066BDC,?,?,6D0DFCAF,6D0D7D8D,?,?,6D0D770E,00066BDC,?,?,00000000), ref: 6D0E414A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AllocHeap
                                                                                                  • String ID:
                                                                                                  • API String ID: 4292702814-0
                                                                                                  • Opcode ID: b5e803336139220789ce0cb88c98e581b34a1a7cd532f61c3f76fafbcbf3ae69
                                                                                                  • Instruction ID: b0fc6b1d4708f2ed526ad8f2bdeba4d30d536e7d67aea6559657167911b24a8e
                                                                                                  • Opcode Fuzzy Hash: b5e803336139220789ce0cb88c98e581b34a1a7cd532f61c3f76fafbcbf3ae69
                                                                                                  • Instruction Fuzzy Hash: E711293264D216BEFF119B75AC00B2E36A9DFAA7E5F0201A6EE14D71A0CBB0DC404291
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __FF_MSGBANNER.LIBCMT ref: 00F1B482
                                                                                                  • HeapAlloc.KERNEL32(00000000,?,00000001,00000000,?,?,00F1DAE6,00000018,00F26328,0000000C,00F1DB7C,?,?,?,00F1E36B,00000004), ref: 00F1B4D6
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AllocHeap
                                                                                                  • String ID:
                                                                                                  • API String ID: 4292702814-0
                                                                                                  • Opcode ID: 45d9061cedbce8453d92988069b0eae18bd6525663634a86da4217c8124085e6
                                                                                                  • Instruction ID: 3c7a87f198d59e930f02d10d47cd6d468d7d609dd09d594ec462faac76107c44
                                                                                                  • Opcode Fuzzy Hash: 45d9061cedbce8453d92988069b0eae18bd6525663634a86da4217c8124085e6
                                                                                                  • Instruction Fuzzy Hash: 4B112632909224EBEB30AF289C017EA7359DF50770F298021FC099B1D3CBA59CC1B691
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CallFilterFunc@8__getstream
                                                                                                  • String ID:
                                                                                                  • API String ID: 2779671989-0
                                                                                                  • Opcode ID: 715f3990ae817bc52fd7c9164a467f0bccfdcfae97ee1f7ea21f66d232294c31
                                                                                                  • Instruction ID: 0d9905519ceefc20730f919b0d62e3e6bbfd9857d652907ccb18247e1ffc61e0
                                                                                                  • Opcode Fuzzy Hash: 715f3990ae817bc52fd7c9164a467f0bccfdcfae97ee1f7ea21f66d232294c31
                                                                                                  • Instruction Fuzzy Hash: 8011E6B09043C59FE751AFB0CE8379E3BF5BF05210B1588BEC4659B399EA36C9408751
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CallFilterFunc@8__getstream
                                                                                                  • String ID:
                                                                                                  • API String ID: 2779671989-0
                                                                                                  • Opcode ID: a9c2bfa34ba3bec5b6206c09f5f164dbf35d76ee743d2b3878a1b03d64423fb2
                                                                                                  • Instruction ID: 34c1633694f17cacf1982660491ddc3a7644c998f65e56fec66403966af386b0
                                                                                                  • Opcode Fuzzy Hash: a9c2bfa34ba3bec5b6206c09f5f164dbf35d76ee743d2b3878a1b03d64423fb2
                                                                                                  • Instruction Fuzzy Hash: 8C11E6B0D0834ADEF750AFB48C807AE3EA9AF09368F56C46AD210DB191DB3589809771
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CallFilterFunc@8__getstream
                                                                                                  • String ID:
                                                                                                  • API String ID: 2779671989-0
                                                                                                  • Opcode ID: 7278b9afbd6a435b8599c16fdd0ea518ed51abb6d96f882fc763d279110f6440
                                                                                                  • Instruction ID: 5a9b80624d6162ad887515ada37fdcfcd94c4529c8c70cccf9133378a48ea55b
                                                                                                  • Opcode Fuzzy Hash: 7278b9afbd6a435b8599c16fdd0ea518ed51abb6d96f882fc763d279110f6440
                                                                                                  • Instruction Fuzzy Hash: 6F11C8B1D0D3059EDB10BFB48C826EE77B69F04320F698838E41D97142D77989C4BBA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __fileno__locking
                                                                                                  • String ID:
                                                                                                  • API String ID: 2385650056-0
                                                                                                  • Opcode ID: 46460d34f8ef143c1d95679b96208fb330207c26e11226a4fe7a61c09fa8abde
                                                                                                  • Instruction ID: d23169732b89f8c4b5a6229c8a12f9fe1340ac65250f80ee5c1151aa04896163
                                                                                                  • Opcode Fuzzy Hash: 46460d34f8ef143c1d95679b96208fb330207c26e11226a4fe7a61c09fa8abde
                                                                                                  • Instruction Fuzzy Hash: 8101D632204B405FE7218A6DC946F57F7EDDF442B0F14891EE4FA836D4D675E8419B90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __fileno__locking
                                                                                                  • String ID:
                                                                                                  • API String ID: 2385650056-0
                                                                                                  • Opcode ID: ee1898c83c73028738548f1b3af915521830ca43611031c30255603978cbfc18
                                                                                                  • Instruction ID: 1c6ca866935e2703baed9ea86bd8137af8290ea05291c92a63f41b74dc20cb4f
                                                                                                  • Opcode Fuzzy Hash: ee1898c83c73028738548f1b3af915521830ca43611031c30255603978cbfc18
                                                                                                  • Instruction Fuzzy Hash: 8301D632A01B005FE7218A6DC885A93B7E8EF81370F10851DE4A6C7681D678ECC15A91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • HeapCreate.KERNEL32(00000000,00001000,00000000,?,73AC6840,00000001), ref: 73AC8977
                                                                                                  • HeapDestroy.KERNEL32(?,73AC6840,00000001), ref: 73AC89AE
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$CreateDestroy
                                                                                                  • String ID:
                                                                                                  • API String ID: 3296620671-0
                                                                                                  • Opcode ID: c6675f4e423460bf8473764dea504061c3ae7b299b02ba54d3389906b0111826
                                                                                                  • Instruction ID: de3f7d46b83977dcbd09ab413f390069e79cf7259a5fffb0cea99f5957f36eb6
                                                                                                  • Opcode Fuzzy Hash: c6675f4e423460bf8473764dea504061c3ae7b299b02ba54d3389906b0111826
                                                                                                  • Instruction Fuzzy Hash: 1BF0A733654385AFEB026B739D0772577EDF744245F24442BE40DC6198E770C0628F02
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • HeapCreate.KERNEL32(00000000,00001000,00000000,?,6D0DF2E7,00000001), ref: 6D0E214E
                                                                                                  • HeapDestroy.KERNEL32(?,6D0DF2E7,00000001), ref: 6D0E2185
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$CreateDestroy
                                                                                                  • String ID:
                                                                                                  • API String ID: 3296620671-0
                                                                                                  • Opcode ID: 37db452ff30e29967e0b814aa71f697f8dec055a376ca783a1b0c2a3db330eb6
                                                                                                  • Instruction ID: f92bc41c1718cf2b8bb61894f8049dadaad05996a37865adf1ec143240013f4d
                                                                                                  • Opcode Fuzzy Hash: 37db452ff30e29967e0b814aa71f697f8dec055a376ca783a1b0c2a3db330eb6
                                                                                                  • Instruction Fuzzy Hash: 5FF0E5316593469FFF919BB09D46B3A3AF8E7C27D9F10446AEA0CC7081FBB4C1808601
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • HeapCreate.KERNEL32(00000000,00001000,00000000), ref: 00F192AB
                                                                                                  • HeapDestroy.KERNEL32 ref: 00F192E2
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$CreateDestroy
                                                                                                  • String ID:
                                                                                                  • API String ID: 3296620671-0
                                                                                                  • Opcode ID: e60acd6e296fc2d8a659ebd94fac4e6de0571988716ca8f75bb594b791d15b80
                                                                                                  • Instruction ID: 8a7dd984e77d4c28de0f2d579b8421cccc4de998bdac7ccb12038115dd18bdb7
                                                                                                  • Opcode Fuzzy Hash: e60acd6e296fc2d8a659ebd94fac4e6de0571988716ca8f75bb594b791d15b80
                                                                                                  • Instruction Fuzzy Hash: 41F0A031A6C349BAEF219B71BC5A7A537D8E780366F208425F90DD5491EAF08680BA80
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ___crtCorExitProcess.LIBCMT ref: 00F17F2C
                                                                                                    • Part of subcall function 00F17EF4: GetModuleHandleA.KERNEL32(mscoree.dll,?,00F17F31,?,?,00F1B498,000000FF,0000001E,?,00F1DAE6,00000018,00F26328,0000000C,00F1DB7C,?,?), ref: 00F17EFE
                                                                                                    • Part of subcall function 00F17EF4: GetProcAddress.KERNEL32(00000000,CorExitProcess,?,00F17F31,?,?,00F1B498,000000FF,0000001E,?,00F1DAE6,00000018,00F26328,0000000C,00F1DB7C,?), ref: 00F17F0E
                                                                                                  • ExitProcess.KERNEL32 ref: 00F17F35
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExitProcess$AddressHandleModuleProc___crt
                                                                                                  • String ID:
                                                                                                  • API String ID: 2427264223-0
                                                                                                  • Opcode ID: 3d8a3edd900e41f292b12558e6a5023d27be18d54235d6bda340c872f2326a2a
                                                                                                  • Instruction ID: fb6e30d5814cf10b23908a5390d6aca566ac4027689ad3f1dcce132dace97084
                                                                                                  • Opcode Fuzzy Hash: 3d8a3edd900e41f292b12558e6a5023d27be18d54235d6bda340c872f2326a2a
                                                                                                  • Instruction Fuzzy Hash: 8BB0923100424CBBCB053F16DC0A88A7F6AEB813A0B158060FA0809431DF72ADD2EA80
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetVersionExA.KERNEL32(?), ref: 6D0D70E9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Version
                                                                                                  • String ID:
                                                                                                  • API String ID: 1889659487-0
                                                                                                  • Opcode ID: 2d350be4c093c77913c21026fe796b3a25a0ff43656b932b23624bd05b29ea4c
                                                                                                  • Instruction ID: 07baf8b2be406f4d422a11488e87e0cbda773f1815c8884bd9461dd85bf5076c
                                                                                                  • Opcode Fuzzy Hash: 2d350be4c093c77913c21026fe796b3a25a0ff43656b932b23624bd05b29ea4c
                                                                                                  • Instruction Fuzzy Hash: 7C014034E1430BDAFBD0DB7D894176D73F8AB86308F514267D81AD3181FB3089898B65
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetVersionExA.KERNEL32(?), ref: 6D0D7192
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Version
                                                                                                  • String ID:
                                                                                                  • API String ID: 1889659487-0
                                                                                                  • Opcode ID: bee37224f04ef2f3799e2d64464e0074cae3ea7aa3ebd878f1cfe712a2845679
                                                                                                  • Instruction ID: eaa1838f8e6f608afbafaf675235b80ca01ea3b670871f8170aef0f0f6c35779
                                                                                                  • Opcode Fuzzy Hash: bee37224f04ef2f3799e2d64464e0074cae3ea7aa3ebd878f1cfe712a2845679
                                                                                                  • Instruction Fuzzy Hash: C7012134E043069EEBE0DB7D894175D77F9AB86218F51426BC91AD3181DB308949CB11
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __fclose_nolock
                                                                                                  • String ID:
                                                                                                  • API String ID: 4232755567-0
                                                                                                  • Opcode ID: 2fcb0f3c06246028e0f80eb428f6f27d21bd0053458794772c82b0e0463b36cd
                                                                                                  • Instruction ID: 0ce1315f117923b4aa3e742b8b7b4d278c6fa0c86710903b2ec1c7bea6b6f56a
                                                                                                  • Opcode Fuzzy Hash: 2fcb0f3c06246028e0f80eb428f6f27d21bd0053458794772c82b0e0463b36cd
                                                                                                  • Instruction Fuzzy Hash: 6CF0C870C007849FE311AB6D890274E7AE46F45330F15864BD479562F8CB39C6019F55
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __initterm_e
                                                                                                  • String ID:
                                                                                                  • API String ID: 4027532054-0
                                                                                                  • Opcode ID: 75a3e0b7531277e08ed275ab81da57efc2d595e08ee81a55b424b1ad98e16c4f
                                                                                                  • Instruction ID: 8ee8c3775050779784b1130a0bbb24cb03b9132631322568bc13b5d109378590
                                                                                                  • Opcode Fuzzy Hash: 75a3e0b7531277e08ed275ab81da57efc2d595e08ee81a55b424b1ad98e16c4f
                                                                                                  • Instruction Fuzzy Hash: BCF09032344A846EF60022B55A0BB8523A4FF08716FA0012BF96AAC1EDEB23C4928700
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __initterm_e
                                                                                                  • String ID:
                                                                                                  • API String ID: 4027532054-0
                                                                                                  • Opcode ID: 21be89851e57bf049255edf94d93296b66549181988ebbc3dc6797c8406710f6
                                                                                                  • Instruction ID: 8bf08966835a2ad3e054c9a4f80d4d23e9624c6578bb91599931762a8fc08b86
                                                                                                  • Opcode Fuzzy Hash: 21be89851e57bf049255edf94d93296b66549181988ebbc3dc6797c8406710f6
                                                                                                  • Instruction Fuzzy Hash: 71F05E31A8C307AEFB7C97B6AC05B3936A8DB81796F310016FE28D94C2DFA180548057
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __fclose_nolock
                                                                                                  • String ID:
                                                                                                  • API String ID: 4232755567-0
                                                                                                  • Opcode ID: e3f5d002171ba429003c27e5a338b8dd6485f008bdcef42ca37eed213bbcc2d5
                                                                                                  • Instruction ID: e8081008e62304667c458eb4f6a6119e2fa181c2941522f37ea4447f12137a76
                                                                                                  • Opcode Fuzzy Hash: e3f5d002171ba429003c27e5a338b8dd6485f008bdcef42ca37eed213bbcc2d5
                                                                                                  • Instruction Fuzzy Hash: 77F02270C487459EE3619B799800B9E7EE8AF45378F62C30AD1389B0E1CB3846028B46
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __fclose_nolock
                                                                                                  • String ID:
                                                                                                  • API String ID: 4232755567-0
                                                                                                  • Opcode ID: 51fe54e2c9e7a8f7cacd6bf8306c6c25a11497e051c405c8d6f56ef25de6a47f
                                                                                                  • Instruction ID: bd36b36386f2649e43e0962a6c9d6dd83ea4d33e9b77d69d862431e35e7e0b7b
                                                                                                  • Opcode Fuzzy Hash: 51fe54e2c9e7a8f7cacd6bf8306c6c25a11497e051c405c8d6f56ef25de6a47f
                                                                                                  • Instruction Fuzzy Hash: A2F0C271C0934499C711FB698C026DE7AB09F85330F608304F03EA60D2C67C46C2BE46
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __initterm_e
                                                                                                  • String ID:
                                                                                                  • API String ID: 4027532054-0
                                                                                                  • Opcode ID: 0d281e964fe0e28ac318ef1bf6d959e61473788e32954c04bce864c2236f9db4
                                                                                                  • Instruction ID: 28daaa08e37878b39180c763eebbf22861b59c1954e1a9283fb44b845a9b7035
                                                                                                  • Opcode Fuzzy Hash: 0d281e964fe0e28ac318ef1bf6d959e61473788e32954c04bce864c2236f9db4
                                                                                                  • Instruction Fuzzy Hash: 75F0E93124830959EF3967A1AD47BC53398EB44726F140019F914D50D2DFF8C8C9B556
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __calloc_impl
                                                                                                  • String ID:
                                                                                                  • API String ID: 2175177749-0
                                                                                                  • Opcode ID: 100eea5b0c52ac80efb81ab6c7dec1ed5e7b7967733a5c4d771986ec6da5406a
                                                                                                  • Instruction ID: 5204159a033373d196fe35c90eee036bfc895600d9dd70329fa7989a4750baaf
                                                                                                  • Opcode Fuzzy Hash: 100eea5b0c52ac80efb81ab6c7dec1ed5e7b7967733a5c4d771986ec6da5406a
                                                                                                  • Instruction Fuzzy Hash: 9FE06536540294BBDB114E94C902BC936FDAB85664F19005EED06A7258E670DE0096A5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __calloc_impl
                                                                                                  • String ID:
                                                                                                  • API String ID: 2175177749-0
                                                                                                  • Opcode ID: 0f20a837f93326a4025be3b2bbf171935fb245581a7509884b240fb5b1cbe05a
                                                                                                  • Instruction ID: 40f97ae74a550fa12c34c603c58cb619fba1214b903c9f9dd764db5beac60ff4
                                                                                                  • Opcode Fuzzy Hash: 0f20a837f93326a4025be3b2bbf171935fb245581a7509884b240fb5b1cbe05a
                                                                                                  • Instruction Fuzzy Hash: 01E06D7A600119AFEB118B959901BAE36E99B846E5F120065ED14E7110DBB0DA01D6A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __calloc_impl
                                                                                                  • String ID:
                                                                                                  • API String ID: 2175177749-0
                                                                                                  • Opcode ID: 036c3dd94c1a7d239b4fe79d371a8158f3537555fa9b21d57610d5a54f349ae4
                                                                                                  • Instruction ID: acebc8279ce568073bfd6f0d511ecb68009ee3be384c784cb0d7d09e6f525488
                                                                                                  • Opcode Fuzzy Hash: 036c3dd94c1a7d239b4fe79d371a8158f3537555fa9b21d57610d5a54f349ae4
                                                                                                  • Instruction Fuzzy Hash: B7E06D7AA01114ABDF21AA889C02ADA76ADDB84770F1D4064BD08A7105D674DE45E6A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _doexit
                                                                                                  • String ID:
                                                                                                  • API String ID: 1975234786-0
                                                                                                  • Opcode ID: eec7c2cc112c21125ee25011a3c9f5f8ceeb673401462026301a0a9824ced2cb
                                                                                                  • Instruction ID: 7c6142919b67f023b519c7dd5a8a27f6c3abeda15685334dc12c9834e29a1087
                                                                                                  • Opcode Fuzzy Hash: eec7c2cc112c21125ee25011a3c9f5f8ceeb673401462026301a0a9824ced2cb
                                                                                                  • Instruction Fuzzy Hash: 6EB092B258020C77DA202542AC03F463A0987C0BA0F240020BA0C191A1A9A2AAAA9089
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • _strrchr.LIBCMT ref: 6D0DC4FB
                                                                                                  • FindFirstFileA.KERNEL32(?,?,?,?,?,00000000), ref: 6D0DC553
                                                                                                  • FindClose.KERNEL32(00000000,?,?,00000000), ref: 6D0DC569
                                                                                                  • FindFirstFileA.KERNEL32(?,?,?,?,00000000), ref: 6D0DC575
                                                                                                  • FindClose.KERNEL32(00000000,?,?,00000000), ref: 6D0DC585
                                                                                                  • _strrchr.LIBCMT ref: 6D0DC801
                                                                                                  • FileTimeToSystemTime.KERNEL32(?,?,00000001,inf,?,?,00000000), ref: 6D0DC897
                                                                                                  • FileTimeToSystemTime.KERNEL32(?,?,?,?,00000000), ref: 6D0DC8AF
                                                                                                  • _strrchr.LIBCMT ref: 6D0DC9FC
                                                                                                  • FileTimeToSystemTime.KERNEL32(?,?,00000001,chm,?,?,00000000), ref: 6D0DCA43
                                                                                                  • FileTimeToSystemTime.KERNEL32(?,?,?,?,00000000), ref: 6D0DCA5F
                                                                                                  Strings
                                                                                                  • SourceLangID = 0x%04X, TargetLangID = 0x%04X, xrefs: 6D0DC776
                                                                                                  • Newer version is available., xrefs: 6D0DC9E5
                                                                                                  • Target DX version is %d.%02d.%02d.%04d, xrefs: 6D0DCB4A
                                                                                                  • Force Copy!, xrefs: 6D0DC69E, 6D0DC7D0
                                                                                                  • Source DriverVer: "%s, %d.%02d.%02d.%04d", Timestamp: %d/%02d/%02d %02d:%02d:%02d.%02d, xrefs: 6D0DC979
                                                                                                  • Source DriverVer is "%s, %d.%02d.%02d.%04d", xrefs: 6D0DC9D8
                                                                                                  • Currently %s is newer than the one being installed, xrefs: 6D0DC79F
                                                                                                  • Unable to get Version on source file %s, xrefs: 6D0DC53E
                                                                                                  • Newer file is available., xrefs: 6D0DCB7D
                                                                                                  • inf, xrefs: 6D0DC810
                                                                                                  • Target DX version: %d.%02d.%02d.%04d, Timestamp: %d/%02d/%02d %02d:%02d:%02d.%02d, xrefs: 6D0DCAC1
                                                                                                  • Warning: CompareBinary(): Unable to get check sum., xrefs: 6D0DC788
                                                                                                  • binary data is not same., xrefs: 6D0DC793
                                                                                                  • Unable to get Version on target file %s, xrefs: 6D0DC51C
                                                                                                  • cat, xrefs: 6D0DC506
                                                                                                  • Target file: '%s' Target file is Version %d.%d.%d.%dSource file is Version %d.%d.%d.%d, xrefs: 6D0DC673
                                                                                                  • CheckVersions(): GetDriverVerFromInf() failed., xrefs: 6D0DC83D
                                                                                                  • Source DX version is %d.%02d.%02d.%04d, xrefs: 6D0DCB70
                                                                                                  • chm, xrefs: 6D0DCA0B
                                                                                                  • CheckVersions(): CheckForceCopy() failed., xrefs: 6D0DC7DE
                                                                                                  • Target DriverVer: "%s, %d.%02d.%02d.%04d", Timestamp: %d/%02d/%02d %02d:%02d:%02d.%02d, xrefs: 6D0DC914
                                                                                                  • Source DX version: %d.%02d.%02d.%04d, Timestamp: %d/%02d/%02d %02d:%02d:%02d.%02d, xrefs: 6D0DCB1F
                                                                                                  • Target DriverVer is "%s, %d.%02d.%02d.%04d", xrefs: 6D0DC9AB
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Time$File$FindSystem$_strrchr$CloseFirst
                                                                                                  • String ID: CheckVersions(): CheckForceCopy() failed.$CheckVersions(): GetDriverVerFromInf() failed.$Currently %s is newer than the one being installed$Force Copy!$Newer file is available.$Newer version is available.$Source DX version is %d.%02d.%02d.%04d$Source DX version: %d.%02d.%02d.%04d, Timestamp: %d/%02d/%02d %02d:%02d:%02d.%02d$Source DriverVer is "%s, %d.%02d.%02d.%04d"$Source DriverVer: "%s, %d.%02d.%02d.%04d", Timestamp: %d/%02d/%02d %02d:%02d:%02d.%02d$SourceLangID = 0x%04X, TargetLangID = 0x%04X$Target DX version is %d.%02d.%02d.%04d$Target DX version: %d.%02d.%02d.%04d, Timestamp: %d/%02d/%02d %02d:%02d:%02d.%02d$Target DriverVer is "%s, %d.%02d.%02d.%04d"$Target DriverVer: "%s, %d.%02d.%02d.%04d", Timestamp: %d/%02d/%02d %02d:%02d:%02d.%02d$Target file: '%s' Target file is Version %d.%d.%d.%dSource file is Version %d.%d.%d.%d$Unable to get Version on source file %s$Unable to get Version on target file %s$Warning: CompareBinary(): Unable to get check sum.$binary data is not same.$cat$chm$inf
                                                                                                  • API String ID: 502818252-3991829042
                                                                                                  • Opcode ID: 85c46f3ffb1e5ffd52b5e3686cc91a778f9ba31a5673369e043d8c4cb3067524
                                                                                                  • Instruction ID: 0add50b25ec7e313eb8a09acffa4c1cc4f58c92240e408af5d9c763804f0d8df
                                                                                                  • Opcode Fuzzy Hash: 85c46f3ffb1e5ffd52b5e3686cc91a778f9ba31a5673369e043d8c4cb3067524
                                                                                                  • Instruction Fuzzy Hash: BF02647154432AAAFBA48B958C44FBAB3FCAF0D201F500597F989E2085EB34DD90DB75
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __wstrtime.LIBCMT ref: 00F1393B
                                                                                                  • __wstrtime.LIBCMT ref: 00F13944
                                                                                                    • Part of subcall function 00F13803: GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00F13839
                                                                                                    • Part of subcall function 00F13803: OutputDebugStringA.KERNEL32(DXSETUP_DPF(): Unable to open log file.), ref: 00F13848
                                                                                                    • Part of subcall function 00F13803: CreateDirectoryA.KERNEL32(?,00000000), ref: 00F13888
                                                                                                    • Part of subcall function 00F13803: GetLastError.KERNEL32 ref: 00F13892
                                                                                                  • _strrchr.LIBCMT ref: 00F1398A
                                                                                                  • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00F13A9A
                                                                                                  • LocalFree.KERNEL32(?), ref: 00F13ABF
                                                                                                  • GetLastError.KERNEL32 ref: 00F13AC7
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DirectoryErrorLast__wstrtime$CreateDebugFormatFreeLocalMessageOutputStringWindows_strrchr
                                                                                                  • String ID: $ Error:$ Failed API:%s$ File in process:$ - $ module: %s(%s), file: %s, line: %d, function: %s$%s(): %s$%s(): %s failed, error = %d.$%s(): %s failed, error = 0x%x.$%s(): %s failed.$(%d)$(0x%x)$--------------------$DXSError(): FormatMessage() failed, error = %d.$DXSError(): FormatMessage() failed, system cannot find message text for error.$DXSetup$Mar 30 2011$[%s %s]
                                                                                                  • API String ID: 3982051927-2477982902
                                                                                                  • Opcode ID: 812ca3d14de7d2f1bc89b9ab0e9b90fbe5dbdaa32cd06fc10e1e36de6d2f5409
                                                                                                  • Instruction ID: cae13198c16826fca041db3f8633460c90b762ce0dac3fe83a6d71d10687135f
                                                                                                  • Opcode Fuzzy Hash: 812ca3d14de7d2f1bc89b9ab0e9b90fbe5dbdaa32cd06fc10e1e36de6d2f5409
                                                                                                  • Instruction Fuzzy Hash: 8061A5B2904219ABDF21FBA4CC4AEDB7B7CEF04750F040095F60996142DB7A9BC4BB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetLastError.KERNEL32(0000000D), ref: 6D0D7D93
                                                                                                  • SetLastError.KERNEL32(00000057,?,00000004,6D0D1A1C), ref: 6D0D7DFB
                                                                                                  • FindResourceA.KERNEL32(?,?,DATA,?,?,?), ref: 6D0D7E45
                                                                                                  • GetLastError.KERNEL32(Unable to find EULA %s.,?,?,?,?), ref: 6D0D7E5B
                                                                                                  • SizeofResource.KERNEL32(?,00000000,?,?,?,?), ref: 6D0D7E8D
                                                                                                  • SetLastError.KERNEL32(0000007A,?,?,?,?,?), ref: 6D0D7EAD
                                                                                                  • LoadResource.KERNEL32(?,?,?,?,?,?,?), ref: 6D0D7ED1
                                                                                                  • GetLastError.KERNEL32(00000000,?,?,?,?,?), ref: 6D0D7EDC
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$Resource$FindLoadSizeof
                                                                                                  • String ID: DATA$EULA text is invalid.$FindResource()$Insufficient buffer.$Invalid parameter - output buffer is NULL.$LoadResource()$LockResource()$SETUP_AGREEMENT_%s$Unable to find EULA %s.$Unable to find EULA for the specified language.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\eula.cpp$iDirectXSetupGetEULAA
                                                                                                  • API String ID: 353423887-1232173623
                                                                                                  • Opcode ID: 2e00e2505b51bb7bcf0db0110fcf5004525acef6ccc6b62d2f253fdc8d31e7f2
                                                                                                  • Instruction ID: 9eaf3bc4a2c4665f89963a31263154f1dd65bb72610c8f25caa346f4c71ebef4
                                                                                                  • Opcode Fuzzy Hash: 2e00e2505b51bb7bcf0db0110fcf5004525acef6ccc6b62d2f253fdc8d31e7f2
                                                                                                  • Instruction Fuzzy Hash: B7515575D44349BEFB81ABA4CC45FFE7BB9EB49344B804417F606E6082EB7099058B62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FindFirstFileA.KERNEL32(?,?,?,?,\*.*), ref: 6D0DA416
                                                                                                  • lstrcmpA.KERNEL32(?,6D0D2CC8), ref: 6D0DA444
                                                                                                  • lstrcmpA.KERNEL32(?,6D0D2CC4), ref: 6D0DA45E
                                                                                                    • Part of subcall function 6D0D9A47: _strrchr.LIBCMT ref: 6D0D9A51
                                                                                                  • GetFileAttributesA.KERNEL32(?), ref: 6D0DA4E1
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 6D0DA4ED
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  • FindNextFileA.KERNEL32(?,?), ref: 6D0DA57F
                                                                                                  • FindClose.KERNEL32(?), ref: 6D0DA593
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileFind$__wstrtime_strrchrlstrcmp$AttributesCloseErrorFirstLastNext
                                                                                                  • String ID: CleanUpDirectory$DeleteFile("%s") return 0, reason = %d.$GetFileAttributes()$Unable to create path string, %s\%s.$Unable to create path string, %s\*.*.$Unable to remove: %s which is locked, reason = %d.$\*.*$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h
                                                                                                  • API String ID: 338635360-3006747567
                                                                                                  • Opcode ID: e8c32eef483cf6986db1007f4f9ca345b775799cb9e2efb92bb7851f7dacd000
                                                                                                  • Instruction ID: 48fe7febbe4c25adf2dca4741ecf6b34628d688e75cf816e86fcb6595c43dcdc
                                                                                                  • Opcode Fuzzy Hash: e8c32eef483cf6986db1007f4f9ca345b775799cb9e2efb92bb7851f7dacd000
                                                                                                  • Instruction Fuzzy Hash: C141827194431CAAFBA09BA48C88FFF77BCEB55344F604493F909E2040DB709E848E61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetSystemDirectoryA.KERNEL32(?,00000104,00000000,Function_00004570,00000000), ref: 00F169D3
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 00F169DE
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F1393B
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F13944
                                                                                                    • Part of subcall function 00F1390A: _strrchr.LIBCMT ref: 00F1398A
                                                                                                  • #17.COMCTL32(?,?,?,?,?), ref: 00F16AE2
                                                                                                  • ExitWindowsEx.USER32(00000002,00000000,?,00000000), ref: 00F16B13
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime$DirectoryErrorExitLastSystemWindows_strrchr
                                                                                                  • String ID: GetFileVersion() failed.$GetSystemDirectory()$P$StartWizard$StartWizard()$Unable to create path string, %s%s.$Win95(): This platform is not supported.$\comctl32.dll$comctl32.dll version: %d.%02d.%02d.%04d$e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp$reboot system
                                                                                                  • API String ID: 1959146012-4094694292
                                                                                                  • Opcode ID: e56d20f8c97de8e7ba2547f87a78ab328fc72e3eaabb523aa00dc66b72d0f5d7
                                                                                                  • Instruction ID: eafdd7db65ac71265e13e453f6aede22dcf4afc7bcb26d3dead622fb3a1b56ce
                                                                                                  • Opcode Fuzzy Hash: e56d20f8c97de8e7ba2547f87a78ab328fc72e3eaabb523aa00dc66b72d0f5d7
                                                                                                  • Instruction Fuzzy Hash: B8412C72A4425476D724F7A58C46EEF766CDF84B00F404154BE44F60C2DA78DAD4F6B2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetCurrentProcess.KERNEL32 ref: 00F14176
                                                                                                  • OpenProcessToken.ADVAPI32(00000000,000F01FF,?), ref: 00F14186
                                                                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00F1419C
                                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00F141CB
                                                                                                  • CloseHandle.KERNEL32(?), ref: 00F141D4
                                                                                                  • FreeLibrary.KERNEL32(73AC0000), ref: 00F141E4
                                                                                                  • GetLastError.KERNEL32 ref: 00F141EE
                                                                                                  Strings
                                                                                                  • SeShutdownPrivilege, xrefs: 00F14196
                                                                                                  • FreeLibrary(), xrefs: 00F141FA
                                                                                                  • e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp, xrefs: 00F14209
                                                                                                  • EnableReboot, xrefs: 00F141FF
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ProcessToken$AdjustCloseCurrentErrorFreeHandleLastLibraryLookupOpenPrivilegePrivilegesValue
                                                                                                  • String ID: EnableReboot$FreeLibrary()$SeShutdownPrivilege$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp
                                                                                                  • API String ID: 274012654-347618328
                                                                                                  • Opcode ID: f5e1f3c9a2defe2fe57d9990a3bdf92fe5e14b6deecdb4b4e491416c16a48481
                                                                                                  • Instruction ID: fc8fda806b75f5444b3a9e98a1fe25c63219701829384bcc6cf77644b3acd49e
                                                                                                  • Opcode Fuzzy Hash: f5e1f3c9a2defe2fe57d9990a3bdf92fe5e14b6deecdb4b4e491416c16a48481
                                                                                                  • Instruction Fuzzy Hash: 2F119771E0121DABDB20DFA4DC09DEFBBB8FF08B51B014119F604E2150DBB49A81ABA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __get_wpgmptr.LIBCMT ref: 00F2154C
                                                                                                  • VirtualQuery.KERNEL32(?,?,0000001C), ref: 00F21577
                                                                                                  • GetSystemInfo.KERNEL32(?), ref: 00F2158F
                                                                                                  • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00F215B8
                                                                                                  • GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00F215C8
                                                                                                  • VirtualAlloc.KERNEL32(?,?,00001000,00000004), ref: 00F2164F
                                                                                                  • VirtualProtect.KERNEL32(?,?,?,?), ref: 00F21662
                                                                                                    • Part of subcall function 00F1A451: OutputDebugStringA.KERNEL32(Invalid parameter passed to C runtime function.), ref: 00F1A4E5
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Virtual$AddressAllocDebugHandleInfoModuleOutputProcProtectQueryStringSystem__get_wpgmptr
                                                                                                  • String ID: SetThreadStackGuarantee$kernel32.dll
                                                                                                  • API String ID: 2401657611-423161677
                                                                                                  • Opcode ID: 12e8387bf6a378f7b97608b99c8111a36b80149957df933e4c4c88a68d3fc392
                                                                                                  • Instruction ID: 1c4dab9385f0bad0c18919c4458aa4ebf73adadb6c4868f50459bf21788233b5
                                                                                                  • Opcode Fuzzy Hash: 12e8387bf6a378f7b97608b99c8111a36b80149957df933e4c4c88a68d3fc392
                                                                                                  • Instruction Fuzzy Hash: AE41A372D00118ABCF11DFE0EC85AEEBBB9FF58350F184065E501E6140D7349A85EB95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetPrivateProfileStringA.KERNEL32(Version,DriverVer,6D0D1EA0,?,00000104,?), ref: 6D0DC3F8
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: PrivateProfileString
                                                                                                  • String ID: DriverVer$GetDriverVerFromInf(): StringToVersionInfo() failed.$GetDriverVerFromInf(): Unable to find %s from %s.$GetDriverVerFromInf(): Unable to get %s from %s.$Version
                                                                                                  • API String ID: 1096422788-1349852725
                                                                                                  • Opcode ID: 7c81fcaaa021fef73f3ee487f5337abbd700d0a90ea9cca3e924cab03b84a571
                                                                                                  • Instruction ID: 537e1e8f2a000b94e9d2c34064062a772a8d4d5d6c26f54347be7cef2f910f3d
                                                                                                  • Opcode Fuzzy Hash: 7c81fcaaa021fef73f3ee487f5337abbd700d0a90ea9cca3e924cab03b84a571
                                                                                                  • Instruction Fuzzy Hash: E221D37190431C6BFB90CF658C44FFB7BBCEB99344F0040A6A948D3141EB749A80CA71
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                    • Part of subcall function 00F1ECF3: SetFilePointer.KERNEL32(00000000,00000000,?,00000000,00000000,?,?,?,?,00F1EF80,?,00000000,00000000,00000002,00000000,00000000), ref: 00F1ED35
                                                                                                    • Part of subcall function 00F1ECF3: GetLastError.KERNEL32(?,00F1EF80,?,00000000,00000000,00000002,00000000,00000000,?), ref: 00F1ED42
                                                                                                    • Part of subcall function 00F1ECF3: __dosmaperr.LIBCMT ref: 00F1ED4D
                                                                                                  • GetProcessHeap.KERNEL32(00000008,00001000,?,?,?,?,?,00000000,00000109,00000000,?,?,00F202ED,00000109,?), ref: 00F2211C
                                                                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00000000,00000109,00000000,?,?,00F202ED,00000109,?), ref: 00F22123
                                                                                                  • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,00F202ED), ref: 00F2219F
                                                                                                  • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,00F202ED,00000109), ref: 00F221A6
                                                                                                  • SetEndOfFile.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,00F202ED), ref: 00F22201
                                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,00F202ED,00000109), ref: 00F2222E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$ErrorFileLastProcess$AllocFreePointer__dosmaperr
                                                                                                  • String ID:
                                                                                                  • API String ID: 3789379547-0
                                                                                                  • Opcode ID: 5393d1a328ad0af7300bb0bedd03cbd7d9e84a73f55760b82703ff5048732556
                                                                                                  • Instruction ID: d98b09eabcd92521a6a1d6ad2f2ab065dd7b9f9a714e30fd50f82e65e69ba5c9
                                                                                                  • Opcode Fuzzy Hash: 5393d1a328ad0af7300bb0bedd03cbd7d9e84a73f55760b82703ff5048732556
                                                                                                  • Instruction Fuzzy Hash: B141F572D00129BFDF602FB8DC46AED7A66FB00330F154225FA24A61E0D7394DA1BB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 73ACAA5B
                                                                                                  • UnhandledExceptionFilter.KERNEL32(73AC25F0), ref: 73ACAA66
                                                                                                  • GetCurrentProcess.KERNEL32(C0000409), ref: 73ACAA71
                                                                                                  • TerminateProcess.KERNEL32(00000000), ref: 73ACAA78
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
                                                                                                  • String ID:
                                                                                                  • API String ID: 3231755760-0
                                                                                                  • Opcode ID: c43a1c43dac6c93d8d04825641673e8b104549a21ce071b50eaf27207d455a5f
                                                                                                  • Instruction ID: b07ce5e886f7c62dbee5008c56662c209eaeff78ca0a8bd63b22d758c904572e
                                                                                                  • Opcode Fuzzy Hash: c43a1c43dac6c93d8d04825641673e8b104549a21ce071b50eaf27207d455a5f
                                                                                                  • Instruction Fuzzy Hash: BE21F2F6922244DFDB11EF5BE086B487BB4FB08311B68415AE40D87308E77895638F59
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6D0E4055
                                                                                                  • UnhandledExceptionFilter.KERNEL32(6D0D4DF4), ref: 6D0E4060
                                                                                                  • GetCurrentProcess.KERNEL32(C0000409), ref: 6D0E406B
                                                                                                  • TerminateProcess.KERNEL32(00000000), ref: 6D0E4072
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
                                                                                                  • String ID:
                                                                                                  • API String ID: 3231755760-0
                                                                                                  • Opcode ID: 57d01d3108bb11ec6613e23843bc51288a32bf91a877badb7f91e118bdffc3e9
                                                                                                  • Instruction ID: 5975743a2a9d26fbcbf03de3cbecc588aa96fdeb28a71e38d0b1ca44bd53df6d
                                                                                                  • Opcode Fuzzy Hash: 57d01d3108bb11ec6613e23843bc51288a32bf91a877badb7f91e118bdffc3e9
                                                                                                  • Instruction Fuzzy Hash: 42219BB9801309DFEB50CF6AD5887957BF4FB8AB04B58442EE809C7B81E7716581CF16
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00F1B3E1
                                                                                                  • UnhandledExceptionFilter.KERNEL32(00F1298C), ref: 00F1B3EC
                                                                                                  • GetCurrentProcess.KERNEL32(C0000409), ref: 00F1B3F7
                                                                                                  • TerminateProcess.KERNEL32(00000000), ref: 00F1B3FE
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
                                                                                                  • String ID:
                                                                                                  • API String ID: 3231755760-0
                                                                                                  • Opcode ID: 506e111ec61b6f9aa996907f6e849c7e4c4b0413c1d1424b72f22482ba72477d
                                                                                                  • Instruction ID: 4b83caf11701948a7b0c9316be73c785f09f3be04ab3e880e237f5a01346d044
                                                                                                  • Opcode Fuzzy Hash: 506e111ec61b6f9aa996907f6e849c7e4c4b0413c1d1424b72f22482ba72477d
                                                                                                  • Instruction Fuzzy Hash: 5C21D0B888E20EDFCB60DF29F9646947BF4BB08310F418059EA0897360EBB05587EF05
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetLocalTime.KERNEL32(00F13734,?,00000000,?,00F13734), ref: 00F174C7
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LocalTime
                                                                                                  • String ID:
                                                                                                  • API String ID: 481472006-0
                                                                                                  • Opcode ID: 0aaa12a7e8e58d919e6fa4f6e58695fa4bdda0a277cca7c69bc7aa2bd7e30955
                                                                                                  • Instruction ID: 86983ffc0faada4b7b737ea45c88559575eeb1abd692fd833638b6d69a5c536d
                                                                                                  • Opcode Fuzzy Hash: 0aaa12a7e8e58d919e6fa4f6e58695fa4bdda0a277cca7c69bc7aa2bd7e30955
                                                                                                  • Instruction Fuzzy Hash: 21117F22309380DBC3206BAD68C56DA7BF69F16320F1CC46EF1D947283C0759889D722
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_00007E43), ref: 00F17E8F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                                  • String ID:
                                                                                                  • API String ID: 3192549508-0
                                                                                                  • Opcode ID: 2925d979fbce387e6abeb4e43972204ad02fffdd00031ed69de0192274cd84a0
                                                                                                  • Instruction ID: d4fa1e45e30e3163caca69a326a702d11f9468242e6d7137b8931cf16a2cdc95
                                                                                                  • Opcode Fuzzy Hash: 2925d979fbce387e6abeb4e43972204ad02fffdd00031ed69de0192274cd84a0
                                                                                                  • Instruction Fuzzy Hash: A49002642A62065A560027715D0E5C575E56B7C712B4254906206E4458DB5085417612
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetWindowLongA.USER32(?,000000EB), ref: 00F157A2
                                                                                                  • SetWindowLongA.USER32(?,000000EB,?), ref: 00F157C8
                                                                                                  • GetDlgItem.USER32(?,00001389), ref: 00F157DA
                                                                                                  • SendMessageA.USER32(00000000,00000030,?,00000001), ref: 00F157E3
                                                                                                  • GetDlgItem.USER32(?,0000138A,00000030,?,00000001), ref: 00F157F5
                                                                                                  • SendMessageA.USER32(00000000), ref: 00F157F8
                                                                                                  • GetDlgItem.USER32(?,0000138B,00000030,?,00000001), ref: 00F1580A
                                                                                                  • GetParent.USER32(?,00000470,00000000,00000004), ref: 00F1583C
                                                                                                  • PostMessageA.USER32(00000000), ref: 00F15845
                                                                                                  • GetParent.USER32(?,0000046B,00000000,00000000), ref: 00F15851
                                                                                                  • PostMessageA.USER32(00000000), ref: 00F15854
                                                                                                  • GetDlgItem.USER32(?,00001389,00000000), ref: 00F15879
                                                                                                  • ShowWindow.USER32(00000000), ref: 00F15882
                                                                                                  • GetDlgItem.USER32(?,0000138A,00000005), ref: 00F1588C
                                                                                                  • ShowWindow.USER32(00000000), ref: 00F1588F
                                                                                                  • GetDlgItem.USER32(?,0000138B,00000000), ref: 00F15899
                                                                                                  • ShowWindow.USER32(00000000), ref: 00F1589C
                                                                                                  • GetDlgItem.USER32(?,0000138C,00000000), ref: 00F158A6
                                                                                                  • ShowWindow.USER32(00000000), ref: 00F158A9
                                                                                                  • GetDlgItem.USER32(?,0000138D,00000005), ref: 00F158B3
                                                                                                  • ShowWindow.USER32(00000000), ref: 00F158B6
                                                                                                  • GetDlgItem.USER32(?,00001397,00000000), ref: 00F1590B
                                                                                                  • ShowWindow.USER32(00000000), ref: 00F1590E
                                                                                                  • GetDlgItem.USER32(?,0000138E,00000000), ref: 00F15918
                                                                                                  • ShowWindow.USER32(00000000), ref: 00F1591B
                                                                                                  • SendMessageA.USER32(00000000), ref: 00F159EC
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Item$Window$Show$Message$Send$LongParentPost
                                                                                                  • String ID: N$PropSheet_RebootSystem()
                                                                                                  • API String ID: 1264772791-752106098
                                                                                                  • Opcode ID: cb05bfa4c8c8aa31466d873c1e814f46015ee37308611110d361b3c89488ee42
                                                                                                  • Instruction ID: 3e807b8d355a597386fa877a78bd580a848d12604a50200c39849671e637ae4a
                                                                                                  • Opcode Fuzzy Hash: cb05bfa4c8c8aa31466d873c1e814f46015ee37308611110d361b3c89488ee42
                                                                                                  • Instruction Fuzzy Hash: F46120B1A8071CB6EB346BB14C4EF9B7E1CAB84B61F125916B305BB0D1CDB8D540DEA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • EndDialog.USER32(?,00000006), ref: 6D0D7A44
                                                                                                  • lstrcmpA.KERNEL32(?,CHS,?,?), ref: 6D0D7A9C
                                                                                                  • lstrcmpA.KERNEL32(?,CHT,?,?), ref: 6D0D7AB7
                                                                                                  • lstrcmpA.KERNEL32(?,CZE,?,?), ref: 6D0D7AD2
                                                                                                  • lstrcmpA.KERNEL32(?,DUT,?,?), ref: 6D0D7AED
                                                                                                  • lstrcmpA.KERNEL32(?,FRN,?,?), ref: 6D0D7B08
                                                                                                  • FindResourceA.KERNEL32(?,?,DATA,?,?), ref: 6D0D7C0A
                                                                                                  • GetLastError.KERNEL32(Unable to find EULA %s.,?,?,?), ref: 6D0D7C1D
                                                                                                  • LoadResource.KERNEL32(?,00000000,?,?), ref: 6D0D7C4E
                                                                                                  • GetLastError.KERNEL32(Unable to load EULA %s.,?,?,?), ref: 6D0D7C64
                                                                                                  • _memset.LIBCMT ref: 6D0D7CC5
                                                                                                  • SetDlgItemTextA.USER32(?,00001B59,00000000,00000000,000012F2,?,000012F1,?,?,?,?,?), ref: 6D0D7CE4
                                                                                                  • SendDlgItemMessageA.USER32(?,00001B59,000000B1,000000FF,00000000,?,?,?,?,?), ref: 6D0D7CF7
                                                                                                  • EndDialog.USER32(?,00000007), ref: 6D0D7D0C
                                                                                                  • SendDlgItemMessageA.USER32(?,00001B59,000000B1,000000FF,00000000), ref: 6D0D7D2C
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: lstrcmp$Item$DialogErrorLastMessageResourceSend$FindLoadText_memset
                                                                                                  • String ID: 4$BRZ$CHS$CHT$CZE$DATA$DUT$EulaProc$FRN$FindResource()$GER$ITN$JPN$KOR$LoadResource()$POL$RUS$SETUP_AGREEMENT_%s$SPA$SWE$Unable to allocate memory block for EULA %s.$Unable to find EULA %s.$Unable to load EULA %s.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\eula.cpp
                                                                                                  • API String ID: 3965438891-736825585
                                                                                                  • Opcode ID: 9af007212baafb41e931e3cbf6bb225385e11a138dd89beb8d3477a20c3b5861
                                                                                                  • Instruction ID: 15466c46e3819b3167c8fbbe38eda591894d275636ed678b73314cb9ef659de8
                                                                                                  • Opcode Fuzzy Hash: 9af007212baafb41e931e3cbf6bb225385e11a138dd89beb8d3477a20c3b5861
                                                                                                  • Instruction Fuzzy Hash: 2A917F31D0430BAAFB819BE5CD04FFE7AB8AF86754F404417E905F6081EB7995058BB2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Library__wstrtime$AddressFreeLoadProcVersion_strrchr
                                                                                                  • String ID: Application name is too long, %s.$Current logon user doesn't have the Administrator privilege.$DirectXRegisterApplicationA$DirectXRegisterApplicationA: Completed.$DirectXRegisterApplicationA: ERROR!$Function pointer XDirectXLoadString is not initialized.$Invalid parameter - struct pointer is NULL.$LoadDSetup32() failed.$RegCloseKey()$RegCloseKey() failed$RegCreateKeyExA()$RegSetValueExA()$RegSetValueExA().$StringFromGUID2()$Unable to convert GUID from UNICODE to ANSI.$WideCharToMultiByte()$XDirectXLoadString() failed.$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
                                                                                                  • API String ID: 2044236047-2435350783
                                                                                                  • Opcode ID: a46949eaec2a041870e24975dee03389053420abb0dcdc1442a19594ebf19cdb
                                                                                                  • Instruction ID: 0100536be8fdabf328f4d4c33c6d58c6e53ef904142ab60997572fb1043486e8
                                                                                                  • Opcode Fuzzy Hash: a46949eaec2a041870e24975dee03389053420abb0dcdc1442a19594ebf19cdb
                                                                                                  • Instruction Fuzzy Hash: 5CD1BFF1740294BEFB209A668D07FF73ABCEB15751F14015BFA4AE90CDEA60D9408E64
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                    • Part of subcall function 73AC5E51: GetVersionExA.KERNEL32(?), ref: 73AC5E7E
                                                                                                    • Part of subcall function 73AC5E51: LoadLibraryA.KERNEL32(advpack.dll,?,00000000), ref: 73AC5EBA
                                                                                                    • Part of subcall function 73AC5E51: GetProcAddress.KERNEL32(00000000,IsNTAdmin), ref: 73AC5ECE
                                                                                                    • Part of subcall function 73AC5E51: FreeLibrary.KERNEL32(00000000), ref: 73AC5F1A
                                                                                                  • GetVersionExA.KERNEL32(?), ref: 73AC5842
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC584D
                                                                                                  • _wcsnlen.LIBCMT ref: 73AC591B
                                                                                                  • _wcsnlen.LIBCMT ref: 73AC5935
                                                                                                  • RegCreateKeyExW.ADVAPI32(80000002,?,00000000,00000000,00000000,00000002,00000000,?,?,?,?), ref: 73AC59AC
                                                                                                  • StringFromGUID2.OLE32(?,?,00000104,?,?), ref: 73AC59D7
                                                                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 73AC5D0F
                                                                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 73AC5D4B
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseLibraryVersion_wcsnlen$AddressCreateErrorFreeFromLastLoadProcString
                                                                                                  • String ID: GetVersionEx()$Application name is too long.$Current logon user doesn't have the Administrator privilege.$DirectXRegisterApplicationW$DirectXRegisterApplicationW:$DirectXRegisterApplicationW: Completed.$DirectXRegisterApplicationW: ERROR!$Invalid parameter - struct pointer is NULL.$MyLoadStringW() failed.$MyLoadStringW().$Not running NT 4.0. Version: [%08X]$Not running NT. Platform ID: [%08X]$RegCloseKey()$RegCreateKeyExW()$RegSetValueExW()$StringFromGUID2()$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
                                                                                                  • API String ID: 187334128-611565798
                                                                                                  • Opcode ID: 639bbb2504a75277a21172ef96abe3e9470e81b8652c9eafdc5c40ee9bdd07af
                                                                                                  • Instruction ID: 0fbe9b7d11d47285d04c9ddfb6dcf08d1b0c640fd10c68fd7ac0cd34e39612f6
                                                                                                  • Opcode Fuzzy Hash: 639bbb2504a75277a21172ef96abe3e9470e81b8652c9eafdc5c40ee9bdd07af
                                                                                                  • Instruction Fuzzy Hash: 5FD1E5F1600288BEFF219A568D87F7772BDEB44244F14026BF956E909EDB20DD44CE25
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                    • Part of subcall function 73AC5E51: GetVersionExA.KERNEL32(?), ref: 73AC5E7E
                                                                                                    • Part of subcall function 73AC5E51: LoadLibraryA.KERNEL32(advpack.dll,?,00000000), ref: 73AC5EBA
                                                                                                    • Part of subcall function 73AC5E51: GetProcAddress.KERNEL32(00000000,IsNTAdmin), ref: 73AC5ECE
                                                                                                    • Part of subcall function 73AC5E51: FreeLibrary.KERNEL32(00000000), ref: 73AC5F1A
                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 73AC4694
                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 73AC46C2
                                                                                                    • Part of subcall function 73AC64D5: __wstrtime.LIBCMT ref: 73AC6506
                                                                                                    • Part of subcall function 73AC64D5: __wstrtime.LIBCMT ref: 73AC650F
                                                                                                    • Part of subcall function 73AC64D5: _strrchr.LIBCMT ref: 73AC6555
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseLibrary__wstrtime$AddressFreeLoadProcVersion_strrchr
                                                                                                  • String ID: App: $Current logon user doesn't have the Administrator privilege.$DirectXUnRegisterApplication$DirectXUnRegisterApplication:$DirectXUnRegisterApplication: Completed.$DirectXUnRegisterApplication: ERROR!$Guid$Index: %d$Invalid parameter - GUID is NULL.$RegCloseKey()$RegDeleteKey()$RegEnumKeyEx()$RegOpenKeyEx()$RegQueryInfoKey()$RegQueryValueEx()$SOFTWARE\Microsoft\DirectPlay\Applications$StringFromGUID2()$Unable to convert GUID from UNICODE to ANSI.$Unable to delete key %s.$Unable to find GUID.$WideCharToMultiByte()$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
                                                                                                  • API String ID: 3035098486-1639858186
                                                                                                  • Opcode ID: cae92792c40f59cbaa4bf5b5fde5a86f002fa37e5308b5f6bf7d8df51c254697
                                                                                                  • Instruction ID: ff2aa11b8d0b246267370da164425420c2c0c4f11d1ce752b9c9670106932f8a
                                                                                                  • Opcode Fuzzy Hash: cae92792c40f59cbaa4bf5b5fde5a86f002fa37e5308b5f6bf7d8df51c254697
                                                                                                  • Instruction Fuzzy Hash: ECA1B8B2A001A8BFE7119F45CD86FEA737FEB98244F14019BF50AA5149DB31CE908F64
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • _memset.LIBCMT ref: 73AC3A12
                                                                                                  • _memset.LIBCMT ref: 73AC3A2D
                                                                                                  • _memset.LIBCMT ref: 73AC3A42
                                                                                                  • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 73AC3A53
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC3A5E
                                                                                                  • GetSystemDirectoryA.KERNEL32(00000000,00000104), ref: 73AC3A90
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC3A9B
                                                                                                  • SetCurrentDirectoryA.KERNEL32(00000000), ref: 73AC3ABA
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC3AC5
                                                                                                  • GetVersionExA.KERNEL32(?), ref: 73AC3AF3
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC3B08
                                                                                                  • LoadLibraryA.KERNEL32(00000000,00000000,00000000,\DINPUT.DLL), ref: 73AC3B9A
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC3BAB
                                                                                                  • GetProcAddress.KERNEL32(00000000,DirectInputCreateA), ref: 73AC3BC8
                                                                                                  • GetLastError.KERNEL32(Module: %d, Function: DirectXInputCreateA,00000000), ref: 73AC3BE4
                                                                                                    • Part of subcall function 73AC64D5: __wstrtime.LIBCMT ref: 73AC6506
                                                                                                    • Part of subcall function 73AC64D5: __wstrtime.LIBCMT ref: 73AC650F
                                                                                                    • Part of subcall function 73AC64D5: _strrchr.LIBCMT ref: 73AC6555
                                                                                                  • FreeLibrary.KERNEL32(?), ref: 73AC3C05
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC3C10
                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 73AC3C6C
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC3C77
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$Directory$Current_memset$Library__wstrtime$AddressFreeLoadProcSystemVersion_strrchr
                                                                                                  • String ID: DirectInputCreateA$FreeLibrary()$GetCurrentDirectory()$GetProcAddress()$GetRunningDXVersion$GetSystemDirectory()$GetVersionEx()$LoadLibrary()$Module: %d, Function: DirectXInputCreateA$SetCurrentDirectory()$Unable to create path string, %s%s.$\DINPUT.DLL$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
                                                                                                  • API String ID: 3694406903-2033765323
                                                                                                  • Opcode ID: 9f4357a11e9db5f87a23793dfa746b7efad69dbdc44c6fb918a525278560d080
                                                                                                  • Instruction ID: 7d2127eea4a9aca8203d39e84f4a53884cf099ebbf0868c4fd099e5cb17a193e
                                                                                                  • Opcode Fuzzy Hash: 9f4357a11e9db5f87a23793dfa746b7efad69dbdc44c6fb918a525278560d080
                                                                                                  • Instruction Fuzzy Hash: 5361F4B5F00294BFEB11AB66CD4AFDB76BCEB19301F00409BF509E5189D739C5808B21
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetWindowLongA.USER32(?,000000EB), ref: 00F15F23
                                                                                                  • SendDlgItemMessageA.USER32(?,00001391,000000F1,00000000,00000000), ref: 00F15F71
                                                                                                  • SendDlgItemMessageA.USER32(?,00001392,000000F1,00000001,00000000), ref: 00F15F83
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F1393B
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F13944
                                                                                                    • Part of subcall function 00F1390A: _strrchr.LIBCMT ref: 00F1398A
                                                                                                    • Part of subcall function 00F16BDC: LoadStringW.USER32(00000000,0000006F,?,00000200,00000000,00000000), ref: 00F16C22
                                                                                                    • Part of subcall function 00F16BDC: GetLastError.KERNEL32(00000000), ref: 00F16C2D
                                                                                                  • SendDlgItemMessageA.USER32(?,00001391,000000F1,00000001,00000000), ref: 00F15FA2
                                                                                                  • SendDlgItemMessageA.USER32(?,00001392,000000F1,00000000,00000000), ref: 00F15FB3
                                                                                                  • SetWindowLongA.USER32(?,000000EB,?), ref: 00F15FF6
                                                                                                  • GetDlgItem.USER32(?,00001389), ref: 00F16002
                                                                                                  • SendMessageA.USER32(00000000,00000030,?,00000001), ref: 00F1600F
                                                                                                  • GetParent.USER32(?,00000471,00000005,00000000), ref: 00F1607C
                                                                                                  • PostMessageA.USER32(00000000), ref: 00F16083
                                                                                                  • GetParent.USER32(?,00000471,00000005,00000000), ref: 00F1610B
                                                                                                  • PostMessageA.USER32(00000000), ref: 00F16112
                                                                                                  • SetDlgItemTextW.USER32(?,00001390,00000000), ref: 00F16127
                                                                                                  • SendDlgItemMessageA.USER32(?,00001390,000000B1,000000FF,00000000), ref: 00F16139
                                                                                                  • GetParent.USER32(?,00000471,00000005,00000000,00000072,00000030,00000000), ref: 00F1617D
                                                                                                  • PostMessageA.USER32(00000000), ref: 00F16184
                                                                                                  • GetParent.USER32(?,00000470,00000000,00000000), ref: 00F161CE
                                                                                                  • PostMessageA.USER32(00000000), ref: 00F161D5
                                                                                                  • GetParent.USER32(?,00000471,00000005,00000000), ref: 00F16200
                                                                                                  • PostMessageA.USER32(00000000), ref: 00F16207
                                                                                                  • SetWindowLongA.USER32(?,00000000,000000FF), ref: 00F16211
                                                                                                  • SendDlgItemMessageA.USER32(?,00001390,000000B1,000000FF,00000000), ref: 00F1623C
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Message$Item$Send$ParentPost$LongWindow$__wstrtime$ErrorLastLoadStringText_strrchr
                                                                                                  • String ID: DirectXSEtupGetEULA() returned 0.$DirectXSetupGetEULA() returned 0.$IntroDlgProc$Unable to allocate memory block.$Unable to initialize CDSetup.$e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp
                                                                                                  • API String ID: 1260387990-844574282
                                                                                                  • Opcode ID: f45d122b48c0c2cd438d2c689721a776c03a9fe4821bdb2d95e9e5bc72afb22f
                                                                                                  • Instruction ID: bf95a94b6e99749fde995f9d8f61c44668699d459e3dee7b1aa78c345bebecc3
                                                                                                  • Opcode Fuzzy Hash: f45d122b48c0c2cd438d2c689721a776c03a9fe4821bdb2d95e9e5bc72afb22f
                                                                                                  • Instruction Fuzzy Hash: A281F431645229BBDB212B659C4DEEB7E6CEF45B71F118114FB09EA0E1C7B488C1F6A0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • _memset.LIBCMT ref: 00F165FA
                                                                                                  • _memset.LIBCMT ref: 00F16620
                                                                                                  • CreatePropertySheetPageA.COMCTL32(?,?,?,?,00000000,00000000,?), ref: 00F1669B
                                                                                                  • CreatePropertySheetPageA.COMCTL32(00000034,?,?,?,00000000,00000000,?), ref: 00F166E6
                                                                                                  • CreatePropertySheetPageA.COMCTL32(00000034,?,?,?,00000000,00000000,?), ref: 00F16731
                                                                                                  • CreatePropertySheetPageA.COMCTL32(00000034,?,?,?,00000000,00000000,?), ref: 00F16768
                                                                                                  • _memset.LIBCMT ref: 00F167EF
                                                                                                  • SystemParametersInfoA.USER32(00000029,00000000,?,00000000,?,?,?,?,?,?,00000000,00000000,?), ref: 00F1680C
                                                                                                  • GetDC.USER32(00000000,?,?,?,?,?,?,00000000,00000000,?), ref: 00F1681E
                                                                                                  • GetModuleHandleA.KERNEL32(00000000,00001F4B,?,00000020,?,?,?,?,?,?,00000000,00000000,?), ref: 00F1683C
                                                                                                  • LoadStringA.USER32(00000000,?,?,?,?,?,?,00000000,00000000,?), ref: 00F1683F
                                                                                                  • CreateFontIndirectA.GDI32(?,?,?,?,?,?,?,00000000,00000000,?), ref: 00F1684F
                                                                                                  • CreateFontIndirectA.GDI32(?,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16862
                                                                                                  • GetDeviceCaps.GDI32(?,0000005A,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16872
                                                                                                  • GetModuleHandleA.KERNEL32(00000000,00001F4A,?,00000020,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16890
                                                                                                  • LoadStringA.USER32(00000000,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16893
                                                                                                  • CreateFontIndirectA.GDI32(?,?,?,?,?,?,?,00000000,00000000,?), ref: 00F1689D
                                                                                                  • ReleaseDC.USER32(00000000,?,?,?,?,?,?,?,00000000,00000000,?), ref: 00F168AC
                                                                                                    • Part of subcall function 00F16CFA: LoadImageA.USER32(00F168CF,00001B5B,00000000,00000000,00000000,00002000,74DF0A60,75294BC0,00000000,?,00F168CF,?), ref: 00F16D1A
                                                                                                    • Part of subcall function 00F16CFA: CreateCompatibleDC.GDI32(00000000,?,00F168CF,?,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16D28
                                                                                                    • Part of subcall function 00F16CFA: SelectObject.GDI32(00000000,?,00F168CF,?,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16D3C
                                                                                                    • Part of subcall function 00F16CFA: LoadImageA.USER32(00F168CF,00001B5C,00000000,00000000,00000000,00002000,?,00F168CF,?,?,?,?,?,?,?,00000000), ref: 00F16D50
                                                                                                    • Part of subcall function 00F16CFA: CreateCompatibleDC.GDI32(00000000,?,00F168CF,?,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16D59
                                                                                                    • Part of subcall function 00F16CFA: SelectObject.GDI32(00000000,?,00F168CF,?,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16D67
                                                                                                  • PropertySheetA.COMCTL32(00000034,?,?,?,?,?,?,?,00000000,00000000,?), ref: 00F168D6
                                                                                                    • Part of subcall function 00F16D75: DeleteObject.GDI32(00000000,74DF0A60,00000000,00F168E3,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16D89
                                                                                                    • Part of subcall function 00F16D75: DeleteObject.GDI32(00000000,74DF0A60,00000000,00F168E3,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16D9B
                                                                                                    • Part of subcall function 00F16D75: DeleteObject.GDI32(00000000,74DF0A60,00000000,00F168E3,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16DAD
                                                                                                    • Part of subcall function 00F16D75: DeleteDC.GDI32(00000000,74DF0A60,00000000,00F168E3,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16DC5
                                                                                                    • Part of subcall function 00F16D75: DeleteDC.GDI32(00000000,74DF0A60,00000000,00F168E3,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16DD7
                                                                                                    • Part of subcall function 00F16D75: DeleteDC.GDI32(00000000,74DF0A60,00000000,00F168E3,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16DE9
                                                                                                  • GetLastError.KERNEL32(00000000,00000072,00000030,00000000,?,?,?,?,?,?,00000000,00000000,?), ref: 00F168F3
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F1393B
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F13944
                                                                                                    • Part of subcall function 00F1390A: _strrchr.LIBCMT ref: 00F1398A
                                                                                                  • DeleteObject.GDI32(?,?,?,?,?,?,?,00000000,00000000,?), ref: 00F1693A
                                                                                                  • DeleteObject.GDI32(?,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16942
                                                                                                  • DeleteObject.GDI32(?,?,?,?,?,?,?,00000000,00000000,?), ref: 00F1694A
                                                                                                    • Part of subcall function 00F16BDC: LoadStringW.USER32(00000000,0000006F,?,00000200,00000000,00000000), ref: 00F16C22
                                                                                                    • Part of subcall function 00F16BDC: GetLastError.KERNEL32(00000000), ref: 00F16C2D
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateDelete$Object$LoadPropertySheet$Page$FontIndirectString_memset$CompatibleErrorHandleImageLastModuleSelect__wstrtime$CapsDeviceInfoParametersReleaseSystem_strrchr
                                                                                                  • String ID: 4$4$CreatePropertySheet$PropertySheet()$e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp
                                                                                                  • API String ID: 1767149145-722558555
                                                                                                  • Opcode ID: ab900b880446bcd34d14e60c7a0b6b0101ba61ca504ce04e19b2213ac3628d9e
                                                                                                  • Instruction ID: 13b0cc81be08d525cf520e7670230847f7f1ae7050d1b256103ba1151bf5a37d
                                                                                                  • Opcode Fuzzy Hash: ab900b880446bcd34d14e60c7a0b6b0101ba61ca504ce04e19b2213ac3628d9e
                                                                                                  • Instruction Fuzzy Hash: AF91FAB1D4122D9BDB60DF64CC89BDEBBB8BB49304F1140EAE608E7281D7749A849F50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                    • Part of subcall function 73AC5E22: CompareStringA.KERNEL32(00000409,00000001,?,000000FF,?,000000FF,?,73AC3F1D,00000000,DLS,00000000,?), ref: 73AC5E38
                                                                                                  • _memset.LIBCMT ref: 73AC3F2C
                                                                                                  • mmioOpenA.WINMM(?,?,00000000), ref: 73AC3F3C
                                                                                                  • mmioDescend.WINMM(?,?,00000000,00000020), ref: 73AC3F64
                                                                                                  • mmioClose.WINMM(?,00000000), ref: 73AC3F92
                                                                                                  • mmioDescend.WINMM(?,?,?,00000010), ref: 73AC3FD2
                                                                                                  • mmioClose.WINMM(?,00000000), ref: 73AC4000
                                                                                                  • mmioRead.WINMM(?,?,00000008), ref: 73AC4029
                                                                                                  • mmioClose.WINMM(?,00000000), ref: 73AC4058
                                                                                                  • mmioClose.WINMM(?,00000000), ref: 73AC408B
                                                                                                  • GetFileVersionInfoSizeA.VERSION(?,?,00000000,DLS,00000000,?), ref: 73AC40C5
                                                                                                  • LocalAlloc.KERNEL32(00000040,00000000,?,?,00000000,DLS,00000000,?), ref: 73AC40D8
                                                                                                  • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 73AC40F2
                                                                                                  • VerQueryValueA.VERSION(?,73AC1534,?,?,?,?,?,00000000), ref: 73AC4112
                                                                                                  • LocalFree.KERNEL32(?,?,?,?,00000000), ref: 73AC4139
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC4144
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC415D
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: mmio$Close$DescendErrorFileInfoLastLocalVersion$AllocCompareFreeOpenQueryReadSizeStringValue_memset
                                                                                                  • String ID: 4$DLS$DirectXSetupGetFileVersion$LocalAlloc()$LocalFree()$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c$mmioClose()$mmioDescend()$mmioRead()$vers
                                                                                                  • API String ID: 2025664318-1787136798
                                                                                                  • Opcode ID: 104b62123722f8b899e2864af4f0f5e256a47d86b51c9869244ddd3a7dc2377a
                                                                                                  • Instruction ID: df2d1003b5ad8750c9d3f355e785931b267db553d4becbcffde12bd97ec38403
                                                                                                  • Opcode Fuzzy Hash: 104b62123722f8b899e2864af4f0f5e256a47d86b51c9869244ddd3a7dc2377a
                                                                                                  • Instruction Fuzzy Hash: E7718671B00158BFEB119FA9CD46FAE7BBDFB08244F10442AF946E625ADB34D9018F64
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __wstrtime.LIBCMT ref: 73AC6506
                                                                                                  • __wstrtime.LIBCMT ref: 73AC650F
                                                                                                    • Part of subcall function 73AC63CE: GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c), ref: 73AC6404
                                                                                                    • Part of subcall function 73AC63CE: OutputDebugStringA.KERNEL32(DXSETUP_DPF(): Unable to open log file.,00000000,e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c), ref: 73AC6413
                                                                                                    • Part of subcall function 73AC4A54: _vswprintf_s.LIBCMT ref: 73AC4A87
                                                                                                    • Part of subcall function 73AC63CE: CreateDirectoryA.KERNEL32(?,00000000), ref: 73AC6453
                                                                                                    • Part of subcall function 73AC63CE: GetLastError.KERNEL32 ref: 73AC645D
                                                                                                  • _strrchr.LIBCMT ref: 73AC6555
                                                                                                  • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 73AC6665
                                                                                                  • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,GetRegistryDXVersion), ref: 73AC668A
                                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,GetRegistryDXVersion,e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c), ref: 73AC6692
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DirectoryErrorLast__wstrtime$CreateDebugFormatFreeLocalMessageOutputStringWindows_strrchr_vswprintf_s
                                                                                                  • String ID: $ Error:$ Failed API:%s$ File in process:$ - $ module: %s(%s), file: %s, line: %d, function: %s$%s(): %s$%s(): %s failed, error = %d.$%s(): %s failed, error = 0x%x.$%s(): %s failed.$(%d)$(0x%x)$--------------------$DSETUP$DXSError(): FormatMessage() failed, error = %d.$DXSError(): FormatMessage() failed, system cannot find message text for error.$GetRegistryDXVersion$Mar 30 2011$[%s %s]$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
                                                                                                  • API String ID: 3659207835-1158362067
                                                                                                  • Opcode ID: cb7cde6538381335e50917b03b95f1540bf9d1a9071a8853214ef1add550a9b9
                                                                                                  • Instruction ID: 33d59d6c0c376ad5d2d8707132b9b280aa6f25aba3f149aeefcddd6b1fd25512
                                                                                                  • Opcode Fuzzy Hash: cb7cde6538381335e50917b03b95f1540bf9d1a9071a8853214ef1add550a9b9
                                                                                                  • Instruction Fuzzy Hash: B461B17190439CABEF12EF648E47BDE377CAB08200F180197B519963B9DB34CA59DB60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SetLastError.KERNEL32(0000000D), ref: 6D0D7FAE
                                                                                                  • SetLastError.KERNEL32(00000057,?,00000004,6D0D1A1C), ref: 6D0D8016
                                                                                                  • FindResourceA.KERNEL32(?,?,DATA,?,?), ref: 6D0D8061
                                                                                                  • GetLastError.KERNEL32(Unable to find EULA %s.,?,?,?), ref: 6D0D8076
                                                                                                  • SizeofResource.KERNEL32(?,00000000,?,?), ref: 6D0D80A7
                                                                                                  • SetLastError.KERNEL32(0000007A,?,?), ref: 6D0D80C4
                                                                                                  • LoadResource.KERNEL32(?,00000000,?,?), ref: 6D0D80E9
                                                                                                  • GetLastError.KERNEL32(00000000,?,?), ref: 6D0D80F4
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$Resource$FindLoadSizeof
                                                                                                  • String ID: DATA$EULA text is invalid.$FindResource()$Insufficient buffer.$Invalid parameter - output buffer is NULL.$LoadResource()$LockResource()$MultiByteToWideChar()$SETUP_AGREEMENT_%s$Unable to find EULA %s.$Unable to find EULA for the specified language.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\eula.cpp$iDirectXSetupGetEULAW
                                                                                                  • API String ID: 353423887-3345130644
                                                                                                  • Opcode ID: 12c84327b75b1d5fc9d5ac6dc072b49054fc69f8b95ad226b9be23be53410ea1
                                                                                                  • Instruction ID: 17f6d165792f91f08f27126d62bb9b92dbc3cd9e5405bdba9cd995a44ec1d574
                                                                                                  • Opcode Fuzzy Hash: 12c84327b75b1d5fc9d5ac6dc072b49054fc69f8b95ad226b9be23be53410ea1
                                                                                                  • Instruction Fuzzy Hash: 2C61C475D4434ABEFB80ABA48C44FBE7BBDEB49304B405417FB15A7082EB308905CB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                  • __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D625B: GetWindowsDirectoryA.KERNEL32(?,00000104,6D0D7D8D,00000000), ref: 6D0D6291
                                                                                                    • Part of subcall function 6D0D625B: OutputDebugStringA.KERNEL32(DXSETUP_DPF(): Unable to open log file.,6D0D7D8D,00000000), ref: 6D0D62A0
                                                                                                    • Part of subcall function 6D0D625B: CreateDirectoryA.KERNEL32(?,00000000), ref: 6D0D62E0
                                                                                                    • Part of subcall function 6D0D625B: GetLastError.KERNEL32 ref: 6D0D62EA
                                                                                                  • _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 6D0D6521
                                                                                                  • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00066BDB), ref: 6D0D6546
                                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00066BDB,00000000), ref: 6D0D654E
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DirectoryErrorLast__wstrtime$CreateDebugFormatFreeLocalMessageOutputStringWindows_strrchr
                                                                                                  • String ID: $ Error:$ Failed API:%s$ File in process:$ - $ module: %s(%s), file: %s, line: %d, function: %s$%s(): %s$%s(): %s failed, error = %d.$%s(): %s failed, error = 0x%x.$%s(): %s failed.$(%d)$(0x%x)$--------------------$DXSError(): FormatMessage() failed, error = %d.$DXSError(): FormatMessage() failed, system cannot find message text for error.$Mar 30 2011$[%s %s]$dsetup32
                                                                                                  • API String ID: 3982051927-4052122332
                                                                                                  • Opcode ID: 3222a63476ce9a88ed15d1101d26c82ac81b0e7be6a3262d63c3e1d9c27d6e7d
                                                                                                  • Instruction ID: 0e89375daba2e04edb468d46df933408440a07d5a0ec41390e059b3d207728ec
                                                                                                  • Opcode Fuzzy Hash: 3222a63476ce9a88ed15d1101d26c82ac81b0e7be6a3262d63c3e1d9c27d6e7d
                                                                                                  • Instruction Fuzzy Hash: B061A67190870DABFFA19BA4CC44BFF3B6CAF45204F814097F61997149DB319A948BE2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetWindowLongA.USER32(?,000000EB), ref: 00F162E4
                                                                                                  • GetParent.USER32(?,00000471,00000001,00000000), ref: 00F16394
                                                                                                  • PostMessageA.USER32(00000000), ref: 00F1639B
                                                                                                  • SetWindowLongA.USER32(?,000000EB,?), ref: 00F163B8
                                                                                                  • GetDlgItem.USER32(?,00001389,00000030,?,00000001), ref: 00F163CF
                                                                                                  • SendMessageA.USER32(00000000), ref: 00F163D6
                                                                                                  • GetModuleHandleA.KERNEL32(00000000,00001F48,?,00000258), ref: 00F163FF
                                                                                                  • LoadStringW.USER32(00000000), ref: 00F16406
                                                                                                  • SetDlgItemTextW.USER32(?,00001393,?), ref: 00F1641E
                                                                                                  • GetDlgItem.USER32(?,00001393,00000030,?,00000001), ref: 00F16436
                                                                                                  • SendMessageA.USER32(00000000), ref: 00F1643D
                                                                                                  • SendMessageA.USER32(?,00008002,00000000,00000000), ref: 00F16531
                                                                                                  • GetParent.USER32(?,00000470,00000000,00000000), ref: 00F16586
                                                                                                  • PostMessageA.USER32(00000000), ref: 00F1658D
                                                                                                  • SetWindowLongA.USER32(?,00000000,00000001), ref: 00F1659E
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Message$ItemLongSendWindow$ParentPost$HandleLoadModuleStringText
                                                                                                  • String ID: CDXWSetup::InitInstall() failed.$CDXWSetup::Install() failed.$Invalid parameter - CDXWSetup is NULL.$ProgressDlgProc$Unable to initialize CDSetup.$WM_APP_ENDINSTALL$e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp$start installation
                                                                                                  • API String ID: 45273081-381161198
                                                                                                  • Opcode ID: aa085a92f0dbbfbb5e1a1bee1d7d0553674820948ede38c3bcf099f8e50a91d6
                                                                                                  • Instruction ID: 01e35a6975cbd858220f820ff6596cf8c0bf792c81e643a911bc4f786cd451a4
                                                                                                  • Opcode Fuzzy Hash: aa085a92f0dbbfbb5e1a1bee1d7d0553674820948ede38c3bcf099f8e50a91d6
                                                                                                  • Instruction Fuzzy Hash: 0471D4B1A40319BFDB249F608C85FEA767EAB04714F108559F706E61D1CB749DC0FA61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion,00000000,00000001,?), ref: 6D0DAC6E
                                                                                                  • RegQueryValueExA.ADVAPI32(?,ProgramFilesDir,00000000,00000000,?,?,?,00000104), ref: 6D0DACC5
                                                                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,00000104), ref: 6D0DACF5
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime$CloseOpenQueryValue_strrchr
                                                                                                  • String ID: DXSETUPFOLDER path is too long, %s%s.$GetProgramFilesDir$GetShortPathName()$Insufficient buffer size.$ProgramFilesDir$RegCloseKey()$RegOpenKeyEx()$RegQueryValueEx()$Software\Microsoft\Windows\CurrentVersion$\directx\setup\$dwSize = %d, dwSizeData = %d$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h
                                                                                                  • API String ID: 4010714187-3175587753
                                                                                                  • Opcode ID: d26d391e671ae04009682777d2efc67ca07b0abfcb7993628ee182ac7b164e34
                                                                                                  • Instruction ID: 469450250e8a797b2f855885a4a37b6f24869769641b5bc25c24b5f3ffe572a3
                                                                                                  • Opcode Fuzzy Hash: d26d391e671ae04009682777d2efc67ca07b0abfcb7993628ee182ac7b164e34
                                                                                                  • Instruction Fuzzy Hash: AD51A271900318BFFBA19B61CC45FFF7A6DEB55741F504057BA09A7081EBB0AA808EA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\DirectX,00000000,00000001,00000000), ref: 6D0DD406
                                                                                                  • lstrcmpA.KERNEL32(?,Version), ref: 6D0DD425
                                                                                                  • RegQueryValueExA.ADVAPI32(00000000,?,00000000,00000000,?,?), ref: 6D0DD45E
                                                                                                  • lstrcmpA.KERNEL32(?,Version), ref: 6D0DD4BE
                                                                                                  • RegQueryValueExA.ADVAPI32(00000000,6D0D3D10,00000000,00000000,?,00000104,?,?,?,dsetup32.dll), ref: 6D0DD5FB
                                                                                                    • Part of subcall function 6D0D6872: _memset.LIBCMT ref: 6D0D6882
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 6D0DD690
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue__wstrtimelstrcmp$CloseOpen_memset_strrchr
                                                                                                  • String ID: CSetup::CheckVersion$CheckVersion(): ManagedDX have not been installed.$CheckVersion(): This is older DirectX which does not have the version value in the registry.$Checking the version: HKLM\software\microsoft\directx\%s$GetFileVersion() failed, unable to get version information of dsetup32.dll.$RC in registry = %02d, RC in DLL = %02d$RegCloseKey()$Software\Microsoft\DirectX$StringToVersionInfo() failed, version = %s.$Unable to create path string, %s%s.$Version$Version in DLL = %d.%02d.%02d.%04d$Version in registry = %s$dsetup32.dll$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
                                                                                                  • API String ID: 3543678321-2788586486
                                                                                                  • Opcode ID: 6cfc9b3f3d25478bf19cc541759724fbee0bcd4cb525c9407b686523be58a7de
                                                                                                  • Instruction ID: 9f05fdf9df91a525267b2d1a5c4679774512af0e5d6e0715f3aa74883acfece7
                                                                                                  • Opcode Fuzzy Hash: 6cfc9b3f3d25478bf19cc541759724fbee0bcd4cb525c9407b686523be58a7de
                                                                                                  • Instruction Fuzzy Hash: 06714471A04719AEFBA0DB54CC44FFB77BCAB49305F40019BF549E6181EB74AA808F62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • _memset.LIBCMT ref: 00F14987
                                                                                                  • GetCurrentDirectoryA.KERNEL32(00000104,00000000), ref: 00F1499C
                                                                                                  • LoadStringW.USER32(000000D9,?,00000104), ref: 00F14A2A
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 00F14A35
                                                                                                  • ___swprintf_l.LIBCMT ref: 00F14A75
                                                                                                  • LoadStringW.USER32(00000064,?,00000104), ref: 00F14A8D
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 00F14A98
                                                                                                  • MessageBoxW.USER32(?,?,00000010), ref: 00F14ADB
                                                                                                    • Part of subcall function 00F144B1: FindFirstFileA.KERNEL32(?,?), ref: 00F14554
                                                                                                    • Part of subcall function 00F144B1: FindClose.KERNEL32(00000000), ref: 00F14560
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 00F14AE5
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$FindLoadString$CloseCurrentDirectoryFileFirstMessage___swprintf_l_memset
                                                                                                  • String ID: DirectX Setup$GetCurrentDirectory()$LoadString()$LogNoDsetup$Unable to find %s$Unable to find %s.$\dsetup.dll$\dsetup32.dll$dsetup.dll$dsetup32.dll$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp
                                                                                                  • API String ID: 525178981-2515890001
                                                                                                  • Opcode ID: fe5987d2bde73f80d13b92623993c088ddf3daf11611ff183965c5e0e9911248
                                                                                                  • Instruction ID: f45fa1c4b26d6cab3719e277a8df468ba45d2da7e37b3792f0a4046349462ffb
                                                                                                  • Opcode Fuzzy Hash: fe5987d2bde73f80d13b92623993c088ddf3daf11611ff183965c5e0e9911248
                                                                                                  • Instruction Fuzzy Hash: CD41C8B294121C7BDB10EBA09C46EEF7BBCBF48740F400165F609E2081E679DB84BB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: .cat$.chm$.hlp$.inf$CabCallback$FILEINCABINET: Unknown context...$SPFILENOTIFY_FILEINCABINET: GET_DISK_SPACE: Unable to allocate memory.$bdasetup.inf$directX.inf$dxbda.inf$dxnt.inf$dxntunp.inf$dxver.inf$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp$jystk$kssetup.inf
                                                                                                  • API String ID: 0-2698226022
                                                                                                  • Opcode ID: f539cb332e31197c60ff49251fdfbded812c5274adb4cd754b6a50a46415d519
                                                                                                  • Instruction ID: 7757b917ad5ac3be196c65318dabf480d4d7b7b9220e0d84865e74061ebc5cc4
                                                                                                  • Opcode Fuzzy Hash: f539cb332e31197c60ff49251fdfbded812c5274adb4cd754b6a50a46415d519
                                                                                                  • Instruction Fuzzy Hash: 0151A571244716ABFBD18B248D80F7937B5FF86768F420467FA84EB196EB61D800CE61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,?,00000000), ref: 6D0DBADC
                                                                                                  • GetLastError.KERNEL32(Unable to open file, %s.,?,?,80000000,00000003,00000000,00000003,00000080,00000000,?,00000000), ref: 6D0DBAF0
                                                                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,80000000,00000003,00000000,00000003,00000080,00000000,?,00000000), ref: 6D0DBB0B
                                                                                                  • GetLastError.KERNEL32(00000000,?,?,80000000,00000003,00000000,00000003,00000080,00000000,?,00000000), ref: 6D0DBB1C
                                                                                                  • _memset.LIBCMT ref: 6D0DBB6D
                                                                                                  • ReadFile.KERNEL32(?,00000000,00000000,?,00000000,00000000), ref: 6D0DBB7F
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 6D0DBBC1
                                                                                                  • CloseHandle.KERNEL32(?), ref: 6D0DBBE8
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 6D0DBBF3
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$File$CloseCreateHandleReadSize_memset
                                                                                                  • String ID: CheckSum$CloseHandle()$CreateFile()$GetFileSize()$ReadFile()$Unable to allocate buffer.$Unable to find file, %s.$Unable to open file, %s.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
                                                                                                  • API String ID: 197260801-1870010058
                                                                                                  • Opcode ID: ce4adec560e272b39a00b62f81dc9480e51e3141f00e87cc9f5868dd51715f46
                                                                                                  • Instruction ID: 4e824fcc431693be633788ef7342fff6a094e09015b0a6db9ec627781b0e8521
                                                                                                  • Opcode Fuzzy Hash: ce4adec560e272b39a00b62f81dc9480e51e3141f00e87cc9f5868dd51715f46
                                                                                                  • Instruction Fuzzy Hash: 5041D2B1D043197BFB80ABA58C45FBF7ABCEB4A365F504117F905B3182EB704A018AB1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • _strrchr.LIBCMT ref: 6D0DCC96
                                                                                                  • CharLowerA.USER32(?,?,00000104,?,?,00000000), ref: 6D0DCD50
                                                                                                  • CharLowerA.USER32(?,?,00000104,?), ref: 6D0DCD83
                                                                                                  • CopyFileA.KERNEL32(?,?,00000000,?,00000104,inf,?,00000104,?), ref: 6D0DCE45
                                                                                                  • GetLastError.KERNEL32(Unable to copy %s.,?), ref: 6D0DCE5B
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CharLower$CopyErrorFileLast_strrchr
                                                                                                  • String ID: CSetup::DoBackup$CopyFile()$Unable to allocate memory block.$Unable to copy %s.$Unable to create path string, %s%s%s.$drivers$dxxpdbg$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp$help$inf$sysbckup$system
                                                                                                  • API String ID: 864436029-3807277504
                                                                                                  • Opcode ID: 125cf5d1c1552ec83af0963c72c11e16dbf321c840876d2f619173e56ea91bf3
                                                                                                  • Instruction ID: 093938ffdc5b7e5d0c1ba8348d2be6717d28f6411a016e8ae5658f5af36f84ca
                                                                                                  • Opcode Fuzzy Hash: 125cf5d1c1552ec83af0963c72c11e16dbf321c840876d2f619173e56ea91bf3
                                                                                                  • Instruction Fuzzy Hash: 445164B194831A6EFB50DBA5CC40FDA77BDAF49354F1100A7B644E7081EF70AAC08B68
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetDesktopWindow.USER32(00000000,000012F2,?,?,?,?,?,?,?,?,?,?,?,?,?,6D0D7CC1), ref: 6D0D7434
                                                                                                  • GetWindowRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,6D0D7CC1), ref: 6D0D7448
                                                                                                  • GetLastError.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,6D0D7CC1), ref: 6D0D744F
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  • GetWindowRect.USER32(?,?), ref: 6D0D7490
                                                                                                  • GetLastError.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,6D0D7CC1), ref: 6D0D7497
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Window$ErrorLastRect__wstrtime$Desktop_strrchr
                                                                                                  • String ID: CenterWindow$GetDC()$GetWindowRect()$SetWindowPos()$e:\bt\382730\setup\deliverables\dsetup\dsetup32\eula.cpp
                                                                                                  • API String ID: 974696245-2165572117
                                                                                                  • Opcode ID: 495b12862fec19aaed4dfa0e27f80276544dc322f004138fd1b5135db617698d
                                                                                                  • Instruction ID: a4f308b0829295461665ff680fe446f5a01a26d4ceb005df6ff0464e1c1d88cd
                                                                                                  • Opcode Fuzzy Hash: 495b12862fec19aaed4dfa0e27f80276544dc322f004138fd1b5135db617698d
                                                                                                  • Instruction Fuzzy Hash: 65418E72E0031AAFEB41DBB8CD48EEE7BB9AB89301B444117F905F7145EF7099018B62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetFileAttributesA.KERNEL32(?), ref: 6D0DA601
                                                                                                  • GetLastError.KERNEL32 ref: 6D0DA616
                                                                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 6D0DA661
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 6D0DA66C
                                                                                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\RunOnce,00000000,00000002,?), ref: 6D0DA6DA
                                                                                                  • _strnlen.LIBCMT ref: 6D0DA6EC
                                                                                                  • RegSetValueExA.ADVAPI32(?,?,00000000,00000001,?,00000001), ref: 6D0DA70D
                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 6D0DA739
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                    • Part of subcall function 6D0D6391: FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 6D0D6521
                                                                                                    • Part of subcall function 6D0D6391: LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00066BDB), ref: 6D0D6546
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast__wstrtime$AttributesCloseDirectoryFileFormatFreeLocalMessageOpenSystemValue_strnlen_strrchr
                                                                                                  • String ID: Command line is too long.$DXRemoveFileAtReboot$GetFileAttributes() returned -1, reason = %d.$GetSystemDirectory()$RegOpenKeyEx()$RegSetValueEx()$Software\Microsoft\Windows\CurrentVersion\RunOnce$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h$rundll32.exe %s\advpack.dll,DelNodeRunDLL32 "%s\"
                                                                                                  • API String ID: 4261019213-1120788408
                                                                                                  • Opcode ID: 4f05b82f8607871a2e8f15ce2271e66d125259be2c29768fbb7402571470b52b
                                                                                                  • Instruction ID: ea46997a308b8937ca5f9530f0ebedbabd85b4a3c8dfac6bc09e115568abf055
                                                                                                  • Opcode Fuzzy Hash: 4f05b82f8607871a2e8f15ce2271e66d125259be2c29768fbb7402571470b52b
                                                                                                  • Instruction Fuzzy Hash: E841C971944308BBFBA19B648C49FEF36BCFB59704F50405BFA18E60C1EB715A408B65
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetDlgItem.USER32(?,00001771,00000000,?,?), ref: 6D0D9DF6
                                                                                                  • SendMessageA.USER32(00000000,00000401,00000000,?), ref: 6D0D9E12
                                                                                                  • SendMessageA.USER32(?,00000402,00000000,00000000), ref: 6D0D9E23
                                                                                                  • SendMessageA.USER32(?,00000404,00000001,00000000), ref: 6D0D9E34
                                                                                                  • ShowWindow.USER32(?,00000001), ref: 6D0D9E3E
                                                                                                  • GetDlgItem.USER32(?,00001770,00000402,?,00000000,00000000,?,?), ref: 6D0D9E5E
                                                                                                  • SendMessageA.USER32(00000000), ref: 6D0D9E65
                                                                                                  • SetDlgItemTextA.USER32(?,00000FA2,?,?,?,00000258,00000000,?,?), ref: 6D0D9E95
                                                                                                  • GetLastError.KERNEL32(Not fatal...), ref: 6D0D9EA4
                                                                                                  • SetDlgItemTextA.USER32(?,00000FA3,6D0D2B57), ref: 6D0D9ED4
                                                                                                  • GetLastError.KERNEL32(Not fatal...), ref: 6D0D9EE3
                                                                                                  • GetDlgItem.USER32(?,00001771,00000402,00000000,00000000), ref: 6D0D9F2A
                                                                                                  • SendMessageA.USER32(00000000), ref: 6D0D9F31
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ItemMessageSend$ErrorLastText$ShowWindow
                                                                                                  • String ID: CSetup::UpdateProgress2$Not fatal...$SetDlgItemText()$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
                                                                                                  • API String ID: 3384336025-30365464
                                                                                                  • Opcode ID: 20a5b83ff083bcfc12492758b4519aaf4cc4629b8b107e694cde07f4a36043a2
                                                                                                  • Instruction ID: 5b52a7f36cd81929645aea86b9caf6f8e9cc5e17f15c9ee7f089f856743d49f4
                                                                                                  • Opcode Fuzzy Hash: 20a5b83ff083bcfc12492758b4519aaf4cc4629b8b107e694cde07f4a36043a2
                                                                                                  • Instruction Fuzzy Hash: 9841BE31B0430ABFFF609F65DC99FAAB7B8AB05710F004057FA08AA0C1DBB199509B61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetWindowLongA.USER32(?,000000EB), ref: 00F15635
                                                                                                  • SetWindowLongA.USER32(?,000000EB,?), ref: 00F1565E
                                                                                                  • GetDlgItem.USER32(?,00001389), ref: 00F15670
                                                                                                  • SendMessageA.USER32(00000000,00000030,?,00000001), ref: 00F1567F
                                                                                                  • GetDlgItem.USER32(?,00000FA1,00000030,?,00000001), ref: 00F15690
                                                                                                  • SendMessageA.USER32(00000000), ref: 00F15693
                                                                                                  • GetParent.USER32(?,00000470,00000000,00000003), ref: 00F15708
                                                                                                  • PostMessageA.USER32(00000000), ref: 00F1570F
                                                                                                  • GetParent.USER32(?,0000046B,00000000,00000000,00001F41,00000134,?), ref: 00F15752
                                                                                                  • PostMessageA.USER32(00000000), ref: 00F1575B
                                                                                                  • GetParent.USER32(?,00000471,00000001,00000000), ref: 00F15767
                                                                                                  • PostMessageA.USER32(00000000), ref: 00F1576A
                                                                                                  • SetWindowLongA.USER32(?,00000000,00000001,00001F41,00000134,?), ref: 00F15771
                                                                                                  Strings
                                                                                                  • Unable to initialize CDXWSetup., xrefs: 00F156BF
                                                                                                  • PreinstDlgProc, xrefs: 00F156C6
                                                                                                  • e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp, xrefs: 00F156D0
                                                                                                  • N, xrefs: 00F1563B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Message$LongParentPostWindow$ItemSend
                                                                                                  • String ID: N$PreinstDlgProc$Unable to initialize CDXWSetup.$e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp
                                                                                                  • API String ID: 1491212057-701473252
                                                                                                  • Opcode ID: 6987f40e0f75e5f950ef67ef807a03e61d2e0bf9be8542856115cc71076d0a4d
                                                                                                  • Instruction ID: 226056a4b870926d1240a3f88bdf6af3203a02daae6ee9f5335b3f941b2c16eb
                                                                                                  • Opcode Fuzzy Hash: 6987f40e0f75e5f950ef67ef807a03e61d2e0bf9be8542856115cc71076d0a4d
                                                                                                  • Instruction Fuzzy Hash: 0131D471650308FAEB206BB58C8AFDB7A6DEBC5B20F114504F705BA0D1D6B5D980EA60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LCMapStringW.KERNEL32(00000000,00000100,73AC363C,00000001,00000000,00000000,73AD2A58,0000002C,73AD1282,00004000,00000000,00004000,?,?,?,?), ref: 73AD0DBF
                                                                                                  • GetLastError.KERNEL32(?,73ACC6F1,73AC225F,UTF-8,00000000,73AC2260,00000000,73AD51A8), ref: 73AD0DD1
                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,73AD2A58,0000002C,73AD1282,00004000,00000000,00004000,?,?,?,?), ref: 73AD0E60
                                                                                                  • __alloca_probe_16.LIBCMT ref: 73AD0E93
                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,00000000), ref: 73AD0F14
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ByteCharMultiWide$ErrorLastString__alloca_probe_16
                                                                                                  • String ID:
                                                                                                  • API String ID: 1172796519-0
                                                                                                  • Opcode ID: 6af0081563e3d58eb290a4133f7216aa9d2075e7d68c56f6d57825c5eaf9aa68
                                                                                                  • Instruction ID: 4317ff309ec545af997885ee8cd3eb7d3dea2294bb633e0c4e3ba2a9be88090c
                                                                                                  • Opcode Fuzzy Hash: 6af0081563e3d58eb290a4133f7216aa9d2075e7d68c56f6d57825c5eaf9aa68
                                                                                                  • Instruction Fuzzy Hash: 0ED15A72910259AFDF41DFA5DD86BDE7BB6EB0C310F24412BF906A62ACC7358850CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 6D0DBEAC
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 6D0DBEB7
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Time$ErrorFileLastSystem
                                                                                                  • String ID: /-:.$CSetup::CheckForceCopyTimeStamp$File timestamp %02d/%02d/%d-%02d:%02d:%02d.%02d is older than %02d/%02d/%d-%02d:%02d:%02d.%02d.$FileTimeToSystemTime()$LocalFileTimeToFileTime()$SystemTimeToFileTime()$SystemTimeToTzSpecificLocalTime()$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
                                                                                                  • API String ID: 2781989572-3991514089
                                                                                                  • Opcode ID: db0c346aa16fc1416184986c4e8b7cd018784d2b35a38dff28ccf6b65f66be3d
                                                                                                  • Instruction ID: a7c0e52b8c37856991df1a7e2f3a8a349456cf95760d25a5f474aa7f4d4df271
                                                                                                  • Opcode Fuzzy Hash: db0c346aa16fc1416184986c4e8b7cd018784d2b35a38dff28ccf6b65f66be3d
                                                                                                  • Instruction Fuzzy Hash: D8716471904218BAEBA19BA69C44FFE77BCEF19744F004497F648E2041EB748A90DFB5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LoadStringW.USER32(00000064,?,00000104), ref: 00F147F5
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 00F1480C
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F1393B
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F13944
                                                                                                    • Part of subcall function 00F1390A: _strrchr.LIBCMT ref: 00F1398A
                                                                                                  • LoadStringW.USER32(?,?,00000104), ref: 00F14858
                                                                                                  • GetLastError.KERNEL32(String ID: %d,?), ref: 00F1486A
                                                                                                  • LoadStringW.USER32(0000006F,?,00000104), ref: 00F148A6
                                                                                                  • GetLastError.KERNEL32(String ID: %d,0000006F), ref: 00F148B7
                                                                                                  • LoadStringW.USER32(00000082,?,00000104), ref: 00F148E1
                                                                                                  • GetLastError.KERNEL32(String ID: %d,00000082), ref: 00F148F5
                                                                                                  • ___swprintf_l.LIBCMT ref: 00F1491E
                                                                                                  • MessageBoxW.USER32(?,?,?), ref: 00F14940
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLastLoadString$__wstrtime$Message___swprintf_l_strrchr
                                                                                                  • String ID: DirectX Setup$LoadString()$MsgBox$String ID: %d$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp$o
                                                                                                  • API String ID: 3419616289-3620252275
                                                                                                  • Opcode ID: f87e8839657a9792e0f6837758908d3e97fa8c407d8b1401159ca59abf628d6d
                                                                                                  • Instruction ID: 4c63b4e4af052b7a92550701abe1b81ff34b6101868b4149499dffb2d217cdec
                                                                                                  • Opcode Fuzzy Hash: f87e8839657a9792e0f6837758908d3e97fa8c407d8b1401159ca59abf628d6d
                                                                                                  • Instruction Fuzzy Hash: E041B4B5A4020CBAEB20AB60DC46FDB3B6DFF84750F404164F609E2091E675DED1BB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LoadLibraryA.KERNEL32(USER32.DLL,00000314,73AD59B8,00000000,?,?,?,?,73ACCB75,73AD59B8,Microsoft Visual C++ Runtime Library,00012010), ref: 73AD040F
                                                                                                  • GetProcAddress.KERNEL32(00000000,MessageBoxA,?,?,?,?,73ACCB75,73AD59B8,Microsoft Visual C++ Runtime Library,00012010), ref: 73AD042E
                                                                                                  • GetProcAddress.KERNEL32(00000000,00000000,?,?,?,?,73ACCB75,73AD59B8,Microsoft Visual C++ Runtime Library,00012010), ref: 73AD0447
                                                                                                  • GetProcAddress.KERNEL32(00000000,00000000,?,?,?,?,73ACCB75,73AD59B8,Microsoft Visual C++ Runtime Library,00012010), ref: 73AD045C
                                                                                                  • __get_wpgmptr.LIBCMT ref: 73AD046D
                                                                                                  • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA,?,?,?,?,73ACCB75,73AD59B8), ref: 73AD0491
                                                                                                  • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation,?,?,?,?,73ACCB75,73AD59B8), ref: 73AD04A9
                                                                                                  • __get_amblksiz.LIBCMT ref: 73AD0501
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressProc$LibraryLoad__get_amblksiz__get_wpgmptr
                                                                                                  • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                                                                                  • API String ID: 2538533512-232180764
                                                                                                  • Opcode ID: 6d3fa9f213313f55f99501a3ae2daca88299333c8ca48b36c79bbed787f54b6c
                                                                                                  • Instruction ID: 889c3fbbb3c283983fcdc31ec7d301e06a37d3d4c5a3f5b9ff6215f1fa8ce238
                                                                                                  • Opcode Fuzzy Hash: 6d3fa9f213313f55f99501a3ae2daca88299333c8ca48b36c79bbed787f54b6c
                                                                                                  • Instruction Fuzzy Hash: E64197F1910344AFDF01EFB58D8BB6E7BB8EF48210B24492FE856D615CDB36C6418A61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LoadLibraryA.KERNEL32(USER32.DLL,00000314,6D0EEE68,00000000,?,?,?,?,6D0E7C3B,6D0EEE68,Microsoft Visual C++ Runtime Library,00012010), ref: 6D0EA8F7
                                                                                                  • GetProcAddress.KERNEL32(00000000,MessageBoxA,?,?,?,?,6D0E7C3B,6D0EEE68,Microsoft Visual C++ Runtime Library,00012010), ref: 6D0EA916
                                                                                                  • GetProcAddress.KERNEL32(00000000,00000000,?,?,?,?,6D0E7C3B,6D0EEE68,Microsoft Visual C++ Runtime Library,00012010), ref: 6D0EA92F
                                                                                                  • GetProcAddress.KERNEL32(00000000,00000000,?,?,?,?,6D0E7C3B,6D0EEE68,Microsoft Visual C++ Runtime Library,00012010), ref: 6D0EA944
                                                                                                  • __get_wpgmptr.LIBCMT ref: 6D0EA955
                                                                                                  • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA,?,?,?,?,6D0E7C3B,6D0EEE68), ref: 6D0EA979
                                                                                                  • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation,?,?,?,?,6D0E7C3B,6D0EEE68), ref: 6D0EA991
                                                                                                  • __get_amblksiz.LIBCMT ref: 6D0EA9E9
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressProc$LibraryLoad__get_amblksiz__get_wpgmptr
                                                                                                  • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                                                                                  • API String ID: 2538533512-232180764
                                                                                                  • Opcode ID: bf5bcc0c0d6b9d012d75eddc42e8f58b4ee0241b8665cb6237d453665041abe7
                                                                                                  • Instruction ID: a04f5d5f18c8dd2b935579af5f3276de9da5d78cb120394071ad6db275d738a8
                                                                                                  • Opcode Fuzzy Hash: bf5bcc0c0d6b9d012d75eddc42e8f58b4ee0241b8665cb6237d453665041abe7
                                                                                                  • Instruction Fuzzy Hash: 4041AE72C08309EEFF11AFF5DD84FAE7FB8AB4A694B21446EE514E3040DB74C6508A51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LoadLibraryA.KERNEL32(USER32.DLL,00000314,00F29768,00000000,?,?,?,?,00F18325,00F29768,Microsoft Visual C++ Runtime Library,00012010), ref: 00F1E036
                                                                                                  • GetProcAddress.KERNEL32(00000000,MessageBoxA,?,?,?,?,00F18325,00F29768,Microsoft Visual C++ Runtime Library,00012010), ref: 00F1E055
                                                                                                  • GetProcAddress.KERNEL32(00000000,00000000,?,?,?,?,00F18325,00F29768,Microsoft Visual C++ Runtime Library,00012010), ref: 00F1E06E
                                                                                                  • GetProcAddress.KERNEL32(00000000,00000000,?,?,?,?,00F18325,00F29768,Microsoft Visual C++ Runtime Library,00012010), ref: 00F1E083
                                                                                                  • __get_wpgmptr.LIBCMT ref: 00F1E094
                                                                                                  • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA,?,?,?,?,00F18325,00F29768), ref: 00F1E0B8
                                                                                                  • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation,?,?,?,?,00F18325,00F29768), ref: 00F1E0D0
                                                                                                  • __get_amblksiz.LIBCMT ref: 00F1E128
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressProc$LibraryLoad__get_amblksiz__get_wpgmptr
                                                                                                  • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                                                                                  • API String ID: 2538533512-232180764
                                                                                                  • Opcode ID: ca5632306165484c903f10a6aabd0f21f1e417b6f1f62ea42eb535c0b8d7677d
                                                                                                  • Instruction ID: 39b0251ff55a725608d6dd86248fc47fa140e9f7f20b39ecf2e8bbfdd9169d36
                                                                                                  • Opcode Fuzzy Hash: ca5632306165484c903f10a6aabd0f21f1e417b6f1f62ea42eb535c0b8d7677d
                                                                                                  • Instruction Fuzzy Hash: B7418271D00309BFDB20EFB5AD859EEBBB8AF14710B10042AF904E2151DB79C9C1BBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,73AC684A), ref: 73AC7E9B
                                                                                                  • __mtterm.LIBCMT ref: 73AC7EA7
                                                                                                    • Part of subcall function 73AC7B35: TlsFree.KERNEL32(00000005,73AC68DE), ref: 73AC7B60
                                                                                                    • Part of subcall function 73AC7B35: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,73AC68DE), ref: 73ACACB6
                                                                                                    • Part of subcall function 73AC7B35: DeleteCriticalSection.KERNEL32(00000005,?,?,73AC68DE), ref: 73ACACE0
                                                                                                  • GetProcAddress.KERNEL32(00000000,FlsAlloc,?,?,73AC684A), ref: 73AC7EBD
                                                                                                  • GetProcAddress.KERNEL32(00000000,FlsGetValue,?,73AC684A), ref: 73AC7ECA
                                                                                                  • GetProcAddress.KERNEL32(00000000,FlsSetValue,?,73AC684A), ref: 73AC7ED7
                                                                                                  • GetProcAddress.KERNEL32(00000000,FlsFree,?,73AC684A), ref: 73AC7EE4
                                                                                                  • TlsAlloc.KERNEL32(?,73AC684A), ref: 73AC7F34
                                                                                                  • TlsSetValue.KERNEL32(00000000,?,73AC684A), ref: 73AC7F4B
                                                                                                  • __mtterm.LIBCMT ref: 73AC7FA2
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressProc$CriticalDeleteSection__mtterm$AllocFreeHandleModuleValue
                                                                                                  • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                                                                  • API String ID: 1270926730-3819984048
                                                                                                  • Opcode ID: c71953f58fa048e9d2f24c41cc24d67143bc9121f1a5e4cc9ee7eab2b1ceeba0
                                                                                                  • Instruction ID: db6a32627cda3504c027c906ec88090f0bcc1dfe9474c874bbe1c9466af90cf4
                                                                                                  • Opcode Fuzzy Hash: c71953f58fa048e9d2f24c41cc24d67143bc9121f1a5e4cc9ee7eab2b1ceeba0
                                                                                                  • Instruction Fuzzy Hash: 1B3189F29743809FDB017B7B9907F053AA6E754222720853BD429D629DDB36C162CFE2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,6D0DF2F1), ref: 6D0E1672
                                                                                                  • __mtterm.LIBCMT ref: 6D0E167E
                                                                                                    • Part of subcall function 6D0E130C: TlsFree.KERNEL32(00000011,6D0DF385), ref: 6D0E1337
                                                                                                    • Part of subcall function 6D0E130C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,6D0DF385), ref: 6D0E4901
                                                                                                    • Part of subcall function 6D0E130C: DeleteCriticalSection.KERNEL32(00000011,?,?,6D0DF385), ref: 6D0E492B
                                                                                                  • GetProcAddress.KERNEL32(00000000,FlsAlloc,?,?,6D0DF2F1), ref: 6D0E1694
                                                                                                  • GetProcAddress.KERNEL32(00000000,FlsGetValue,?,6D0DF2F1), ref: 6D0E16A1
                                                                                                  • GetProcAddress.KERNEL32(00000000,FlsSetValue,?,6D0DF2F1), ref: 6D0E16AE
                                                                                                  • GetProcAddress.KERNEL32(00000000,FlsFree,?,6D0DF2F1), ref: 6D0E16BB
                                                                                                  • TlsAlloc.KERNEL32(?,6D0DF2F1), ref: 6D0E170B
                                                                                                  • TlsSetValue.KERNEL32(00000000,?,6D0DF2F1), ref: 6D0E1722
                                                                                                  • __mtterm.LIBCMT ref: 6D0E1779
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressProc$CriticalDeleteSection__mtterm$AllocFreeHandleModuleValue
                                                                                                  • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                                                                  • API String ID: 1270926730-3819984048
                                                                                                  • Opcode ID: 103eebc12f060fce74e3e3e11e021049ca74c8526341dd4dcad92884fc93c6af
                                                                                                  • Instruction ID: 356bf6412814070a38c04544d1a05541c0921cf573fe95a616faf67906a102c4
                                                                                                  • Opcode Fuzzy Hash: 103eebc12f060fce74e3e3e11e021049ca74c8526341dd4dcad92884fc93c6af
                                                                                                  • Instruction Fuzzy Hash: E4319235904315AEFF19ABB5CE047593EF5EB4ABA5B55451BE938D3180EB31C0008F52
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,00F16F8C), ref: 00F190B8
                                                                                                  • __mtterm.LIBCMT ref: 00F190C4
                                                                                                    • Part of subcall function 00F18DC5: TlsFree.KERNEL32(00000003,00F191C4), ref: 00F18DF0
                                                                                                    • Part of subcall function 00F18DC5: DeleteCriticalSection.KERNEL32(00000000,00000000,74DEDFB0,00000001,00F191C4), ref: 00F1DA3E
                                                                                                    • Part of subcall function 00F18DC5: DeleteCriticalSection.KERNEL32(00000003,74DEDFB0,00000001,00F191C4), ref: 00F1DA68
                                                                                                  • GetProcAddress.KERNEL32(00000000,FlsAlloc,?), ref: 00F190DA
                                                                                                  • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00F190E7
                                                                                                  • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00F190F4
                                                                                                  • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00F19101
                                                                                                  • TlsAlloc.KERNEL32 ref: 00F19151
                                                                                                  • TlsSetValue.KERNEL32(00000000), ref: 00F19168
                                                                                                  • __mtterm.LIBCMT ref: 00F191BF
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressProc$CriticalDeleteSection__mtterm$AllocFreeHandleModuleValue
                                                                                                  • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                                                                  • API String ID: 1270926730-3819984048
                                                                                                  • Opcode ID: c1ce738cef9858a4f8915f98fb9d271f0a13d21784803790511f13016e51dd73
                                                                                                  • Instruction ID: b05b9d524aa9d631a84ff07cb3d38a705a849852b47a5647b15e86cf250d2c91
                                                                                                  • Opcode Fuzzy Hash: c1ce738cef9858a4f8915f98fb9d271f0a13d21784803790511f13016e51dd73
                                                                                                  • Instruction Fuzzy Hash: 1A319575919309AAEB206B75BD196C53BA5BB84760F10052AE418A31E0DBF585C3FF90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                    • Part of subcall function 73AC3D1D: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000,?,?,?,?,?,73AC3D93), ref: 73AC3D5E
                                                                                                  • SetFocus.USER32 ref: 73AC3DCF
                                                                                                  • GetLastError.KERNEL32(Not fatal...), ref: 73AC3DDE
                                                                                                  • CreateDialogParamA.USER32(00000064,73AC3D13,00000000), ref: 73AC3E42
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC3E52
                                                                                                  • SetDlgItemTextA.USER32(00000000,00000FA1,?), ref: 73AC3E71
                                                                                                  • GetLastError.KERNEL32(Not fatal...), ref: 73AC3E80
                                                                                                  • DirectXLoadString.DSETUP32(000003E8,?,00000104), ref: 73AC3EAC
                                                                                                  • MessageBoxA.USER32(?,?,?), ref: 73AC3EC3
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$Message$CreateDialogDirectFocusItemLoadParamPeekStringText
                                                                                                  • String ID: CreateDialog()$DirectXSetupCallback$Not fatal...$SetDlgItemText()$SetFocus()$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
                                                                                                  • API String ID: 371606451-1383702628
                                                                                                  • Opcode ID: 62cadee35d4123130e9be451993455b7a04974354048be68197ec07b4ed7a266
                                                                                                  • Instruction ID: 7a595cf52c02d3ff47a2ce387607e71c0e28cd944e80ab50891122c02f671aa9
                                                                                                  • Opcode Fuzzy Hash: 62cadee35d4123130e9be451993455b7a04974354048be68197ec07b4ed7a266
                                                                                                  • Instruction Fuzzy Hash: 0531B2B2B00285BFEF016E66DD47F9A3BBCFB04206B14412BB91AD91C9CB35C9518B90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FindResourceA.KERNEL32(?,6D0D7D8D,DATA,?,?,6D0D77A6,SETUP_AGREEMENT_ENG,000012F1,00066BDB,6D0D7D8D), ref: 6D0D7693
                                                                                                  • GetLastError.KERNEL32(Unable to find EULA %s.,6D0D7D8D,?,?,6D0D77A6,SETUP_AGREEMENT_ENG,000012F1,00066BDB,6D0D7D8D), ref: 6D0D76A5
                                                                                                  • LoadResource.KERNEL32(?,00000000,?,?,6D0D77A6,SETUP_AGREEMENT_ENG,000012F1,00066BDB,6D0D7D8D), ref: 6D0D76D5
                                                                                                  • GetLastError.KERNEL32(Unable to load EULA %s.,6D0D7D8D,?,?,6D0D77A6,SETUP_AGREEMENT_ENG,000012F1,00066BDB,6D0D7D8D), ref: 6D0D76EA
                                                                                                  • _memset.LIBCMT ref: 6D0D772D
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLastResource$FindLoad_memset
                                                                                                  • String ID: CheckCheckSum$DATA$EULA %s damaged.$FindResource()$LoadResource()$Unable to allocate memory block for EULA %s$Unable to find EULA %s.$Unable to load EULA %s.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\eula.cpp
                                                                                                  • API String ID: 3094993533-3028198498
                                                                                                  • Opcode ID: 23d7d9fbd539fde7c57ba57516836cb68fea1073b503fe5583c313e2e9048e4b
                                                                                                  • Instruction ID: fb7713fb06b21ca6a8ef002ee465617e5aafac06cc8adc01a68c640ba01dbb18
                                                                                                  • Opcode Fuzzy Hash: 23d7d9fbd539fde7c57ba57516836cb68fea1073b503fe5583c313e2e9048e4b
                                                                                                  • Instruction Fuzzy Hash: 6421F336A44715BAF7816BE8CC44FAB3A6DEB85394B014413FA19E6082FA60D6104672
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c), ref: 73AC6404
                                                                                                  • OutputDebugStringA.KERNEL32(DXSETUP_DPF(): Unable to open log file.,00000000,e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c), ref: 73AC6413
                                                                                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 73AC6453
                                                                                                  • GetLastError.KERNEL32 ref: 73AC645D
                                                                                                  Strings
                                                                                                  • %s%s, xrefs: 73AC642A
                                                                                                  • --------------------, xrefs: 73AC64B3
                                                                                                  • \Logs, xrefs: 73AC641E
                                                                                                  • Logs\DXError.log, xrefs: 73AC6471
                                                                                                  • DXSETUP_DPF(): GetWindowsDirectory() failed., xrefs: 73AC640E
                                                                                                  • DXSETUP_DPF(): path name too long., xrefs: 73AC6443
                                                                                                  • DXSETUP_DPF(): Unable to open log file., xrefs: 73AC64A8
                                                                                                  • DXSETUP_DPF(): failed to create log directory., xrefs: 73AC646A
                                                                                                  • %s%s%s, xrefs: 73AC6482
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c, xrefs: 73AC63EA
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Directory$CreateDebugErrorLastOutputStringWindows
                                                                                                  • String ID: %s%s$%s%s%s$--------------------$DXSETUP_DPF(): GetWindowsDirectory() failed.$DXSETUP_DPF(): Unable to open log file.$DXSETUP_DPF(): failed to create log directory.$DXSETUP_DPF(): path name too long.$Logs\DXError.log$\Logs$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
                                                                                                  • API String ID: 3967814497-2516916496
                                                                                                  • Opcode ID: 18ac9fb283eaee573b7489a59df8f09916813c56878b494870d42382cba9b9c6
                                                                                                  • Instruction ID: 0d8647325a9c5466b8f9828c1b2fa15035313ea5d6614d9b79a195e0500db3eb
                                                                                                  • Opcode Fuzzy Hash: 18ac9fb283eaee573b7489a59df8f09916813c56878b494870d42382cba9b9c6
                                                                                                  • Instruction Fuzzy Hash: 82212972A042DCBFEB12E7258F07FCB777CAB50200F184167F896E615EEB20C6458A55
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetVersionExA.KERNEL32(?), ref: 73AC5E7E
                                                                                                  • LoadLibraryA.KERNEL32(advpack.dll,?,00000000), ref: 73AC5EBA
                                                                                                  • GetProcAddress.KERNEL32(00000000,IsNTAdmin), ref: 73AC5ECE
                                                                                                  • GetLastError.KERNEL32(Module: %s, Function: %s,advpack.dll,IsNTAdmin), ref: 73AC5EF9
                                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 73AC5F1A
                                                                                                  • GetLastError.KERNEL32(Unable to load %s.,advpack.dll), ref: 73AC5F29
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLastLibrary$AddressFreeLoadProcVersion
                                                                                                  • String ID: GetProcAddress()$IsAdmin$IsNTAdmin$LoadLibrary()$Module: %s, Function: %s$Unable to load %s.$advpack.dll$e:\temp\382730\obj.x86fre\setup\deliverables\dsetup\dsetup\win9x\objfre\i386\dsinline.c
                                                                                                  • API String ID: 3600083760-4189720054
                                                                                                  • Opcode ID: 377dd618d688eb4e5a07e9bed891032e590afb1d46b56280ac07c8f176bb552e
                                                                                                  • Instruction ID: 6439066c4f04ce5edd1340ba389a2639715cc1f217394c07635513691470f3fa
                                                                                                  • Opcode Fuzzy Hash: 377dd618d688eb4e5a07e9bed891032e590afb1d46b56280ac07c8f176bb552e
                                                                                                  • Instruction Fuzzy Hash: 92210871A10158EFEF109B7A8D4BFAA73B8EB48211F14009AB50EA5186CF74C585CF60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetVersionExA.KERNEL32(?), ref: 6D0D940C
                                                                                                  • LoadLibraryA.KERNEL32(advpack.dll), ref: 6D0D9448
                                                                                                  • GetProcAddress.KERNEL32(00000000,IsNTAdmin), ref: 6D0D945C
                                                                                                  • GetLastError.KERNEL32(Module: %s, Function: %s,advpack.dll,IsNTAdmin), ref: 6D0D9487
                                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 6D0D94A8
                                                                                                  • GetLastError.KERNEL32(Unable to load %s.,advpack.dll), ref: 6D0D94B7
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLastLibrary$AddressFreeLoadProcVersion
                                                                                                  • String ID: GetProcAddress()$IsAdmin$IsNTAdmin$LoadLibrary()$Module: %s, Function: %s$Unable to load %s.$advpack.dll$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
                                                                                                  • API String ID: 3600083760-2055996021
                                                                                                  • Opcode ID: b9c87488947a34989844156d5f2e500597003cdd73f0026cfa58ecf6849aa5a6
                                                                                                  • Instruction ID: 9f64a47dcfc9f6309015a55e668ae7fccb6263a7110fc2b9ae7224551c67385a
                                                                                                  • Opcode Fuzzy Hash: b9c87488947a34989844156d5f2e500597003cdd73f0026cfa58ecf6849aa5a6
                                                                                                  • Instruction Fuzzy Hash: FD217475910315ABFBB09BB5DC49FBA76B8DB49215F4040A7E50DE2183DF705984CF22
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LCMapStringW.KERNEL32(00000000,00000100,6D0D4E80,00000001,00000000,00000000,6D0EB668,0000002C,6D0E64F2,00004000,00000000,00004000,?,?,?,?), ref: 6D0E602F
                                                                                                  • GetLastError.KERNEL32(?,6D0E3C56,6D0D1317,UTF-8,6D0D7D8D,6D0D1318,00000000,6D0EE4A8), ref: 6D0E6041
                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,6D0EB668,0000002C,6D0E64F2,00004000,00000000,00004000,?,?,?,?), ref: 6D0E60D0
                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,00000000), ref: 6D0E6184
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ByteCharMultiWide$ErrorLastString
                                                                                                  • String ID:
                                                                                                  • API String ID: 2717499641-0
                                                                                                  • Opcode ID: fa0aa54ddbec2886bc42e7a2c0385e9fad20a616b3f1a9a73c0c71115a015582
                                                                                                  • Instruction ID: 8678f8144fcec141bba0bc37b72ac87dae21f28870e858c96f685f16577beb1a
                                                                                                  • Opcode Fuzzy Hash: fa0aa54ddbec2886bc42e7a2c0385e9fad20a616b3f1a9a73c0c71115a015582
                                                                                                  • Instruction Fuzzy Hash: D4D18D7190421AEFEF118FA4EC84BEE7BB5FB09794F91492AFA14A7150DB31C850DB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LCMapStringW.KERNEL32(00000000,00000100,00F12A18,00000001,00000000,00000000,00F262D0,0000002C,00F1C9FB,00004000,00000000,00004000,?,?,?,?), ref: 00F1C538
                                                                                                  • GetLastError.KERNEL32(?,00F1AFE2,00F11303,UTF-8,?,00F11304,00000000,C:\Windows\Logs\DirectX.log), ref: 00F1C54A
                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00F262D0,0000002C,00F1C9FB,00004000,00000000,00004000,?,?,?,?), ref: 00F1C5D9
                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,00000000), ref: 00F1C68D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ByteCharMultiWide$ErrorLastString
                                                                                                  • String ID:
                                                                                                  • API String ID: 2717499641-0
                                                                                                  • Opcode ID: dabb85ab864806242ad45d57e7da592d7e758a3350e4d341cddf1960ee18a3e7
                                                                                                  • Instruction ID: dc1caf54778410559bd1fc52a12715f4cc2bdf8c468c26f363bf9d6b90ff9dbf
                                                                                                  • Opcode Fuzzy Hash: dabb85ab864806242ad45d57e7da592d7e758a3350e4d341cddf1960ee18a3e7
                                                                                                  • Instruction Fuzzy Hash: 3CD17B72D44219AFCF119FA4DC85AEE7BB6BF08720F244529F905A61A0D7758890FB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                    • Part of subcall function 6D0D6CEC: FindFirstFileA.KERNEL32(?,?,?,00000104,?,\ntkrnlpa.exe,00000104), ref: 6D0D6D8F
                                                                                                    • Part of subcall function 6D0D6CEC: FindClose.KERNEL32(00000000), ref: 6D0D6D9B
                                                                                                  • _strrchr.LIBCMT ref: 6D0DDE42
                                                                                                  • _strrchr.LIBCMT ref: 6D0DDE59
                                                                                                  • _strrchr.LIBCMT ref: 6D0DDE9C
                                                                                                  • DeleteFileA.KERNEL32(?,?,00000000), ref: 6D0DDF18
                                                                                                  • DeleteFileA.KERNEL32 ref: 6D0DDF29
                                                                                                  Strings
                                                                                                  • Unable to find '\'., xrefs: 6D0DDF1C
                                                                                                  • CabCallback, xrefs: 6D0DDEE6
                                                                                                  • RegisteredPackages, xrefs: 6D0DDF7E
                                                                                                  • dxxpdbg, xrefs: 6D0DDE68
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp, xrefs: 6D0DDEF0
                                                                                                  • Unable to create path string, %sdllcache%s, xrefs: 6D0DDEDD
                                                                                                  • dllcache, xrefs: 6D0DDEB6
                                                                                                  • trying to remove the file %s., xrefs: 6D0DDE8E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File_strrchr$DeleteFind$CloseFirst
                                                                                                  • String ID: CabCallback$RegisteredPackages$Unable to create path string, %sdllcache%s$Unable to find '\'.$dllcache$dxxpdbg$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp$trying to remove the file %s.
                                                                                                  • API String ID: 2252362552-2484097790
                                                                                                  • Opcode ID: 0b73438d30c8e623f1f5b3d40472a26f7b037562d9d26afd91ec8e5c7898c24b
                                                                                                  • Instruction ID: 8eb15d063144a2e5403166c5d21fd3c368db9662dae22f7047366b1afaeb2e38
                                                                                                  • Opcode Fuzzy Hash: 0b73438d30c8e623f1f5b3d40472a26f7b037562d9d26afd91ec8e5c7898c24b
                                                                                                  • Instruction Fuzzy Hash: 4F51EE32548316ABFB91A7658D80BBA37E9AFC5758F060867EA45DB185FF70D4008B60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: CSetup::XSetupCallback$CreateDialog()$Not fatal...$SetDlgItemText()$SetFocus()$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
                                                                                                  • API String ID: 0-3552151630
                                                                                                  • Opcode ID: e00dfc905dcb42ed31cbf187637cc5a96791327ce6624da2e26b1988bf33f9b2
                                                                                                  • Instruction ID: a98d87b029c69d9c1d000b86677129748184d46bb345f2df1c2e83a47e98d756
                                                                                                  • Opcode Fuzzy Hash: e00dfc905dcb42ed31cbf187637cc5a96791327ce6624da2e26b1988bf33f9b2
                                                                                                  • Instruction Fuzzy Hash: 0F417E35A0430AABFBA19F65CC44FBA77F8AB0A704F00452BFA59E2581DB79D9408F51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000104,00000000,00000000), ref: 73AC50AF
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC50BE
                                                                                                    • Part of subcall function 73AC64D5: __wstrtime.LIBCMT ref: 73AC6506
                                                                                                    • Part of subcall function 73AC64D5: __wstrtime.LIBCMT ref: 73AC650F
                                                                                                    • Part of subcall function 73AC64D5: _strrchr.LIBCMT ref: 73AC6555
                                                                                                  • DirectXLoadString.DSETUP32(00001391,?,00000104), ref: 73AC5136
                                                                                                  • DirectXSetupCallback.DSETUP32(0000000A,00000010,?,00000000,00000000), ref: 73AC5149
                                                                                                  • DestroyWindow.USER32(00000000), ref: 73AC5159
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC5164
                                                                                                    • Part of subcall function 73AC4B10: GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 73AC4B43
                                                                                                    • Part of subcall function 73AC4B10: GetLastError.KERNEL32(00000000), ref: 73AC4B4E
                                                                                                    • Part of subcall function 73AC64D5: FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 73AC6665
                                                                                                    • Part of subcall function 73AC64D5: LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,GetRegistryDXVersion), ref: 73AC668A
                                                                                                  • DirectXSetupA.DSETUP(?,00000000,?), ref: 73AC5198
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DirectErrorLast$Setup__wstrtime$ByteCallbackCharCurrentDestroyDirectoryFormatFreeLoadLocalMessageMultiStringWideWindow_strrchr
                                                                                                  • String ID: DestroyWindow()$DirectXSetupW$DirectXSetupW()$LoadDSetup32() failed.$WideCharToMultiByte()$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
                                                                                                  • API String ID: 611871445-3988145944
                                                                                                  • Opcode ID: fc025a0e21b8e6aacb78a0a880b9e4271321189fc10aa508c84d3fb96d767428
                                                                                                  • Instruction ID: 4ab27445479335e6a1e6898f342abcfcf3b0f169c3b2b71372b4b86882ba23cc
                                                                                                  • Opcode Fuzzy Hash: fc025a0e21b8e6aacb78a0a880b9e4271321189fc10aa508c84d3fb96d767428
                                                                                                  • Instruction Fuzzy Hash: CF31D2B26002A4BFEB11AB669D4BFEB7B7CEB09760F14051BF51996188D770C9418BA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetWindowsDirectoryA.KERNEL32(?,00000104,6D0D7D8D,00000000), ref: 6D0D6291
                                                                                                  • OutputDebugStringA.KERNEL32(DXSETUP_DPF(): Unable to open log file.,6D0D7D8D,00000000), ref: 6D0D62A0
                                                                                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 6D0D62E0
                                                                                                  • GetLastError.KERNEL32 ref: 6D0D62EA
                                                                                                  Strings
                                                                                                  • DXSETUP_DPF(): Unable to open log file., xrefs: 6D0D6335
                                                                                                  • DXSETUP_DPF(): path name too long., xrefs: 6D0D62D0
                                                                                                  • Logs\DXError.log, xrefs: 6D0D62FE
                                                                                                  • DXSETUP_DPF(): failed to create log directory., xrefs: 6D0D62F7
                                                                                                  • --------------------, xrefs: 6D0D6340
                                                                                                  • %s%s, xrefs: 6D0D62B7
                                                                                                  • DXSETUP_DPF(): GetWindowsDirectory() failed., xrefs: 6D0D629B
                                                                                                  • %s%s%s, xrefs: 6D0D630F
                                                                                                  • \Logs, xrefs: 6D0D62AB
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Directory$CreateDebugErrorLastOutputStringWindows
                                                                                                  • String ID: %s%s$%s%s%s$--------------------$DXSETUP_DPF(): GetWindowsDirectory() failed.$DXSETUP_DPF(): Unable to open log file.$DXSETUP_DPF(): failed to create log directory.$DXSETUP_DPF(): path name too long.$Logs\DXError.log$\Logs
                                                                                                  • API String ID: 3967814497-1050326959
                                                                                                  • Opcode ID: 0459171b0329eeb4084a58c399c593c68fa94f295342511d3e00bf089c1d2c9c
                                                                                                  • Instruction ID: 4328a71bbf7ea631492bab1e662184782bddb44f144d7be5fcdc7c7a4ffcfad7
                                                                                                  • Opcode Fuzzy Hash: 0459171b0329eeb4084a58c399c593c68fa94f295342511d3e00bf089c1d2c9c
                                                                                                  • Instruction Fuzzy Hash: 90218175908B18BAF790D7A5DC48FFE3ABC9B42714FC04067ED48E3442EF60954086A6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00F1465D
                                                                                                  • OutputDebugStringA.KERNEL32(DXSetup: GetRequiredDiskSpaceFromLog(): path name too long.), ref: 00F1466C
                                                                                                  • CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00F146B4
                                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 00F146CD
                                                                                                  • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 00F146FF
                                                                                                  • lstrlenA.KERNEL32(needed = ), ref: 00F14734
                                                                                                  • CloseHandle.KERNEL32(?), ref: 00F14770
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File$CloseCreateDebugDirectoryHandleOutputReadSizeStringWindowslstrlen
                                                                                                  • String ID: DXSetup: GetRequiredDiskSpaceFromLog(): GetWindowsDirectory() failed.$DXSetup: GetRequiredDiskSpaceFromLog(): path name too long.$Logs\DirectX.log$Not enough disk space$needed =
                                                                                                  • API String ID: 806678891-479621395
                                                                                                  • Opcode ID: e9b40cb3f4dc99f98f86d38e7caa1f1d0048fb8cbccc5fb478f006c72eb9630f
                                                                                                  • Instruction ID: 67ad94e528720e09732cfded9cf8d688bb8bd598716fe9a2375304df3db97402
                                                                                                  • Opcode Fuzzy Hash: e9b40cb3f4dc99f98f86d38e7caa1f1d0048fb8cbccc5fb478f006c72eb9630f
                                                                                                  • Instruction Fuzzy Hash: 0D41B672D4021D6FDB20BB349C89AEA77BCFB95760F1005A9F119E60D0DB745EC1AA50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00F13839
                                                                                                  • OutputDebugStringA.KERNEL32(DXSETUP_DPF(): Unable to open log file.), ref: 00F13848
                                                                                                  • CreateDirectoryA.KERNEL32(?,00000000), ref: 00F13888
                                                                                                  • GetLastError.KERNEL32 ref: 00F13892
                                                                                                  Strings
                                                                                                  • %s%s, xrefs: 00F1385F
                                                                                                  • DXSETUP_DPF(): failed to create log directory., xrefs: 00F1389F
                                                                                                  • \Logs, xrefs: 00F13853
                                                                                                  • %s%s%s, xrefs: 00F138B7
                                                                                                  • DXSETUP_DPF(): Unable to open log file., xrefs: 00F138DD
                                                                                                  • DXSETUP_DPF(): path name too long., xrefs: 00F13878
                                                                                                  • Logs\DXError.log, xrefs: 00F138A6
                                                                                                  • DXSETUP_DPF(): GetWindowsDirectory() failed., xrefs: 00F13843
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Directory$CreateDebugErrorLastOutputStringWindows
                                                                                                  • String ID: %s%s$%s%s%s$DXSETUP_DPF(): GetWindowsDirectory() failed.$DXSETUP_DPF(): Unable to open log file.$DXSETUP_DPF(): failed to create log directory.$DXSETUP_DPF(): path name too long.$Logs\DXError.log$\Logs
                                                                                                  • API String ID: 3967814497-3230818052
                                                                                                  • Opcode ID: c445853cde6d7a0f16ebed84385035a7da18d70ac701e0edb1554903ab4d8227
                                                                                                  • Instruction ID: 664628586a1aaaca3da4e4ea932ca0989fa76aed6b0554edab9a4964c13340e6
                                                                                                  • Opcode Fuzzy Hash: c445853cde6d7a0f16ebed84385035a7da18d70ac701e0edb1554903ab4d8227
                                                                                                  • Instruction Fuzzy Hash: BB215B73E4431476D720B7719C0AFDA77ACAB50B70F1001B5F615E2081EA75DBC4B662
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetFileVersionInfoSizeA.VERSION(6D0D6892,?,\ntkrnlpa.exe,00000104,00000000,?,?,6D0D6892,?,?,?,00000000), ref: 6D0D67B2
                                                                                                    • Part of subcall function 6D0D66FB: _strrchr.LIBCMT ref: 6D0D6706
                                                                                                  • GetLastError.KERNEL32(6D0D6892,6D0D6892,?,\ntkrnlpa.exe,00000104,00000000,?,?,6D0D6892,?,?,?,00000000), ref: 6D0D67C9
                                                                                                  • _memset.LIBCMT ref: 6D0D6821
                                                                                                  • GetFileVersionInfoA.VERSION(6D0D6892,00000000,00000000,00000000,?,6D0D6892,?,?,?,00000000), ref: 6D0D682F
                                                                                                  • GetLastError.KERNEL32(00000000,6D0D6892,00000000,00000000,00000000,?,6D0D6892,?,?,?,00000000), ref: 6D0D6839
                                                                                                  Strings
                                                                                                  • \ntkrnlpa.exe, xrefs: 6D0D67AC
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h, xrefs: 6D0D680F, 6D0D684F
                                                                                                  • GetFileVersionInfo(), xrefs: 6D0D6840
                                                                                                  • Unable to allocate memory., xrefs: 6D0D67FE
                                                                                                  • GetFileVersionInfoBlock, xrefs: 6D0D6805, 6D0D6845
                                                                                                  • GetFileVersionInfoBlock(): %s does not have version information., xrefs: 6D0D67E1
                                                                                                  • GetFileVersionInfoBlock(): Unable to get FileVersionInfoSize, file: %s, reason: %d., xrefs: 6D0D67D1
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorFileInfoLastVersion$Size_memset_strrchr
                                                                                                  • String ID: GetFileVersionInfo()$GetFileVersionInfoBlock$GetFileVersionInfoBlock(): %s does not have version information.$GetFileVersionInfoBlock(): Unable to get FileVersionInfoSize, file: %s, reason: %d.$Unable to allocate memory.$\ntkrnlpa.exe$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
                                                                                                  • API String ID: 388213077-426275582
                                                                                                  • Opcode ID: e9ebcaf3c7e7abe15b64fccc8aa2a9c30503283a32fa0d2c43d11e3aa0995cb1
                                                                                                  • Instruction ID: 2ccd53ab06a029bd13bf2cd3891187a24753bfaef52a4603b24a3e06eaa3fd4b
                                                                                                  • Opcode Fuzzy Hash: e9ebcaf3c7e7abe15b64fccc8aa2a9c30503283a32fa0d2c43d11e3aa0995cb1
                                                                                                  • Instruction Fuzzy Hash: 3811C2A650831E3AF2916AA55C84FFF396CCF4329C786402BFE08A3143EF21890545F3
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __fileno$__cftof
                                                                                                  • String ID:
                                                                                                  • API String ID: 1302671315-0
                                                                                                  • Opcode ID: 57462f975e1c0af0ddfe93e40444e94dee77c7a2791c93699d26b29f46309a17
                                                                                                  • Instruction ID: e52629439495483bf45943ee95c0ffbfe06f852634faac30d360cdfc180330ec
                                                                                                  • Opcode Fuzzy Hash: 57462f975e1c0af0ddfe93e40444e94dee77c7a2791c93699d26b29f46309a17
                                                                                                  • Instruction Fuzzy Hash: 695137320057D69FCB158B38DA83F59B7E8EF26222324060FE0E6873ECDA21D505DB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegOpenKeyExA.ADVAPI32(80000002,software\microsoft\directx,00000000,00000001,?), ref: 73AC38ED
                                                                                                  • RegQueryValueExA.ADVAPI32(?,Version,00000000,00000000,?,?), ref: 73AC3943
                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 73AC39A4
                                                                                                    • Part of subcall function 73AC64D5: __wstrtime.LIBCMT ref: 73AC6506
                                                                                                    • Part of subcall function 73AC64D5: __wstrtime.LIBCMT ref: 73AC650F
                                                                                                    • Part of subcall function 73AC64D5: _strrchr.LIBCMT ref: 73AC6555
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime$CloseOpenQueryValue_strrchr
                                                                                                  • String ID: GetRegistryDXVersion$RegCloseKey()$RegOpenKeyEx()$RegQueryValueEx()$StringToVersionInfo() failed.$Version$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c$software\microsoft\directx
                                                                                                  • API String ID: 4010714187-3998709912
                                                                                                  • Opcode ID: cf12954c16a7ed05b4f897862fc35b96f14ec237d1327a7c04c246c37585f899
                                                                                                  • Instruction ID: deb8a92f948e7ee07ce75fae2f8c65e8b8b789838779fc5cb6cbaa7a2d4b46fa
                                                                                                  • Opcode Fuzzy Hash: cf12954c16a7ed05b4f897862fc35b96f14ec237d1327a7c04c246c37585f899
                                                                                                  • Instruction Fuzzy Hash: AF21B4B1B001987FE710AB558D57FDBB6ACE759348F1001A7F645B5289CB70CE808E60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LoadStringW.USER32(00000000,0000006F,?,00000200,00000000,00000000), ref: 00F16C22
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 00F16C2D
                                                                                                    • Part of subcall function 00F14629: GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00F1465D
                                                                                                    • Part of subcall function 00F14629: OutputDebugStringA.KERNEL32(DXSetup: GetRequiredDiskSpaceFromLog(): path name too long.), ref: 00F1466C
                                                                                                  • ___swprintf_l.LIBCMT ref: 00F16C69
                                                                                                  • LoadStringW.USER32(00000000,00001F40,?,00000200), ref: 00F16C80
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 00F16C8B
                                                                                                  • LoadStringW.USER32(00000000,00000030,?,00000200,00000000,00000000), ref: 00F16CAA
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 00F16CB5
                                                                                                  • MessageBoxW.USER32(00F168F2,?,?,00000072), ref: 00F16CDF
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: String$ErrorLastLoad$DebugDirectoryMessageOutputWindows___swprintf_l
                                                                                                  • String ID: LoadString()$ShowMessage$e:\bt\382730\setup\deliverables\dxsetup\utils.cpp
                                                                                                  • API String ID: 1139171496-2358067398
                                                                                                  • Opcode ID: f03e7a6c7b2a652f5ba89225ece48d516fefbd0ae0b2b1db1fe5396a95aa0bf3
                                                                                                  • Instruction ID: 119a4dc85e357a46cbd02a4eae000426ed298f45c432665b5704064254ccedc0
                                                                                                  • Opcode Fuzzy Hash: f03e7a6c7b2a652f5ba89225ece48d516fefbd0ae0b2b1db1fe5396a95aa0bf3
                                                                                                  • Instruction Fuzzy Hash: 322195B6A4024CBBEB10EBA0DC45FEB77ACFB04705F404155F745E6081EA74DA84BBA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetFileVersionInfoSizeA.VERSION(?,?), ref: 00F13E07
                                                                                                    • Part of subcall function 00F13D50: _strrchr.LIBCMT ref: 00F13D5B
                                                                                                  • GetLastError.KERNEL32(?,?), ref: 00F13E1E
                                                                                                  • _memset.LIBCMT ref: 00F13E76
                                                                                                  • GetFileVersionInfoA.VERSION(?,00000000,00000000,00000000), ref: 00F13E84
                                                                                                  • GetLastError.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 00F13E8E
                                                                                                  Strings
                                                                                                  • Unable to allocate memory., xrefs: 00F13E53
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h, xrefs: 00F13E64, 00F13EA4
                                                                                                  • GetFileVersionInfo(), xrefs: 00F13E95
                                                                                                  • GetFileVersionInfoBlock, xrefs: 00F13E5A, 00F13E9A
                                                                                                  • GetFileVersionInfoBlock(): %s does not have version information., xrefs: 00F13E36
                                                                                                  • GetFileVersionInfoBlock(): Unable to get FileVersionInfoSize, file: %s, reason: %d., xrefs: 00F13E26
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorFileInfoLastVersion$Size_memset_strrchr
                                                                                                  • String ID: GetFileVersionInfo()$GetFileVersionInfoBlock$GetFileVersionInfoBlock(): %s does not have version information.$GetFileVersionInfoBlock(): Unable to get FileVersionInfoSize, file: %s, reason: %d.$Unable to allocate memory.$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
                                                                                                  • API String ID: 388213077-1642510695
                                                                                                  • Opcode ID: 1c57d25bd516e3e4656fbf3dd642a9e3ade6ea6a5ade39a4612e042343ab3b3a
                                                                                                  • Instruction ID: 5828ed8b242002bafb4466f01609a29853fffd8b1eb72697190e0a24240513ac
                                                                                                  • Opcode Fuzzy Hash: 1c57d25bd516e3e4656fbf3dd642a9e3ade6ea6a5ade39a4612e042343ab3b3a
                                                                                                  • Instruction Fuzzy Hash: C311E9F3A043157AA22036615C87CEB395DDE56BA47150115FB05E1182E99ACFC472F7
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetWindowTextA.USER32(?,?,00000208), ref: 00F142B0
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 00F142BB
                                                                                                  • GetClassNameA.USER32(?,?,00000208), ref: 00F142EB
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 00F142F6
                                                                                                  • SetForegroundWindow.USER32(?), ref: 00F14347
                                                                                                  • SetFocus.USER32(?), ref: 00F1434E
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLastWindow$ClassFocusForegroundNameText
                                                                                                  • String ID: 32770$FindDXSetupWindow$GetClassName()$GetWindowText()$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp
                                                                                                  • API String ID: 4084711242-343571156
                                                                                                  • Opcode ID: 8433566a345ebf954a9909b5c17c202330a2220f4bf55f4a533e8021839e9117
                                                                                                  • Instruction ID: cc9f59c525e5ddde5072d4c7b8a2936fb7eb679f7e1814495e81f8e9c487edd7
                                                                                                  • Opcode Fuzzy Hash: 8433566a345ebf954a9909b5c17c202330a2220f4bf55f4a533e8021839e9117
                                                                                                  • Instruction Fuzzy Hash: E021B7B2A0430D7BD700AB609C49DFA77BCFB89720F504169F655E2081DB34DAC0BA75
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                    • Part of subcall function 6D0DBA00: CharLowerA.USER32(?), ref: 6D0DBA17
                                                                                                    • Part of subcall function 6D0DBA00: _strrchr.LIBCMT ref: 6D0DBA31
                                                                                                  • DeleteFileA.KERNEL32(?,?,00000000,?,00000104), ref: 6D0DE157
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 6D0DE162
                                                                                                  • _strrchr.LIBCMT ref: 6D0DE1BB
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _strrchr$CharDeleteErrorFileLastLower
                                                                                                  • String ID: CabCallback$DeleteFile()$Deleted file %s with DELAY_UNTIL_REBOOT.$MoveFileEx()$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
                                                                                                  • API String ID: 1206630738-28221962
                                                                                                  • Opcode ID: 19376016493f68f846c0a8607167ff50cb2e5a710d60b803e11fa6a8a104c50d
                                                                                                  • Instruction ID: ba2b67f1cd96a0eec2d404e1dd17e8b44156267dc623799eb775a6af9afc173f
                                                                                                  • Opcode Fuzzy Hash: 19376016493f68f846c0a8607167ff50cb2e5a710d60b803e11fa6a8a104c50d
                                                                                                  • Instruction Fuzzy Hash: 7641313150832A9BFB819BA4CD44BBAB7F8EF82714F004067FA95D7088DF70D6408E61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetModuleHandleA.KERNEL32(00000000,00001F49,?,00000258), ref: 00F1544E
                                                                                                  • LoadStringA.USER32(00000000), ref: 00F15457
                                                                                                  • GetModuleHandleA.KERNEL32(00000000,?,?,00000258), ref: 00F15473
                                                                                                  • LoadStringA.USER32(00000000), ref: 00F15476
                                                                                                    • Part of subcall function 00F152DE: GetDlgItem.USER32(?,00000BB9), ref: 00F152EC
                                                                                                    • Part of subcall function 00F152DE: SendMessageA.USER32(00000000,00000401,00000000,?,?,00000BB9), ref: 00F1530A
                                                                                                    • Part of subcall function 00F152DE: SendMessageA.USER32(00000000,00000402,00000000,00000000,?,00000BB9), ref: 00F15316
                                                                                                    • Part of subcall function 00F152DE: SendMessageA.USER32(00000000,00000404,00000001,00000000,?,00000BB9), ref: 00F15322
                                                                                                    • Part of subcall function 00F152DE: ShowWindow.USER32(00000000,00000001,?,00000BB9), ref: 00F15327
                                                                                                  • SetDlgItemTextA.USER32(00000000,00000BBC,00F11ED4), ref: 00F154D3
                                                                                                  • GetModuleHandleA.KERNEL32(00000000,00001F40,?,00000080), ref: 00F154FD
                                                                                                  • LoadStringA.USER32(00000000), ref: 00F15504
                                                                                                  • GetParent.USER32(00000000,?,?,?), ref: 00F1551C
                                                                                                  • MessageBoxA.USER32(00000000), ref: 00F15523
                                                                                                  Strings
                                                                                                  • DSetupCallback(): Phase = %d, Steps = %d, xrefs: 00F15414
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Message$HandleLoadModuleSendString$Item$ParentShowTextWindow
                                                                                                  • String ID: DSetupCallback(): Phase = %d, Steps = %d
                                                                                                  • API String ID: 3174243963-1040383907
                                                                                                  • Opcode ID: b741dc010057f38d74f44618ad535619aeac0039b2c9f6469cfc9044c16f004c
                                                                                                  • Instruction ID: cb59c02fad3126ccacca91ae7fc3915292bafd277f916cfa6f11b49f8896e990
                                                                                                  • Opcode Fuzzy Hash: b741dc010057f38d74f44618ad535619aeac0039b2c9f6469cfc9044c16f004c
                                                                                                  • Instruction Fuzzy Hash: 5D316F7290064DEFCB20DF54DC85EEA77B8FB88751F108059F606A7190DA70AE81EF50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • DirectXLoadString.DSETUP32(?,?,00000104,00000104,00000000), ref: 73AC5735
                                                                                                    • Part of subcall function 73AC4B10: GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 73AC4B43
                                                                                                    • Part of subcall function 73AC4B10: GetLastError.KERNEL32(00000000), ref: 73AC4B4E
                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000000,?), ref: 73AC5766
                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 73AC578F
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC5796
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ByteCharErrorLastMultiWide$CurrentDirectDirectoryLoadString
                                                                                                  • String ID: Insufficient buffer.$LoadDSetup32() failed.$MultiByteToWideChar()$MyLoadStringW$XDirectXLoadString() failed.$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
                                                                                                  • API String ID: 2176918339-3711276564
                                                                                                  • Opcode ID: ceb4bfc71dfb5ee889a835127f0eb2c50f221d5027b8e9232cc857d933fb346a
                                                                                                  • Instruction ID: 5242cf9db2f97452175dfed36001b9434209e049f3b8af2801b2c3c599932ade
                                                                                                  • Opcode Fuzzy Hash: ceb4bfc71dfb5ee889a835127f0eb2c50f221d5027b8e9232cc857d933fb346a
                                                                                                  • Instruction Fuzzy Hash: EF210D717042CCFEEB11A9568D87FBB36BCE786750F50051BF965E50CAE720C9518A70
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetProcAddress.KERNEL32(?,?), ref: 6D0D864E
                                                                                                  • FreeLibrary.KERNEL32 ref: 6D0D8693
                                                                                                  • GetLastError.KERNEL32 ref: 6D0D869D
                                                                                                    • Part of subcall function 6D0D6391: FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 6D0D6521
                                                                                                    • Part of subcall function 6D0D6391: LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00066BDB), ref: 6D0D6546
                                                                                                  • GetLastError.KERNEL32(Module: %s, Function: %s,?,?,?,?,?), ref: 6D0D866C
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorFreeLast__wstrtime$AddressFormatLibraryLocalMessageProc_strrchr
                                                                                                  • String ID: CDllLoader::GetProcAddress$FreeLibrary()$GetProcAddress()$Invalid member - m_hModule is NULL.$Module: %s, Function: %s$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
                                                                                                  • API String ID: 2317682547-2938890287
                                                                                                  • Opcode ID: 1a101e9f260165bbc80825c73bf00e6593a918609dace364607166cb99bad499
                                                                                                  • Instruction ID: eeec91e6c028d50188436cdec8b7a731e599f77253e13454e79df80ae10b83c4
                                                                                                  • Opcode Fuzzy Hash: 1a101e9f260165bbc80825c73bf00e6593a918609dace364607166cb99bad499
                                                                                                  • Instruction Fuzzy Hash: 3211E979600305BBF7519F65CC44F7F36BDDB95714F90401BF948E7181EB709A408A66
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetProcAddress.KERNEL32(?,?), ref: 00F15210
                                                                                                  • FreeLibrary.KERNEL32 ref: 00F15255
                                                                                                  • GetLastError.KERNEL32 ref: 00F1525F
                                                                                                    • Part of subcall function 00F1390A: FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00F13A9A
                                                                                                    • Part of subcall function 00F1390A: LocalFree.KERNEL32(?), ref: 00F13ABF
                                                                                                  • GetLastError.KERNEL32(Module: %s, Function: %s,?,?,?,?,?), ref: 00F1522E
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F1393B
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F13944
                                                                                                    • Part of subcall function 00F1390A: _strrchr.LIBCMT ref: 00F1398A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorFreeLast__wstrtime$AddressFormatLibraryLocalMessageProc_strrchr
                                                                                                  • String ID: CDllLoader::GetProcAddress$FreeLibrary()$GetProcAddress()$Invalid member - m_hModule is NULL.$Module: %s, Function: %s$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
                                                                                                  • API String ID: 2317682547-2938890287
                                                                                                  • Opcode ID: 199e3cc064a8741c8cab01c822eb27d4753236f38cb2f83598c32e21e879d37a
                                                                                                  • Instruction ID: 1476387da773519e9d062fa385385d96adb290d422bcd0615e1fe3e2ea186bfe
                                                                                                  • Opcode Fuzzy Hash: 199e3cc064a8741c8cab01c822eb27d4753236f38cb2f83598c32e21e879d37a
                                                                                                  • Instruction Fuzzy Hash: 8A1102B3E00208FFE7106F91DC06EEB7AAEFBD4B50F144118FA04A6041D2B5DE80BA61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • _memset.LIBCMT ref: 6D0D6882
                                                                                                    • Part of subcall function 6D0D67A1: GetFileVersionInfoSizeA.VERSION(6D0D6892,?,\ntkrnlpa.exe,00000104,00000000,?,?,6D0D6892,?,?,?,00000000), ref: 6D0D67B2
                                                                                                    • Part of subcall function 6D0D67A1: GetLastError.KERNEL32(6D0D6892,6D0D6892,?,\ntkrnlpa.exe,00000104,00000000,?,?,6D0D6892,?,?,?,00000000), ref: 6D0D67C9
                                                                                                  • VerQueryValueW.VERSION(00000000,6D0D1754,00000000,?,?,?,?,00000000), ref: 6D0D68AA
                                                                                                  • GetLastError.KERNEL32(00000000,00000000,6D0D1754,00000000,?,?,?,?,00000000), ref: 6D0D68B4
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$FileInfoQuerySizeValueVersion_memset
                                                                                                  • String ID: 4$DXGetFileVersion$Data size mismatch.$VerQueryValue()$\ntkrnlpa.exe$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
                                                                                                  • API String ID: 2833552196-2675559974
                                                                                                  • Opcode ID: 46161277162d663c26decaaa172eefe2b0ab2c3b48c6db1ce3a286358cd30c69
                                                                                                  • Instruction ID: da5d6feb6c3f34468ea0a511631b7a86a48d46925f3b9ee6f2d3b2e837d992a4
                                                                                                  • Opcode Fuzzy Hash: 46161277162d663c26decaaa172eefe2b0ab2c3b48c6db1ce3a286358cd30c69
                                                                                                  • Instruction Fuzzy Hash: D901F93124430C7AF7816A949C81FBF376CDB6178CF618137FB19AA092EF729A0055A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CompareString
                                                                                                  • String ID: CSetup::CheckForceCopy$CheckForceCopy(): Unablt to get target file name from %s, skip it.$CheckForceCopy(): no file list in section, skip checking force copy.$DX_FORCECOPY_FILE$LoadListFromInfSection() failed.$MakeForceCopyList() failed.$Unable to create path string, %s%s.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
                                                                                                  • API String ID: 1825529933-3866404779
                                                                                                  • Opcode ID: 2d205d7651effbb28e2014bfa7ac943c18260ffb979dbc2fd6e1279c613afd49
                                                                                                  • Instruction ID: 95f4bb44cc1d79829abe52ce3697a58e551103d3cf4013c70bb67d2cd9a10f77
                                                                                                  • Opcode Fuzzy Hash: 2d205d7651effbb28e2014bfa7ac943c18260ffb979dbc2fd6e1279c613afd49
                                                                                                  • Instruction Fuzzy Hash: CC41E57564832ABAFB918B24CC00FBA77F8AB0E344F504557F959E7081EB70A9808E54
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • MakeForceCopyList() failed., xrefs: 6D0DC2EA
                                                                                                  • CSetup::CheckForceCopy, xrefs: 6D0DC26B, 6D0DC2C8, 6D0DC2F1
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp, xrefs: 6D0DC275, 6D0DC2FB
                                                                                                  • Unable to create path string, %s%s., xrefs: 6D0DC264
                                                                                                  • DX_FORCECOPY_FILE_TIMESTAMP, xrefs: 6D0DC287, 6D0DC28C, 6D0DC2B4
                                                                                                  • CheckForceCopy(): no file list in section, skip checking force copy., xrefs: 6D0DC30C
                                                                                                  • CheckForceCopy(): Unablt to get target file name from %s, skip it., xrefs: 6D0DC353
                                                                                                  • LoadListFromInfSection() failed., xrefs: 6D0DC2BF
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CompareString
                                                                                                  • String ID: CSetup::CheckForceCopy$CheckForceCopy(): Unablt to get target file name from %s, skip it.$CheckForceCopy(): no file list in section, skip checking force copy.$DX_FORCECOPY_FILE_TIMESTAMP$LoadListFromInfSection() failed.$MakeForceCopyList() failed.$Unable to create path string, %s%s.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
                                                                                                  • API String ID: 1825529933-3124809831
                                                                                                  • Opcode ID: 9a179587ca9e696808024cb1d1ad555a9951c8df3ec0730288de21196f385f7c
                                                                                                  • Instruction ID: 914aea5d5d1a4e48009da1f95904fc4d230ccff8f831ab6ce7aabe130ac89d82
                                                                                                  • Opcode Fuzzy Hash: 9a179587ca9e696808024cb1d1ad555a9951c8df3ec0730288de21196f385f7c
                                                                                                  • Instruction Fuzzy Hash: CA41B37164830ABEFB95DB64DC40FBA77E8AB0D314F554457E648A7081DBB0A9808FA8
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __get_wpgmptr.LIBCMT ref: 73AD2178
                                                                                                  • VirtualQuery.KERNEL32(?,?,0000001C), ref: 73AD21A3
                                                                                                  • GetSystemInfo.KERNEL32(?), ref: 73AD21BB
                                                                                                  • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 73AD21E4
                                                                                                  • GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 73AD21F4
                                                                                                  • VirtualAlloc.KERNEL32(?,?,00001000,00000004), ref: 73AD227B
                                                                                                  • VirtualProtect.KERNEL32(?,?,?,?), ref: 73AD228E
                                                                                                    • Part of subcall function 73AC9B83: OutputDebugStringA.KERNEL32(Invalid parameter passed to C runtime function.), ref: 73AC9C17
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Virtual$AddressAllocDebugHandleInfoModuleOutputProcProtectQueryStringSystem__get_wpgmptr
                                                                                                  • String ID: SetThreadStackGuarantee$kernel32.dll
                                                                                                  • API String ID: 2401657611-423161677
                                                                                                  • Opcode ID: ee625149895dfb2b54d7e70f4d217113523f18ebd5a79252c3e586664a581f35
                                                                                                  • Instruction ID: 850eb3abc00d32c8bb428f709f20c7cd16a9eaed7f49951cb1eb4bbc5ab6061f
                                                                                                  • Opcode Fuzzy Hash: ee625149895dfb2b54d7e70f4d217113523f18ebd5a79252c3e586664a581f35
                                                                                                  • Instruction Fuzzy Hash: 33415972E5020CAFDB01DBA5CD86BEEBBB9FF48300F14446AF516E6248E7359641DB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __get_wpgmptr.LIBCMT ref: 6D0EA1DC
                                                                                                  • VirtualQuery.KERNEL32(?,?,0000001C), ref: 6D0EA207
                                                                                                  • GetSystemInfo.KERNEL32(?), ref: 6D0EA21F
                                                                                                  • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 6D0EA248
                                                                                                  • GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 6D0EA258
                                                                                                  • VirtualAlloc.KERNEL32(?,?,00001000,00000004), ref: 6D0EA2DF
                                                                                                  • VirtualProtect.KERNEL32(?,?,?,?), ref: 6D0EA2F2
                                                                                                    • Part of subcall function 6D0E32D7: OutputDebugStringA.KERNEL32(Invalid parameter passed to C runtime function.), ref: 6D0E336B
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Virtual$AddressAllocDebugHandleInfoModuleOutputProcProtectQueryStringSystem__get_wpgmptr
                                                                                                  • String ID: SetThreadStackGuarantee$kernel32.dll
                                                                                                  • API String ID: 2401657611-423161677
                                                                                                  • Opcode ID: 2a1f2a1172b0b852ed05e1a24ee66038d635b584efb9ed49d6c0d5a60d824d2d
                                                                                                  • Instruction ID: 39a6e89498815a63a2ffc4c3d169f9498b5d0d29377b428752051ae271f7cd9d
                                                                                                  • Opcode Fuzzy Hash: 2a1f2a1172b0b852ed05e1a24ee66038d635b584efb9ed49d6c0d5a60d824d2d
                                                                                                  • Instruction Fuzzy Hash: 6A414A76E00209AFEF01DBA5C884FEEBBB9EB49395F204066F911E7141EB319645CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • _strrchr.LIBCMT ref: 6D0DB90E
                                                                                                  • GetDlgItem.USER32(?,00001770,00000402,?,00000000,?,00000000,?,?,6D0DB648,?), ref: 6D0DB936
                                                                                                  • SendMessageA.USER32(00000000,?,6D0DB648,?), ref: 6D0DB93D
                                                                                                  • SetDlgItemTextA.USER32(?,00000FA3,6D0D2B57,?,6D0DB648,?), ref: 6D0DB975
                                                                                                  • GetLastError.KERNEL32(Not fatal...,?,6D0DB648,?), ref: 6D0DB984
                                                                                                  Strings
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp, xrefs: 6D0DB99A
                                                                                                  • CSetup::UpdateProgress, xrefs: 6D0DB990
                                                                                                  • Not fatal..., xrefs: 6D0DB97F
                                                                                                  • SetDlgItemText(), xrefs: 6D0DB98B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Item$ErrorLastMessageSendText_strrchr
                                                                                                  • String ID: CSetup::UpdateProgress$Not fatal...$SetDlgItemText()$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
                                                                                                  • API String ID: 2316621201-1266400068
                                                                                                  • Opcode ID: a00a833da5425ab0fed92b9531a37ca303189b9a62400ba4f68cdb21cf20d1dd
                                                                                                  • Instruction ID: a628ea10cda8d29e0e06f43e61248924905780f400af05b46c8c8c34a624005c
                                                                                                  • Opcode Fuzzy Hash: a00a833da5425ab0fed92b9531a37ca303189b9a62400ba4f68cdb21cf20d1dd
                                                                                                  • Instruction Fuzzy Hash: 1C21A231304B866FEBA18E29CC85F7BB7B9EB86710B50040BF94AD7585DBB1E940C621
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                    • Part of subcall function 6D0D95AC: CreateFileA.KERNEL32(?,40000000,00000003,00000000,00000003,00000080,00000000), ref: 6D0D95C6
                                                                                                    • Part of subcall function 6D0D95AC: GetLastError.KERNEL32 ref: 6D0D95D1
                                                                                                  • RegOpenKeyExA.ADVAPI32(80000002,SYSTEM\CurrentControlSet\Control\Session Manager,00000000,00000002,?), ref: 6D0DCBDD
                                                                                                  • RegSetValueExA.ADVAPI32(?,AllowProtectedRenames,00000000,00000004,00000001,00000004), ref: 6D0DCBF9
                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 6D0DCC13
                                                                                                  Strings
                                                                                                  • CheckInUse(): RegSetValueEx() failed, error = %d., xrefs: 6D0DCC04
                                                                                                  • AllowProtectedRenames, xrefs: 6D0DCBF1
                                                                                                  • In use: %s., xrefs: 6D0DCBBF
                                                                                                  • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 6D0DCBD3
                                                                                                  • CheckInUse(): RegOpenKeyEx() failed, error = %d., xrefs: 6D0DCC26
                                                                                                  • CheckInUse(): RegCloseKey() failed, error = %d., xrefs: 6D0DCC1E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseCreateErrorFileLastOpenValue
                                                                                                  • String ID: AllowProtectedRenames$CheckInUse(): RegCloseKey() failed, error = %d.$CheckInUse(): RegOpenKeyEx() failed, error = %d.$CheckInUse(): RegSetValueEx() failed, error = %d.$In use: %s.$SYSTEM\CurrentControlSet\Control\Session Manager
                                                                                                  • API String ID: 1189079733-2090263386
                                                                                                  • Opcode ID: c5bd595b4de7e7d2aa07dfa1a9c019c31b58f2701ca616c0753f19072000c882
                                                                                                  • Instruction ID: d207d7fb3bbfc9b966a8070326378086076105230de3d48bdf81ea1a2474d74d
                                                                                                  • Opcode Fuzzy Hash: c5bd595b4de7e7d2aa07dfa1a9c019c31b58f2701ca616c0753f19072000c882
                                                                                                  • Instruction Fuzzy Hash: 1F118E71648308BEFB40AF609C06FBEBBA8DB48714F50442BFA04E70C1DFB199508A5D
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • _memset.LIBCMT ref: 00F13ED7
                                                                                                    • Part of subcall function 00F13DF6: GetFileVersionInfoSizeA.VERSION(?,?), ref: 00F13E07
                                                                                                    • Part of subcall function 00F13DF6: GetLastError.KERNEL32(?,?), ref: 00F13E1E
                                                                                                  • VerQueryValueW.VERSION(00000000,00F11794,?,?), ref: 00F13EFF
                                                                                                  • GetLastError.KERNEL32(00000000,00000000,00F11794,?,?), ref: 00F13F09
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast$FileInfoQuerySizeValueVersion_memset
                                                                                                  • String ID: 4$DXGetFileVersion$Data size mismatch.$VerQueryValue()$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
                                                                                                  • API String ID: 2833552196-926253235
                                                                                                  • Opcode ID: b2435d38fffaf7fc739fbcbafdd2b1f502eed70666fe9b56f6bf9edb1645ef2a
                                                                                                  • Instruction ID: 0d35c37f418d44e7e098855c8ac745147c2f194e27bea726d62a83033d9f63b0
                                                                                                  • Opcode Fuzzy Hash: b2435d38fffaf7fc739fbcbafdd2b1f502eed70666fe9b56f6bf9edb1645ef2a
                                                                                                  • Instruction Fuzzy Hash: BF01FE76744308BAE7053A649C87FEB362DE741BA4F204124FB05A81C1D6B5DFC5B551
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • _strrchr.LIBCMT ref: 6D0D6706
                                                                                                    • Part of subcall function 6D0D66CC: CompareStringA.KERNEL32(00000409,00000001,6D0D6892,000000FF,?,000000FF,?,6D0D6723,00000001,inf,6D0D6892,?,6D0D67C5,6D0D6892,6D0D6892,?), ref: 6D0D66E2
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CompareString_strrchr
                                                                                                  • String ID: chm$dls$fon$hlp$inf$ini$png$txt
                                                                                                  • API String ID: 987711976-1006119773
                                                                                                  • Opcode ID: 8ee9cf5213cab3c3533d7e2702396fbd8552a81c07bf9c81392155d0af603835
                                                                                                  • Instruction ID: 7743fda9365ce5bef94528f726192458d6f97fe413c1d4c01579defe0e11fb19
                                                                                                  • Opcode Fuzzy Hash: 8ee9cf5213cab3c3533d7e2702396fbd8552a81c07bf9c81392155d0af603835
                                                                                                  • Instruction Fuzzy Hash: 5B01BB65659B1F75F7C261725D40FBB39CC4F41294B82002BFA5DE209AEF09F20688EA
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • _strrchr.LIBCMT ref: 00F13D5B
                                                                                                    • Part of subcall function 00F13C10: CompareStringA.KERNEL32(00000409,00000001,?,000000FF,?,000000FF), ref: 00F13C26
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CompareString_strrchr
                                                                                                  • String ID: chm$dls$fon$hlp$inf$ini$png$txt
                                                                                                  • API String ID: 987711976-1006119773
                                                                                                  • Opcode ID: f5263c2fb8511d0fd840aaf2dc8571686421d8fca213591b963459ef8405cad9
                                                                                                  • Instruction ID: bb3d35f19077d80be175ed5f9b6ffdd5040c8dbb527a9ebc7a8d64f38a8ad037
                                                                                                  • Opcode Fuzzy Hash: f5263c2fb8511d0fd840aaf2dc8571686421d8fca213591b963459ef8405cad9
                                                                                                  • Instruction Fuzzy Hash: 4E01B62578576AB1AA2535336D0AEDB398D5D127E1B480431FB00F1086FA6BDBC1B4AE
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00000000,00000001,?), ref: 6D0D879F
                                                                                                  • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,00000000,?,?), ref: 6D0D87C2
                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 6D0D87FB
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CloseOpenQueryValue
                                                                                                  • String ID: CSDVersion$GetCSDVersion$RegOpenKeyEx()$RegQueryValueEx()$System\CurrentControlSet\Control\Windows$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h
                                                                                                  • API String ID: 3677997916-1259003528
                                                                                                  • Opcode ID: 7bda21a9e0b88ba49fc127f018674269c1bcc62db1abe4395738f17739f0a6d9
                                                                                                  • Instruction ID: 93f8409888170999740eb70c53b794e77317c8211eb670e1adf2fbfe1f7acaa5
                                                                                                  • Opcode Fuzzy Hash: 7bda21a9e0b88ba49fc127f018674269c1bcc62db1abe4395738f17739f0a6d9
                                                                                                  • Instruction Fuzzy Hash: FF015E71845318FBEBA0A7958C09FEE7E78EF15361F604243F519B10C5DB705600DAA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetStringTypeW.KERNEL32(00000001,6D0D4E80,00000001,?,?,?,00000000), ref: 6D0EB094
                                                                                                  • GetStringTypeW.KERNEL32(?,?,000000FF,?,?,?,00000000), ref: 6D0EB0CC
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: StringType
                                                                                                  • String ID:
                                                                                                  • API String ID: 4177115715-0
                                                                                                  • Opcode ID: e8b6613abb0b96a43c592d098b0df6d7d415e9823085d545ae260f9216b6129f
                                                                                                  • Instruction ID: 10aacb5080dde632d0ac432e6308d4b91e48f037be42610fe68ed68339033d5d
                                                                                                  • Opcode Fuzzy Hash: e8b6613abb0b96a43c592d098b0df6d7d415e9823085d545ae260f9216b6129f
                                                                                                  • Instruction Fuzzy Hash: F9619B3190430AEFEF118F95DC84BAE7BF5FF8A3A4B60455AEA2497260D730D950CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetCPInfo.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,?,?,73AD0C6A,00000001,?,00000000,?,?,?), ref: 73AD1FBA
                                                                                                  • GetCPInfo.KERNEL32(?,00000001,?,73AD0C6A,00000001,?), ref: 73AD1FD3
                                                                                                  • __alloca_probe_16.LIBCMT ref: 73AD2017
                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,73AD0C6A,00000000,00000000,?,73AD0C6A,00000001,?,00000000,?,?,?,?,00000000), ref: 73AD2037
                                                                                                  • _memset.LIBCMT ref: 73AD206F
                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,73AD0C6A,?,00000000,?,?,?,?,?,?,?,73AD0C6A,00000001,?), ref: 73AD2086
                                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,73AD0C6A), ref: 73AD20A1
                                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,73AD0C6A), ref: 73AD20C7
                                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,73AD0C6A), ref: 73AD20EC
                                                                                                  • __freea.LIBCMT ref: 73AD210E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ByteCharMultiWide$Info$__alloca_probe_16__freea_memset
                                                                                                  • String ID:
                                                                                                  • API String ID: 509433266-0
                                                                                                  • Opcode ID: 0ac259b3b599ff052d43b7e845ddc39fc461616f0a3edc520c6fbfdea24d6576
                                                                                                  • Instruction ID: 02651fb9aef462937b29a725c04b3f8c5544e098afbfa5b0328bb83711b7e3bb
                                                                                                  • Opcode Fuzzy Hash: 0ac259b3b599ff052d43b7e845ddc39fc461616f0a3edc520c6fbfdea24d6576
                                                                                                  • Instruction Fuzzy Hash: 04519D7291011DEFDF019F95DD82AEEBBBAEF08354F14802AF516A71A8D7319D42CB60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetStringTypeW.KERNEL32(00000001,73AC363C,00000001,?,?,?,00000000,?,?,?,73AD0C6A,00000001,?,00000000,?,?), ref: 73AD0AAA
                                                                                                  • GetLastError.KERNEL32(?,73AD0C6A,00000001,?,00000000,?,?,?,?,00000000,?,00000001,00000000,00000000,00000008,?), ref: 73AD0ABC
                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,00000000,?,?,?,73AD0C6A,00000001,?,00000000), ref: 73AD0B21
                                                                                                  • __alloca_probe_16.LIBCMT ref: 73AD0B42
                                                                                                  • _memset.LIBCMT ref: 73AD0B76
                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,?,00000000,00000000,00000000,?,?,00000000,?,00000001,00000000,00000000,00000008,?,00000000), ref: 73AD0B8B
                                                                                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 73AD0B99
                                                                                                  • __freea.LIBCMT ref: 73AD0BA3
                                                                                                  • ___ansicp.LIBCMT ref: 73AD0BCD
                                                                                                  • GetStringTypeA.KERNEL32(?,?,?,?,?,?,?,00000000,?,?,?,73AD0C6A,00000001,?,00000000,?), ref: 73AD0C0E
                                                                                                    • Part of subcall function 73AD1F6F: GetCPInfo.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,?,?,73AD0C6A,00000001,?,00000000,?,?,?), ref: 73AD1FBA
                                                                                                    • Part of subcall function 73AD1F6F: GetCPInfo.KERNEL32(?,00000001,?,73AD0C6A,00000001,?), ref: 73AD1FD3
                                                                                                    • Part of subcall function 73AD1F6F: __alloca_probe_16.LIBCMT ref: 73AD2017
                                                                                                    • Part of subcall function 73AD1F6F: _memset.LIBCMT ref: 73AD206F
                                                                                                    • Part of subcall function 73AD1F6F: MultiByteToWideChar.KERNEL32(?,00000001,?,73AD0C6A,?,00000000,?,?,?,?,?,?,?,73AD0C6A,00000001,?), ref: 73AD2086
                                                                                                    • Part of subcall function 73AD1F6F: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,73AD0C6A), ref: 73AD20A1
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ByteCharMultiWide$StringType$Info__alloca_probe_16_memset$ErrorLast___ansicp__freea
                                                                                                  • String ID:
                                                                                                  • API String ID: 2540555508-0
                                                                                                  • Opcode ID: 3781b06cff8f842930a30b9dbb4ecf34a57b74d0686c89829e6ffacb22151bd7
                                                                                                  • Instruction ID: d869970b526196ecbb931726b9ad8bd88b4ffcd39085bc140de2e408e8b4fb95
                                                                                                  • Opcode Fuzzy Hash: 3781b06cff8f842930a30b9dbb4ecf34a57b74d0686c89829e6ffacb22151bd7
                                                                                                  • Instruction Fuzzy Hash: DF51AE7251010AAFDF01DF65CC82BAA7BB9EB08258B14453BF916D72ACD734C9618BA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __set_error_mode.LIBCMT ref: 73ACCA61
                                                                                                  • __set_error_mode.LIBCMT ref: 73ACCA72
                                                                                                  • GetModuleFileNameA.KERNEL32(00000000,73AD59D1,00000104,00000000,00000000,00000000,?,73AC7C67,00000001,00000214), ref: 73ACCAD2
                                                                                                  • GetStdHandle.KERNEL32(000000F4,76ED5E70,00000000,00000000,00000003,00000003,?,73ACCBE6,000000FC,73ACB71D,?,73ACAD5E,00000018,73AD27E8,0000000C,73ACADF4), ref: 73ACCB7C
                                                                                                  • WriteFile.KERNEL32(00000000,?,?,00000000,00000000,?,73ACCBE6,000000FC,73ACB71D,?,73ACAD5E,00000018,73AD27E8,0000000C,73ACADF4,00000000), ref: 73ACCBAA
                                                                                                  Strings
                                                                                                  • Microsoft Visual C++ Runtime Library, xrefs: 73ACCB6A
                                                                                                  • <program name unknown>, xrefs: 73ACCADC
                                                                                                  • Runtime Error!Program: , xrefs: 73ACCA95
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File__set_error_mode$HandleModuleNameWrite
                                                                                                  • String ID: <program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                                                  • API String ID: 3248813247-385325454
                                                                                                  • Opcode ID: 715ed7337dca05e3edb877193704a4752f529cc9db559d9458eb30e05a18d97f
                                                                                                  • Instruction ID: 87a3e5b1ca0aeb6313f440985f43d4c95a6aafc983ad78da2d724358fffc7db5
                                                                                                  • Opcode Fuzzy Hash: 715ed7337dca05e3edb877193704a4752f529cc9db559d9458eb30e05a18d97f
                                                                                                  • Instruction Fuzzy Hash: A0314AF2A403807BEA0166A94D57F9F366C9B49154F18116FFC47622DEFA21C51381B6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __set_error_mode.LIBCMT ref: 6D0E7B27
                                                                                                  • __set_error_mode.LIBCMT ref: 6D0E7B38
                                                                                                  • GetModuleFileNameA.KERNEL32(00000000,6D0EEE81,00000104,00066BDB,6D0D7D8D), ref: 6D0E7B98
                                                                                                  • GetStdHandle.KERNEL32(000000F4,00000001,00066BCC,00000000,00000003,00000003,?,6D0E7CAC,000000FC,6D0E497D,6D0EB5E8,0000000C,6D0E4A3F,6D0D7D8D,00066BCC), ref: 6D0E7C42
                                                                                                  • WriteFile.KERNEL32(00000000,?,?,6D0D7D8D,00000000,?,6D0E7CAC,000000FC,6D0E497D,6D0EB5E8,0000000C,6D0E4A3F,6D0D7D8D,00066BCC,?,6D0E186F), ref: 6D0E7C70
                                                                                                  Strings
                                                                                                  • <program name unknown>, xrefs: 6D0E7BA2
                                                                                                  • Microsoft Visual C++ Runtime Library, xrefs: 6D0E7C30
                                                                                                  • Runtime Error!Program: , xrefs: 6D0E7B5B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File__set_error_mode$HandleModuleNameWrite
                                                                                                  • String ID: <program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                                                  • API String ID: 3248813247-385325454
                                                                                                  • Opcode ID: 78ad12af690426633e4d9169eeb46618f910cb9c7adc18a03f96ca2df32dbf47
                                                                                                  • Instruction ID: 7908a6383007ae279fc163333530123a9329cd085c31f0625938224c9faf67bb
                                                                                                  • Opcode Fuzzy Hash: 78ad12af690426633e4d9169eeb46618f910cb9c7adc18a03f96ca2df32dbf47
                                                                                                  • Instruction Fuzzy Hash: C63108B2E042167FFB011B758D45F7F76AC8BC67D9B060129FE15A3183FB22990185B2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __set_error_mode.LIBCMT ref: 00F18211
                                                                                                  • __set_error_mode.LIBCMT ref: 00F18222
                                                                                                  • GetModuleFileNameA.KERNEL32(00000000,00F29781,00000104,?,?,00000000), ref: 00F18282
                                                                                                  • GetStdHandle.KERNEL32(000000F4,76ED5E70,?,00000000,00000003,00000003,?,00F18396,000000FC,00F1B487,?,00F1DAE6,00000018,00F26328,0000000C,00F1DB7C), ref: 00F1832C
                                                                                                  • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,00F18396,000000FC,00F1B487,?,00F1DAE6,00000018,00F26328,0000000C,00F1DB7C,?), ref: 00F1835A
                                                                                                  Strings
                                                                                                  • Microsoft Visual C++ Runtime Library, xrefs: 00F1831A
                                                                                                  • Runtime Error!Program: , xrefs: 00F18245
                                                                                                  • <program name unknown>, xrefs: 00F1828C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: File__set_error_mode$HandleModuleNameWrite
                                                                                                  • String ID: <program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                                                  • API String ID: 3248813247-385325454
                                                                                                  • Opcode ID: 3e9d0eb6b31c887d5539986d3cb1c289ab7a0deb4ab4eca92a0fdf3f9f89de68
                                                                                                  • Instruction ID: a3016d02c83068b60e7520c7183953dcea57db5fbadff4d9ad285473564994a6
                                                                                                  • Opcode Fuzzy Hash: 3e9d0eb6b31c887d5539986d3cb1c289ab7a0deb4ab4eca92a0fdf3f9f89de68
                                                                                                  • Instruction Fuzzy Hash: DD315972E003557BEB2166685D46FEF725C9B52BA0F190028FC0163192FE75DAC7B1B2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • _realloc.LIBCMT ref: 6D0D8404
                                                                                                  • GetPrivateProfileSectionA.KERNEL32(?,00000000,-00000258,?,?,00000000), ref: 6D0D8419
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime$PrivateProfileSection_realloc_strrchr
                                                                                                  • String ID: LoadListFromInfSection$LoadListFromInfSection(): Unable to load %s - [%s].$Unable to allocate memory.$Unable to find %s$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h$realloc()
                                                                                                  • API String ID: 2994852080-3670691587
                                                                                                  • Opcode ID: cbf8931f4d81e6eea6f0bcc7da598524a478405bb8ed9f5b6847d0d4ebc1b48d
                                                                                                  • Instruction ID: 6e3c79f80ecc3bb0a625bec80da457413b3b10e3e1451f82dadb7c9a90758334
                                                                                                  • Opcode Fuzzy Hash: cbf8931f4d81e6eea6f0bcc7da598524a478405bb8ed9f5b6847d0d4ebc1b48d
                                                                                                  • Instruction Fuzzy Hash: CB11E67250C30A7FFB801F668C80F7A7BA9EF54358710442BFB4CA6182EF718810CAA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • _memset.LIBCMT ref: 00F16B43
                                                                                                  • GetFileVersionInfoSizeA.VERSION(?,00F16A7D,?,\comctl32.dll,?,00F16A7D,?,?), ref: 00F16B52
                                                                                                  • _memset.LIBCMT ref: 00F16B72
                                                                                                  • GetFileVersionInfoA.VERSION(?,00000000,00000000,00000000,00000000,?,00F16A7D,?,\comctl32.dll,?,00F16A7D,?,?), ref: 00F16B80
                                                                                                  • VerQueryValueA.VERSION(00000000,00F11310,?,?,?,00000000,00000000,00000000,00000000,?,00F16A7D,?,\comctl32.dll,?,00F16A7D,?), ref: 00F16B97
                                                                                                  • _memcpy_s.LIBCMT ref: 00F16BCB
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileInfoVersion_memset$QuerySizeValue_memcpy_s
                                                                                                  • String ID: 4$\comctl32.dll
                                                                                                  • API String ID: 59702410-3030107532
                                                                                                  • Opcode ID: 6cc8bb0cbab18c1faf9d5e502bef29026bb3399162f48deae44e00f0c884cf9a
                                                                                                  • Instruction ID: 17150bb6c64918f11425165d8e157563bf8349b7c1c7a2b91be149f2403f3fbc
                                                                                                  • Opcode Fuzzy Hash: 6cc8bb0cbab18c1faf9d5e502bef29026bb3399162f48deae44e00f0c884cf9a
                                                                                                  • Instruction Fuzzy Hash: 0611EC729081187EDF11F650AC86DFF3B7C9F817A4F104075F605E6041EA358E85F1A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • DirectXLoadString.DSETUP32(00001391,?,DirectXDeviceDriverSetupW()), ref: 73AC42BC
                                                                                                  • DirectXSetupCallback.DSETUP32(0000000A,00000010,?,00000000,00000000), ref: 73AC42D1
                                                                                                  • DestroyWindow.USER32(00000000), ref: 73AC42E1
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC42EC
                                                                                                    • Part of subcall function 73AC64D5: __wstrtime.LIBCMT ref: 73AC6506
                                                                                                    • Part of subcall function 73AC64D5: __wstrtime.LIBCMT ref: 73AC650F
                                                                                                    • Part of subcall function 73AC64D5: _strrchr.LIBCMT ref: 73AC6555
                                                                                                  Strings
                                                                                                  • DestroyWindow(), xrefs: 73AC42F3
                                                                                                  • DirectXDeviceDriverSetupW, xrefs: 73AC42F8
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c, xrefs: 73AC4302
                                                                                                  • DirectXDeviceDriverSetupW(), xrefs: 73AC4291
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Direct__wstrtime$CallbackDestroyErrorLastLoadSetupStringWindow_strrchr
                                                                                                  • String ID: DestroyWindow()$DirectXDeviceDriverSetupW$DirectXDeviceDriverSetupW()$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
                                                                                                  • API String ID: 3711049222-3655650028
                                                                                                  • Opcode ID: 04cd0943d5b80fd32fb9d339306aa518febd68d6236bb49a5815b67fd4adfcc8
                                                                                                  • Instruction ID: 8c108af86ad6c01422e98c1cee60fca723feb4d5a23ad787803d5861e4079427
                                                                                                  • Opcode Fuzzy Hash: 04cd0943d5b80fd32fb9d339306aa518febd68d6236bb49a5815b67fd4adfcc8
                                                                                                  • Instruction Fuzzy Hash: 6B11C6B26001146FE700EF65DD06FDD7BA8EB08711F100116F999EA289D7749952CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • DirectXLoadString.DSETUP32(00001391,?,DirectXDeviceDriverSetupA()), ref: 73AC4208
                                                                                                  • DirectXSetupCallback.DSETUP32(0000000A,00000010,?,00000000,00000000), ref: 73AC421D
                                                                                                  • DestroyWindow.USER32(00000000), ref: 73AC422D
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 73AC4238
                                                                                                    • Part of subcall function 73AC64D5: __wstrtime.LIBCMT ref: 73AC6506
                                                                                                    • Part of subcall function 73AC64D5: __wstrtime.LIBCMT ref: 73AC650F
                                                                                                    • Part of subcall function 73AC64D5: _strrchr.LIBCMT ref: 73AC6555
                                                                                                  Strings
                                                                                                  • DirectXDeviceDriverSetupA(), xrefs: 73AC41DD
                                                                                                  • DirectXDeviceDriverSetupA, xrefs: 73AC4244
                                                                                                  • DestroyWindow(), xrefs: 73AC423F
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c, xrefs: 73AC424E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Direct__wstrtime$CallbackDestroyErrorLastLoadSetupStringWindow_strrchr
                                                                                                  • String ID: DestroyWindow()$DirectXDeviceDriverSetupA$DirectXDeviceDriverSetupA()$e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c
                                                                                                  • API String ID: 3711049222-1816451749
                                                                                                  • Opcode ID: 7708ecced30f5f49fe6264cb87b52a73d67a05f778d77fead2bdd3c149621225
                                                                                                  • Instruction ID: 2ba5d6930e2efdf73865ccad3fe7f689d26c96d91ab6aac26f47f807e16195a8
                                                                                                  • Opcode Fuzzy Hash: 7708ecced30f5f49fe6264cb87b52a73d67a05f778d77fead2bdd3c149621225
                                                                                                  • Instruction Fuzzy Hash: 211186B6600114AFE700EF65DD07BDE7BA8EB08710F100116F999EA289D770DA518B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetModuleHandleA.KERNEL32(KERNEL32.DLL,73AD2740,0000000C,73AC7C90,00000000,00000000), ref: 73AC7B88
                                                                                                  • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 73AC7BB1
                                                                                                  • GetProcAddress.KERNEL32(?,DecodePointer), ref: 73AC7BC1
                                                                                                  • InterlockedIncrement.KERNEL32(73AD47D8), ref: 73AC7BE3
                                                                                                  • ___addlocaleref.LIBCMT ref: 73AC7C0A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressProc$HandleIncrementInterlockedModule___addlocaleref
                                                                                                  • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                                                                                  • API String ID: 1389861978-2843748187
                                                                                                  • Opcode ID: 55df4cce2ed72c65ee1da4e0fe442b7ed1f0ff354f08ed2d939872d27e210ad7
                                                                                                  • Instruction ID: acb2adf388707c1d66483583131c13c5f0b156c4995d7fee197fff619bcf46d4
                                                                                                  • Opcode Fuzzy Hash: 55df4cce2ed72c65ee1da4e0fe442b7ed1f0ff354f08ed2d939872d27e210ad7
                                                                                                  • Instruction Fuzzy Hash: 78115E71900745DFE7109F7AD906B9ABBE4FF05304F10451FD4AA9A7A8CB34E9018F60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetModuleHandleA.KERNEL32(KERNEL32.DLL,6D0EB4B8,0000000C,6D0E1467,00000000,00000000,?,?,6D0DFCAF,6D0D7D8D,?,?,6D0D770E,00066BDC), ref: 6D0E135F
                                                                                                  • GetProcAddress.KERNEL32(00000000,EncodePointer,?,?,6D0DFCAF,6D0D7D8D), ref: 6D0E1388
                                                                                                  • GetProcAddress.KERNEL32(?,DecodePointer,?,?,6D0DFCAF,6D0D7D8D), ref: 6D0E1398
                                                                                                  • InterlockedIncrement.KERNEL32(6D0ED950), ref: 6D0E13BA
                                                                                                  • ___addlocaleref.LIBCMT ref: 6D0E13E1
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressProc$HandleIncrementInterlockedModule___addlocaleref
                                                                                                  • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                                                                                  • API String ID: 1389861978-2843748187
                                                                                                  • Opcode ID: 3894ecabdb7168c3df16f851435eaaf0153d7224e5a41737911d43954b6eae59
                                                                                                  • Instruction ID: 698ab3c7a99ac3f7a3ec1a8b2c7d8572140b7d1123aae5752eb8c3f8f6dd6ea6
                                                                                                  • Opcode Fuzzy Hash: 3894ecabdb7168c3df16f851435eaaf0153d7224e5a41737911d43954b6eae59
                                                                                                  • Instruction Fuzzy Hash: 76114CB0804701AFE760DF39D844BAABBF0AF44354F01451AE9A997291DB74D900CB21
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetModuleHandleA.KERNEL32(KERNEL32.DLL,00F26140,0000000C,00F18F20,00000000,00000000,?,00F1988D,?,?,?,00000000), ref: 00F18E18
                                                                                                  • GetProcAddress.KERNEL32(00000000,EncodePointer,?,00F1988D,?,?,?,00000000), ref: 00F18E41
                                                                                                  • GetProcAddress.KERNEL32(?,DecodePointer,?,00F1988D,?,?,?,00000000), ref: 00F18E51
                                                                                                  • InterlockedIncrement.KERNEL32(00F285D0,?,00F1988D,?,?,?,00000000), ref: 00F18E73
                                                                                                  • ___addlocaleref.LIBCMT ref: 00F18E9A
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AddressProc$HandleIncrementInterlockedModule___addlocaleref
                                                                                                  • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                                                                                  • API String ID: 1389861978-2843748187
                                                                                                  • Opcode ID: 655c7c322384d695fc799af61c9a093207ea0665acffcbf8044d0d94b200d39e
                                                                                                  • Instruction ID: 1a7d475040bec5289f7f34a0ebdaeaaafb24bc442fd5b10431e81206a1476af8
                                                                                                  • Opcode Fuzzy Hash: 655c7c322384d695fc799af61c9a093207ea0665acffcbf8044d0d94b200d39e
                                                                                                  • Instruction Fuzzy Hash: 24119A708447459FD7209FB9DC02BDABBE0AF04310F00491EE59A93291DBB8E981AF11
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetCPInfo.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,?,?,6D0E9B1F,00000001,?,00000000,?,?,?), ref: 6D0EA01E
                                                                                                  • GetCPInfo.KERNEL32(?,00000001,?,6D0E9B1F,00000001,?), ref: 6D0EA037
                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,6D0E9B1F,00000000,00000000,?,6D0E9B1F,00000001,?,00000000,?,?,?,?,00000000), ref: 6D0EA09B
                                                                                                  • _memset.LIBCMT ref: 6D0EA0D3
                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,6D0E9B1F,?,00000000,?,?,?,?,?,?,?,6D0E9B1F,00000001,?), ref: 6D0EA0EA
                                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,6D0E9B1F), ref: 6D0EA105
                                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,6D0E9B1F), ref: 6D0EA12B
                                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,6D0E9B1F), ref: 6D0EA150
                                                                                                  • __freea.LIBCMT ref: 6D0EA172
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ByteCharMultiWide$Info$__freea_memset
                                                                                                  • String ID:
                                                                                                  • API String ID: 1700608584-0
                                                                                                  • Opcode ID: 7e7c2f445652b6c20f8a73814b877d6f9975b286a7655f7be4961b339f6b95cb
                                                                                                  • Instruction ID: 91ff0554db7154b725698fbeae47679f613293f289303bc4dca3cdb6a27d6f12
                                                                                                  • Opcode Fuzzy Hash: 7e7c2f445652b6c20f8a73814b877d6f9975b286a7655f7be4961b339f6b95cb
                                                                                                  • Instruction Fuzzy Hash: 55516C7190421AAFEF119F94DC80EEEBBF9EF493A4F21416AE924E7150D7319D41CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetCPInfo.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,?,?,00F20F03,00000001,?,00000000,?,?,?), ref: 00F2138E
                                                                                                  • GetCPInfo.KERNEL32(?,00000001,?,00F20F03,00000001,?), ref: 00F213A7
                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,00F20F03,00000000,00000000,?,00F20F03,00000001,?,00000000,?,?,?,?,00000000), ref: 00F2140B
                                                                                                  • _memset.LIBCMT ref: 00F21443
                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,00F20F03,?,00000000,?,?,?,?,?,?,?,00F20F03,00000001,?), ref: 00F2145A
                                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,00F20F03), ref: 00F21475
                                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,00F20F03), ref: 00F2149B
                                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,00F20F03), ref: 00F214C0
                                                                                                  • __freea.LIBCMT ref: 00F214E2
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ByteCharMultiWide$Info$__freea_memset
                                                                                                  • String ID:
                                                                                                  • API String ID: 1700608584-0
                                                                                                  • Opcode ID: 9c0ce62ce7ec11a79d8def32afc67e001f47a8e560699fd1261883481dc6dedb
                                                                                                  • Instruction ID: 2250d08dd7407556b7522b2862c875892d23653b2e0643da8b0a9b9153cb6621
                                                                                                  • Opcode Fuzzy Hash: 9c0ce62ce7ec11a79d8def32afc67e001f47a8e560699fd1261883481dc6dedb
                                                                                                  • Instruction Fuzzy Hash: F2518B72D0012DAFDF20EF95EC809EEBBBAFF19364B254129E518A7160C7359C41EB64
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetStringTypeW.KERNEL32(00000001,6D0D4E80,00000001,?,?,?,00000000,?,?,?,6D0E9B1F,00000001,?,00000000,?,?), ref: 6D0E995F
                                                                                                  • GetLastError.KERNEL32(?,6D0E9B1F,00000001,?,00000000,?,?,?,?,00000000,?,00000001,00000000,00000000,00000008,?), ref: 6D0E9971
                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,00000000,?,?,?,6D0E9B1F,00000001,?,00000000), ref: 6D0E99D6
                                                                                                  • _memset.LIBCMT ref: 6D0E9A2B
                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,?,00000000,00000000,00000000,?,?,00000000,?,00000001,00000000,00000000,00000008,?,00000000), ref: 6D0E9A40
                                                                                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 6D0E9A4E
                                                                                                  • __freea.LIBCMT ref: 6D0E9A58
                                                                                                  • ___ansicp.LIBCMT ref: 6D0E9A82
                                                                                                  • GetStringTypeA.KERNEL32(?,?,?,?,?,?,?,00000000,?,?,?,6D0E9B1F,00000001,?,00000000,?), ref: 6D0E9AC3
                                                                                                    • Part of subcall function 6D0E9FD3: GetCPInfo.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,?,?,6D0E9B1F,00000001,?,00000000,?,?,?), ref: 6D0EA01E
                                                                                                    • Part of subcall function 6D0E9FD3: GetCPInfo.KERNEL32(?,00000001,?,6D0E9B1F,00000001,?), ref: 6D0EA037
                                                                                                    • Part of subcall function 6D0E9FD3: _memset.LIBCMT ref: 6D0EA0D3
                                                                                                    • Part of subcall function 6D0E9FD3: MultiByteToWideChar.KERNEL32(?,00000001,?,6D0E9B1F,?,00000000,?,?,?,?,?,?,?,6D0E9B1F,00000001,?), ref: 6D0EA0EA
                                                                                                    • Part of subcall function 6D0E9FD3: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,6D0E9B1F), ref: 6D0EA105
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ByteCharMultiWide$StringType$Info_memset$ErrorLast___ansicp__freea
                                                                                                  • String ID:
                                                                                                  • API String ID: 3793715485-0
                                                                                                  • Opcode ID: 69bdeecf24b1770bfbd6693fcf119e9d38731389ea08a25ddeab524f5a1f0ed6
                                                                                                  • Instruction ID: 78985b63e30bd3057f676ee99e738b0ead34782854ff9f2bb83edb7e22245e6b
                                                                                                  • Opcode Fuzzy Hash: 69bdeecf24b1770bfbd6693fcf119e9d38731389ea08a25ddeab524f5a1f0ed6
                                                                                                  • Instruction Fuzzy Hash: 2B514A7150421AAFEF108F9AEC80AEE7BF9EF49394B15442AFA24D7150DB30C9608BD1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetStringTypeW.KERNEL32(00000001,00F12A18,00000001,?,?,?,00000000,?,?,?,00F20F03,00000001,?,00000000,?,?), ref: 00F20D43
                                                                                                  • GetLastError.KERNEL32(?,00F20F03,00000001,?,00000000,?,?,?,?,00000000,?,00000001,00000000,00000000,00000008,?), ref: 00F20D55
                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,00000000,?,?,?,00F20F03,00000001,?,00000000), ref: 00F20DBA
                                                                                                  • _memset.LIBCMT ref: 00F20E0F
                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,?,00000000,00000000,00000000,?,?,00000000,?,00000001,00000000,00000000,00000008,?,00000000), ref: 00F20E24
                                                                                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00F20E32
                                                                                                  • __freea.LIBCMT ref: 00F20E3C
                                                                                                  • ___ansicp.LIBCMT ref: 00F20E66
                                                                                                  • GetStringTypeA.KERNEL32(?,?,?,?,?,?,?,00000000,?,?,?,00F20F03,00000001,?,00000000,?), ref: 00F20EA7
                                                                                                    • Part of subcall function 00F21343: GetCPInfo.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,?,?,00F20F03,00000001,?,00000000,?,?,?), ref: 00F2138E
                                                                                                    • Part of subcall function 00F21343: GetCPInfo.KERNEL32(?,00000001,?,00F20F03,00000001,?), ref: 00F213A7
                                                                                                    • Part of subcall function 00F21343: _memset.LIBCMT ref: 00F21443
                                                                                                    • Part of subcall function 00F21343: MultiByteToWideChar.KERNEL32(?,00000001,?,00F20F03,?,00000000,?,?,?,?,?,?,?,00F20F03,00000001,?), ref: 00F2145A
                                                                                                    • Part of subcall function 00F21343: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,00F20F03), ref: 00F21475
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ByteCharMultiWide$StringType$Info_memset$ErrorLast___ansicp__freea
                                                                                                  • String ID:
                                                                                                  • API String ID: 3793715485-0
                                                                                                  • Opcode ID: 9ccf3efe52100a9e23522b6122bdec6073b81d1e717fb53fbaae6706ccf622ea
                                                                                                  • Instruction ID: ae8e23cec08d4b9f5ad43bae2428c313c64e8c212c1c5a4e81a47e5ffba16719
                                                                                                  • Opcode Fuzzy Hash: 9ccf3efe52100a9e23522b6122bdec6073b81d1e717fb53fbaae6706ccf622ea
                                                                                                  • Instruction Fuzzy Hash: 1751A67390012AEFDF209F54EC819AE7BA9FB04360B154425F915D7162DB34DD90EB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _strnlen
                                                                                                  • String ID: , $Invalid parameger.$MakeForceCopyList$MakeForceCopyList(): Unable to get file name.$Unable to allocate memory block.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h
                                                                                                  • API String ID: 263284996-911860730
                                                                                                  • Opcode ID: c2d2df1178e42f39dc7dca176338f1ec9bc26adbc44db8a4892e80c87f3e17b6
                                                                                                  • Instruction ID: 8263ef542950e6cbaafd7746e816a7aa20ef954955dd1c2d570b3d1b3be91bb9
                                                                                                  • Opcode Fuzzy Hash: c2d2df1178e42f39dc7dca176338f1ec9bc26adbc44db8a4892e80c87f3e17b6
                                                                                                  • Instruction Fuzzy Hash: 0F313471908306BEF7A09F65AD50F6B7BE8EF45350F50842BEA48EB181EBB0D50087A4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetSystemDirectoryA.KERNEL32(?,00000104,00000000), ref: 00F15B38
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DirectorySystem
                                                                                                  • String ID: DXGetFileVersion() failed.$FRunningOnWinXP$GetSystemDirectory()$\ntkrnlpa.exe$e:\bt\382730\setup\deliverables\dxsetup\psheets.h
                                                                                                  • API String ID: 2188284642-4260967288
                                                                                                  • Opcode ID: 71ba8b6a7e51be00b241b3676db566e6960ce756301617f3294b0b41b2ad154b
                                                                                                  • Instruction ID: 7cebcfa48c220e9ffeb2ee0a104c09734cfb53d47bbd9358ff14a331484aab68
                                                                                                  • Opcode Fuzzy Hash: 71ba8b6a7e51be00b241b3676db566e6960ce756301617f3294b0b41b2ad154b
                                                                                                  • Instruction Fuzzy Hash: 3B210571E09628EBDB60D7758C05FDB36ACEF89B90F400165B545E3080DAB8DAC5FBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • _realloc.LIBCMT ref: 6D0DAEE6
                                                                                                  • GetPrivateProfileSectionNamesA.KERNEL32(00000000,-00000258,?,?,?,00000000), ref: 6D0DAEF8
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime$NamesPrivateProfileSection_realloc_strrchr
                                                                                                  • String ID: GetSectionNamesFromInf$GetSectionNamesFromInf(): Unable to get section names from %s.$Unable to find %s$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h$realloc()
                                                                                                  • API String ID: 14898424-1451593648
                                                                                                  • Opcode ID: ca35622b5f5f70775f89a04e73f6cf9321478a847554a826855d9a3de71aec72
                                                                                                  • Instruction ID: bb81260ccc5a806696f63d55d1aacfeade337bd861b508110362b52389ab2ccc
                                                                                                  • Opcode Fuzzy Hash: ca35622b5f5f70775f89a04e73f6cf9321478a847554a826855d9a3de71aec72
                                                                                                  • Instruction Fuzzy Hash: 2F11B2B250C3097EFB901EA69C80F7A3BA9EF64368720092BFA5892181EB7198504665
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetSystemDirectoryA.KERNEL32(?,00000104,?,00000000), ref: 6D0D6FD8
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DirectorySystem
                                                                                                  • String ID: DXGetFileVersion() failed.$FRunningOnLH$GetSystemDirectory()$\ntkrnlpa.exe$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h
                                                                                                  • API String ID: 2188284642-910728970
                                                                                                  • Opcode ID: c349a3f49b0fa12fef0486227a172690d6527397353e4d34b5e72d4145460674
                                                                                                  • Instruction ID: 6db3c5be0334288d63db0a59a09c67b698ddd7a765f6d09f6797bae6a9fbabda
                                                                                                  • Opcode Fuzzy Hash: c349a3f49b0fa12fef0486227a172690d6527397353e4d34b5e72d4145460674
                                                                                                  • Instruction Fuzzy Hash: 31219071A04309ABFB90DB758C44FEE76BCDB89714F404067B50AE30C1DF70D6858AA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetSystemDirectoryA.KERNEL32(?,00000104,00000000), ref: 00F15C35
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DirectorySystem
                                                                                                  • String ID: DXGetFileVersion() failed.$FRunningOnNETServer$GetSystemDirectory()$\ntkrnlpa.exe$e:\bt\382730\setup\deliverables\dxsetup\psheets.h
                                                                                                  • API String ID: 2188284642-1925970428
                                                                                                  • Opcode ID: 163f3f682785ace675aff8458b92a7dc30cec1bf195c0be94f1a1879365eaa73
                                                                                                  • Instruction ID: ac46be3e0699bd763612f3a5c945e181a49f559531e222768f2cf9502838b0fe
                                                                                                  • Opcode Fuzzy Hash: 163f3f682785ace675aff8458b92a7dc30cec1bf195c0be94f1a1879365eaa73
                                                                                                  • Instruction Fuzzy Hash: CE11B472A41728ABC760DBB59C45FDB76ACAB48B50F000165B505E3180DBB8DAC5FBD1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetVersionExA.KERNEL32(?), ref: 6D0D695B
                                                                                                  • LoadLibraryA.KERNEL32(ntdll.dll), ref: 6D0D6979
                                                                                                  • GetProcAddress.KERNEL32(00000000,NtQueryInformationProcess,00000000), ref: 6D0D698C
                                                                                                  • GetCurrentProcess.KERNEL32(0000001A,00000000,00000004,00000000), ref: 6D0D69AC
                                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 6D0D69CD
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Library$AddressCurrentFreeLoadProcProcessVersion
                                                                                                  • String ID: NtQueryInformationProcess$ntdll.dll
                                                                                                  • API String ID: 3451282406-2906145389
                                                                                                  • Opcode ID: 4ceb5a7a4395985d3c9cb977b58e106a485a7d5f024fb080dc244cd0d157d618
                                                                                                  • Instruction ID: 1450030e0d1d919c3f38b293b29b197a34094c3440aba066cb55ba760e04855b
                                                                                                  • Opcode Fuzzy Hash: 4ceb5a7a4395985d3c9cb977b58e106a485a7d5f024fb080dc244cd0d157d618
                                                                                                  • Instruction Fuzzy Hash: FE218131A0131ADBEB90CF38C849BAEB7F9AB86725F500167E519D21D2DBB08945CF91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LoadStringA.USER32(00000064,?,00000104), ref: 00F145BD
                                                                                                  • GetLastError.KERNEL32(00000000), ref: 00F145C8
                                                                                                  • MessageBoxA.USER32(00000000,?,?,?), ref: 00F14609
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLastLoadMessageString
                                                                                                  • String ID: DSetupCallback$DirectX Setup$LoadString()$e:\bt\382730\setup\deliverables\dxsetup\dxsetup.cpp
                                                                                                  • API String ID: 2128103774-4186389697
                                                                                                  • Opcode ID: 334817ed147b5b408065b1bfa695f3c1e97c314ab07960790dea018a58c77505
                                                                                                  • Instruction ID: 0107a02f31d9a11a132f12ef40d8e10187d96774cb28fba9d77d1c514694e5a0
                                                                                                  • Opcode Fuzzy Hash: 334817ed147b5b408065b1bfa695f3c1e97c314ab07960790dea018a58c77505
                                                                                                  • Instruction Fuzzy Hash: CC11A37190020CBBDB109B14DC41DFAB7ADFBC9B14F544125B655E2041DAB599C5BF21
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetParent.USER32(?,0000046B,00000000,00000000), ref: 00F155CC
                                                                                                  • PostMessageA.USER32(00000000,?,0000046B,00000000,00000000), ref: 00F155D3
                                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0000554D,?,00000000,?), ref: 00F155E6
                                                                                                  • GetLastError.KERNEL32(00000000,?,00000000,?), ref: 00F155F4
                                                                                                  Strings
                                                                                                  • CreateThread(), xrefs: 00F155FB
                                                                                                  • CDXWSetup::Install, xrefs: 00F15600
                                                                                                  • e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp, xrefs: 00F1560A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateErrorLastMessageParentPostThread
                                                                                                  • String ID: CDXWSetup::Install$CreateThread()$e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp
                                                                                                  • API String ID: 3016392610-3077047923
                                                                                                  • Opcode ID: 7c17c40d031896c7a5d3cb95d4127feeb344fcc4b854cbee6c57ec2abb41e7e8
                                                                                                  • Instruction ID: ace79520531ffafa8324bf9f99721b57161b423e05cd9da8296011e4e2413362
                                                                                                  • Opcode Fuzzy Hash: 7c17c40d031896c7a5d3cb95d4127feeb344fcc4b854cbee6c57ec2abb41e7e8
                                                                                                  • Instruction Fuzzy Hash: 9EF02B72A50244BFD71067629C0DCF73A7EF7C6F217144818B702E2040E6A0C982F6B1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                    • Part of subcall function 6D0D67A1: GetFileVersionInfoSizeA.VERSION(6D0D6892,?,\ntkrnlpa.exe,00000104,00000000,?,?,6D0D6892,?,?,?,00000000), ref: 6D0D67B2
                                                                                                    • Part of subcall function 6D0D67A1: GetLastError.KERNEL32(6D0D6892,6D0D6892,?,\ntkrnlpa.exe,00000104,00000000,?,?,6D0D6892,?,?,?,00000000), ref: 6D0D67C9
                                                                                                  • VerQueryValueW.VERSION(00000000,\VarFileInfo\Translation,?,?,?), ref: 6D0D9558
                                                                                                  • GetLastError.KERNEL32(Unable to get Translation valie.,00000000,\VarFileInfo\Translation,?,?,?), ref: 6D0D9566
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  Strings
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h, xrefs: 6D0D957C
                                                                                                  • GetLangCodePage, xrefs: 6D0D9572
                                                                                                  • Unable to get Translation valie., xrefs: 6D0D9561
                                                                                                  • VerQueryValue(), xrefs: 6D0D956D
                                                                                                  • \VarFileInfo\Translation, xrefs: 6D0D9552
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ErrorLast__wstrtime$FileInfoQuerySizeValueVersion_strrchr
                                                                                                  • String ID: GetLangCodePage$Unable to get Translation valie.$VerQueryValue()$\VarFileInfo\Translation$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
                                                                                                  • API String ID: 2263350259-635172172
                                                                                                  • Opcode ID: aee127e5379f8d85c8e0f269aeb7558123cdba9d55794751cc3043589eb6e1d9
                                                                                                  • Instruction ID: 27d2c483188e6972b6aa72ad1bed109c55a95a35e0e00c676df2b6c08866b54b
                                                                                                  • Opcode Fuzzy Hash: aee127e5379f8d85c8e0f269aeb7558123cdba9d55794751cc3043589eb6e1d9
                                                                                                  • Instruction Fuzzy Hash: 14F04F76604314BAB7A19A66DC54FEF3AACDFCA3547414123FE09DB141EF30EA418BA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetStartupInfoA.KERNEL32(?,00F26120,00000054,00F16FA0), ref: 00F18A7A
                                                                                                    • Part of subcall function 00F1E40D: __calloc_impl.LIBCMT ref: 00F1E422
                                                                                                  • GetFileType.KERNEL32(00000024), ref: 00F18B88
                                                                                                  • ___crtInitCritSecAndSpinCount.LIBCMT ref: 00F18BBC
                                                                                                  • GetStdHandle.KERNEL32(-000000F6), ref: 00F18C13
                                                                                                  • GetFileType.KERNEL32(00000000), ref: 00F18C25
                                                                                                  • ___crtInitCritSecAndSpinCount.LIBCMT ref: 00F18C53
                                                                                                  • SetHandleCount.KERNEL32 ref: 00F18C7E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Count$CritFileHandleInitSpinType___crt$InfoStartup__calloc_impl
                                                                                                  • String ID:
                                                                                                  • API String ID: 3691444693-0
                                                                                                  • Opcode ID: 64258c579f7b0f78a97b106488500845877afd4e5f413f2d41b995f15faac3d3
                                                                                                  • Instruction ID: 43edca4d81b1473172ee6b301aafb0c2e42a2811867d39af4b7953ed7201d480
                                                                                                  • Opcode Fuzzy Hash: 64258c579f7b0f78a97b106488500845877afd4e5f413f2d41b995f15faac3d3
                                                                                                  • Instruction Fuzzy Hash: 7C6129719083458FC724CB28CD88799BBE0AF42774F398759D9629B2E1CB34D887EB51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: String___crt$InfoType_memset
                                                                                                  • String ID:
                                                                                                  • API String ID: 406800760-3916222277
                                                                                                  • Opcode ID: 12905adf671d15041a6ef8f826329415a27fc2bf5afd39f45b7a551518ffa9b0
                                                                                                  • Instruction ID: 82071dfb5a4da7cee7f447fa57f8d8fffad01640e65deb14dee476ea1a451b15
                                                                                                  • Opcode Fuzzy Hash: 12905adf671d15041a6ef8f826329415a27fc2bf5afd39f45b7a551518ffa9b0
                                                                                                  • Instruction Fuzzy Hash: A041E37250079C5EEB228B248D86BFB7BF8AB05708F1844EED58B8618AD275DA458F50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: String___crt$InfoType_memset
                                                                                                  • String ID:
                                                                                                  • API String ID: 406800760-3916222277
                                                                                                  • Opcode ID: 81dbb4228361c6e7e3dcf8503c73de9980805d89b88f1af12f90f0b6a0445266
                                                                                                  • Instruction ID: d362fb48f3cf6f730c8f32a9af56c5766c2904abf1dabbbfd5c6c79950137584
                                                                                                  • Opcode Fuzzy Hash: 81dbb4228361c6e7e3dcf8503c73de9980805d89b88f1af12f90f0b6a0445266
                                                                                                  • Instruction Fuzzy Hash: 924116781047AC9EFB228B24DC88BFB7BFCAB45748F1448ECD5DA87082D2719A558F50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: String___crt$InfoType_memset
                                                                                                  • String ID:
                                                                                                  • API String ID: 406800760-3916222277
                                                                                                  • Opcode ID: 5d4ecc054f8e32c86a8b06bbbdc48d7e5e97b8299a22faaf95fd1cf414b91f18
                                                                                                  • Instruction ID: 410ee5ce781454f552400ba475710217291bc7b409bc9cefc8bde717fe038c8a
                                                                                                  • Opcode Fuzzy Hash: 5d4ecc054f8e32c86a8b06bbbdc48d7e5e97b8299a22faaf95fd1cf414b91f18
                                                                                                  • Instruction Fuzzy Hash: 1C41267150479CDEDB318B28CC85FFB7BF8AF45704F1444E8E58A86082D6759A85AF90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CharLowerA.USER32(?), ref: 6D0DBA17
                                                                                                  • _strrchr.LIBCMT ref: 6D0DBA31
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  Strings
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp, xrefs: 6D0DBA64
                                                                                                  • Unable to create path string, %s%s., xrefs: 6D0DBA53
                                                                                                  • \directx\setup\, xrefs: 6D0DBA1D
                                                                                                  • CSetup::CheckProgramFiles, xrefs: 6D0DBA5A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime_strrchr$CharLower
                                                                                                  • String ID: CSetup::CheckProgramFiles$Unable to create path string, %s%s.$\directx\setup\$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
                                                                                                  • API String ID: 3410477431-2052294242
                                                                                                  • Opcode ID: 1a38b69f62a4a287d0fafe27e7960c9f69f56ea6f8b92c8d8ce50cfa0f4aca0a
                                                                                                  • Instruction ID: 0229bcfc9a6de5d60ba5bb8d515f4775a2bf8947aeb221151305b2d9ae23cb01
                                                                                                  • Opcode Fuzzy Hash: 1a38b69f62a4a287d0fafe27e7960c9f69f56ea6f8b92c8d8ce50cfa0f4aca0a
                                                                                                  • Instruction Fuzzy Hash: 4FF0F67764C30379F3A4617F9C44FB72AECCBC6265B520027BA1DE2182EE35D40140B4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • TlsGetValue.KERNEL32(?,?,73AC7B21), ref: 73AC7A9F
                                                                                                  • TlsGetValue.KERNEL32(00000006,?,73AC7B21), ref: 73AC7AB6
                                                                                                  • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,73AC7B21), ref: 73AC7ACB
                                                                                                  • GetProcAddress.KERNEL32(00000000,DecodePointer,?,73AC7B21), ref: 73AC7ADB
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value$AddressHandleModuleProc
                                                                                                  • String ID: DecodePointer$KERNEL32.DLL
                                                                                                  • API String ID: 1929421221-629428536
                                                                                                  • Opcode ID: 65476528081a097e6213f88650c891922420831624230faf824584e3bf9f93c0
                                                                                                  • Instruction ID: 6c1c08b7b3cd4b523598e810d4837b070b1a52814ec2b5ce4ad024cea7f76176
                                                                                                  • Opcode Fuzzy Hash: 65476528081a097e6213f88650c891922420831624230faf824584e3bf9f93c0
                                                                                                  • Instruction Fuzzy Hash: 0BF03631200155EF8B00AB66DD47F963BA8EB442917184166F82ED6198DB37DA118AA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • TlsGetValue.KERNEL32(73AD59B8,?,73AC7A86,00000000,73AD03F0,00000314,73AD59B8,00000000,?,?,?,?,73ACCB75,73AD59B8,Microsoft Visual C++ Runtime Library,00012010), ref: 73AC7A26
                                                                                                  • TlsGetValue.KERNEL32(00000006,?,73AC7A86,00000000,73AD03F0,00000314,73AD59B8,00000000,?,?,?,?,73ACCB75,73AD59B8,Microsoft Visual C++ Runtime Library,00012010), ref: 73AC7A3D
                                                                                                  • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,73AC7A86,00000000,73AD03F0,00000314,73AD59B8,00000000,?,?,?,?,73ACCB75,73AD59B8,Microsoft Visual C++ Runtime Library,00012010), ref: 73AC7A52
                                                                                                  • GetProcAddress.KERNEL32(00000000,EncodePointer,?,73AC7A86,00000000,73AD03F0,00000314,73AD59B8,00000000,?,?,?,?,73ACCB75,73AD59B8,Microsoft Visual C++ Runtime Library), ref: 73AC7A62
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value$AddressHandleModuleProc
                                                                                                  • String ID: EncodePointer$KERNEL32.DLL
                                                                                                  • API String ID: 1929421221-3682587211
                                                                                                  • Opcode ID: a774e07bd17f4fda30e6a6f69b3072d05f434936bb50b1f3141fd00654c1e600
                                                                                                  • Instruction ID: 2e72c0b85b57692ec34b1618f387dc9347aed33fe650931dc26c434013ea4f47
                                                                                                  • Opcode Fuzzy Hash: a774e07bd17f4fda30e6a6f69b3072d05f434936bb50b1f3141fd00654c1e600
                                                                                                  • Instruction Fuzzy Hash: 3CF03031200195EFDB00AB7AED07FA53BA8EB442517254166F82ED7198DF33DA528AA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • TlsGetValue.KERNEL32(6D0E808E,?,6D0E8118,6D0E808E,00000014,6D0E49D9,00000000,00000FA0,6D0EB5E8,0000000C,6D0E4A3F,6D0D7D8D,00066BCC,?,6D0E186F,00000004), ref: 6D0E11FD
                                                                                                  • TlsGetValue.KERNEL32(00000007,?,6D0E8118,6D0E808E,00000014,6D0E49D9,00000000,00000FA0,6D0EB5E8,0000000C,6D0E4A3F,6D0D7D8D,00066BCC,?,6D0E186F,00000004), ref: 6D0E1214
                                                                                                  • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,6D0E8118,6D0E808E,00000014,6D0E49D9,00000000,00000FA0,6D0EB5E8,0000000C,6D0E4A3F,6D0D7D8D,00066BCC,?,6D0E186F,00000004), ref: 6D0E1229
                                                                                                  • GetProcAddress.KERNEL32(00000000,EncodePointer,?,6D0E8118,6D0E808E,00000014,6D0E49D9,00000000,00000FA0,6D0EB5E8,0000000C,6D0E4A3F,6D0D7D8D,00066BCC,?,6D0E186F), ref: 6D0E1239
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value$AddressHandleModuleProc
                                                                                                  • String ID: EncodePointer$KERNEL32.DLL
                                                                                                  • API String ID: 1929421221-3682587211
                                                                                                  • Opcode ID: 54ade16865038947e80cc1810b407f1fdb408f8318a77a1943441a54597b2b43
                                                                                                  • Instruction ID: 768fad786d69ede6d49c3924ac2964931b01e69941c171d0892232f1142ad677
                                                                                                  • Opcode Fuzzy Hash: 54ade16865038947e80cc1810b407f1fdb408f8318a77a1943441a54597b2b43
                                                                                                  • Instruction Fuzzy Hash: 7AF03030600146EFEF41AF65DC44BF93FF9EB856903014126F828D31A1DB31D821CA62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • TlsGetValue.KERNEL32(6D0D7D8D,?,6D0E41C6,?,6D0E418C,6D0D7D8D,?,?,6D0DFCAF,6D0D7D8D,?,?,6D0D770E,00066BDC), ref: 6D0E1276
                                                                                                  • TlsGetValue.KERNEL32(00000007,?,6D0E41C6,?,6D0E418C,6D0D7D8D,?,?,6D0DFCAF,6D0D7D8D,?,?,6D0D770E,00066BDC), ref: 6D0E128D
                                                                                                  • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,6D0E41C6,?,6D0E418C,6D0D7D8D,?,?,6D0DFCAF,6D0D7D8D,?,?,6D0D770E,00066BDC), ref: 6D0E12A2
                                                                                                  • GetProcAddress.KERNEL32(00000000,DecodePointer,?,6D0E41C6,?,6D0E418C,6D0D7D8D,?,?,6D0DFCAF,6D0D7D8D,?,?,6D0D770E,00066BDC), ref: 6D0E12B2
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value$AddressHandleModuleProc
                                                                                                  • String ID: DecodePointer$KERNEL32.DLL
                                                                                                  • API String ID: 1929421221-629428536
                                                                                                  • Opcode ID: 53db7eed6e5601b23f76f5719cf69a1dbde6ce97b72ab6dd10a5c68175aa9dfc
                                                                                                  • Instruction ID: 03e9db425c7f0e7aae66ef45fe264b15467d4f489c52e60c204b19b744198c3c
                                                                                                  • Opcode Fuzzy Hash: 53db7eed6e5601b23f76f5719cf69a1dbde6ce97b72ab6dd10a5c68175aa9dfc
                                                                                                  • Instruction Fuzzy Hash: 12F0363064010AAFFF415F69CC44FF93FF8EB816A07104126F82CD3191DB31D8119AA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • TlsGetValue.KERNEL32(00F29768,?,00F18D16,00000000,00F1E017,00000314,00F29768,00000000,?,?,?,?,00F18325,00F29768,Microsoft Visual C++ Runtime Library,00012010), ref: 00F18CB6
                                                                                                  • TlsGetValue.KERNEL32(00000005,?,00F18D16,00000000,00F1E017,00000314,00F29768,00000000,?,?,?,?,00F18325,00F29768,Microsoft Visual C++ Runtime Library,00012010), ref: 00F18CCD
                                                                                                  • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,00F18D16,00000000,00F1E017,00000314,00F29768,00000000,?,?,?,?,00F18325,00F29768,Microsoft Visual C++ Runtime Library,00012010), ref: 00F18CE2
                                                                                                  • GetProcAddress.KERNEL32(00000000,EncodePointer,?,00F18D16,00000000,00F1E017,00000314,00F29768,00000000,?,?,?,?,00F18325,00F29768,Microsoft Visual C++ Runtime Library), ref: 00F18CF2
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value$AddressHandleModuleProc
                                                                                                  • String ID: EncodePointer$KERNEL32.DLL
                                                                                                  • API String ID: 1929421221-3682587211
                                                                                                  • Opcode ID: 99d7686402f847ecb3dfe7fe0dab2370977aaebe94683092e5d3e85118679b90
                                                                                                  • Instruction ID: 917f93cf1b3829b8c7971c633e1e5524df658fd715f067c719ba42e7d1d8b95e
                                                                                                  • Opcode Fuzzy Hash: 99d7686402f847ecb3dfe7fe0dab2370977aaebe94683092e5d3e85118679b90
                                                                                                  • Instruction Fuzzy Hash: 8AF03630A4120AABDB505B65DD44DD63A69EB403F47154121B919D21E0DF31DC93FAA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • TlsGetValue.KERNEL32(?,?,00F18DB1,?,00F1988D,?,?,?,00000000), ref: 00F18D2F
                                                                                                  • TlsGetValue.KERNEL32(00000005,?,00F18DB1,?,00F1988D,?,?,?,00000000), ref: 00F18D46
                                                                                                  • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,00F18DB1,?,00F1988D,?,?,?,00000000), ref: 00F18D5B
                                                                                                  • GetProcAddress.KERNEL32(00000000,DecodePointer,?,00F18DB1,?,00F1988D,?,?,?,00000000), ref: 00F18D6B
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value$AddressHandleModuleProc
                                                                                                  • String ID: DecodePointer$KERNEL32.DLL
                                                                                                  • API String ID: 1929421221-629428536
                                                                                                  • Opcode ID: e48fb13897e581ccdb84168c7064de4809ce5c6c1111c6913c492114dbf6f221
                                                                                                  • Instruction ID: f6dac384090809ae35ec9016b3f295b3e7c91de10d409d66fe224bbb4fc51c85
                                                                                                  • Opcode Fuzzy Hash: e48fb13897e581ccdb84168c7064de4809ce5c6c1111c6913c492114dbf6f221
                                                                                                  • Instruction Fuzzy Hash: BEF01D31A4160AAB9B205B79FE04AE63BA9AB413E47154121B918D21F0DF21DC93FA61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LoadLibraryA.KERNEL32(?), ref: 00F15AB5
                                                                                                  • GetLastError.KERNEL32(Unable to load %s.,?), ref: 00F15ACA
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F1393B
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F13944
                                                                                                    • Part of subcall function 00F1390A: _strrchr.LIBCMT ref: 00F1398A
                                                                                                  Strings
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h, xrefs: 00F15AE0
                                                                                                  • Unable to load %s., xrefs: 00F15AC5
                                                                                                  • CDllLoader::LoadLibraryA, xrefs: 00F15AD6
                                                                                                  • LoadLibrary(), xrefs: 00F15AD1
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime$ErrorLastLibraryLoad_strrchr
                                                                                                  • String ID: CDllLoader::LoadLibraryA$LoadLibrary()$Unable to load %s.$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
                                                                                                  • API String ID: 108046663-2531695590
                                                                                                  • Opcode ID: bdf7229ad830ac826a71c3c27c172a9d612ac89af867e0981a246effa180318b
                                                                                                  • Instruction ID: 99ce62dc2f780167f18f41fca655f354360f5bb99551735fb31445650c83e6cf
                                                                                                  • Opcode Fuzzy Hash: bdf7229ad830ac826a71c3c27c172a9d612ac89af867e0981a246effa180318b
                                                                                                  • Instruction Fuzzy Hash: 14F0A772580309BFD7106A60DC06CD63E5EFF94B51B044511BB4991150D6B5D5D0B6A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LoadStringA.USER32(?,?,00000000,00000258,75BF3EB0,?,6D0D9E86,?,?,00000258,00000000,?,?), ref: 6D0D9CEA
                                                                                                  • GetLastError.KERNEL32(Unable to load string, ResID = %d.,?,?,6D0D9E86,?,?,00000258,00000000,?,?), ref: 6D0D9CFE
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  Strings
                                                                                                  • Unable to load string, ResID = %d., xrefs: 6D0D9CF9
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp, xrefs: 6D0D9D14
                                                                                                  • LoadString(), xrefs: 6D0D9D05
                                                                                                  • CSetup::XLoadString, xrefs: 6D0D9D0A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime$ErrorLastLoadString_strrchr
                                                                                                  • String ID: CSetup::XLoadString$LoadString()$Unable to load string, ResID = %d.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
                                                                                                  • API String ID: 2420349584-1423309346
                                                                                                  • Opcode ID: ac8a00fbdb1b2563d13b6b226699a1e97ea0b57a4d661a82498d6f8bdc2472bc
                                                                                                  • Instruction ID: 8abb44dcf53982d97223d6ff1db4c596a3dba401dbcc95daf16775d6ca07ea6a
                                                                                                  • Opcode Fuzzy Hash: ac8a00fbdb1b2563d13b6b226699a1e97ea0b57a4d661a82498d6f8bdc2472bc
                                                                                                  • Instruction Fuzzy Hash: 55E01236500319BBDB621FD59C04FEA7E25EB183A1B054017FE4896152DA72D5209BE5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • DialogBoxParamA.USER32(?,00001B58,?,6D0D79F6,00000000), ref: 6D0DF1EF
                                                                                                  • GetLastError.KERNEL32(Unable to open EULA dialog box.), ref: 6D0DF1FF
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  Strings
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\dsetup32\setupapi.cpp, xrefs: 6D0DF212
                                                                                                  • DirectXSetupShowEULA, xrefs: 6D0DF20B
                                                                                                  • DialogBox(), xrefs: 6D0DF206
                                                                                                  • Unable to open EULA dialog box., xrefs: 6D0DF1FA
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime$DialogErrorLastParam_strrchr
                                                                                                  • String ID: DialogBox()$DirectXSetupShowEULA$Unable to open EULA dialog box.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setupapi.cpp
                                                                                                  • API String ID: 573082458-4027609811
                                                                                                  • Opcode ID: 6caf47af6bca3c43ab6ae95d3956263a73ca4584a66649f3a6c5af59935604e6
                                                                                                  • Instruction ID: 3fef4e8a1bfc9a118408d5ca3c85c60b92cdd3e8a98ec5c3389c37fe0b3f56cf
                                                                                                  • Opcode Fuzzy Hash: 6caf47af6bca3c43ab6ae95d3956263a73ca4584a66649f3a6c5af59935604e6
                                                                                                  • Instruction Fuzzy Hash: BAE02636588308BBF7905B959C09F743B299768721F400203FB1CEA0D2DB61E4504A65
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                    • Part of subcall function 73ACDBF5: SetFilePointer.KERNEL32(00000000,00000000,00000002,00000000,00000000,00BFBBEF,73ACFD67,73ACFD67,?,73ACDE82,00BFBBEF,00000000,00000000,00000002,00000000,00000000), ref: 73ACDC37
                                                                                                    • Part of subcall function 73ACDBF5: GetLastError.KERNEL32(?,73ACDE82,00BFBBEF,00000000,00000000,00000002,00000000,00000000,00000002), ref: 73ACDC44
                                                                                                    • Part of subcall function 73ACDBF5: __dosmaperr.LIBCMT ref: 73ACDC4F
                                                                                                  • GetProcessHeap.KERNEL32(00000008,00001000,?,?,?,?,?,00000000,00000109,00000000,?,?,73ACFB2C,00000109,00000000), ref: 73AD1537
                                                                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00000000,00000109,00000000,?,?,73ACFB2C,00000109,00000000), ref: 73AD153E
                                                                                                  • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,73ACFB2C), ref: 73AD15BA
                                                                                                  • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,73ACFB2C,00000109), ref: 73AD15C1
                                                                                                  • SetEndOfFile.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,73ACFB2C), ref: 73AD161C
                                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,73ACFB2C,00000109), ref: 73AD1649
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$ErrorFileLastProcess$AllocFreePointer__dosmaperr
                                                                                                  • String ID:
                                                                                                  • API String ID: 3789379547-0
                                                                                                  • Opcode ID: d5397b8b35d38c4a4ee516d4f0413d7020e4bbff7161dbfa696be0a0158928e3
                                                                                                  • Instruction ID: 367e43c29230d75d6de5909638e51a4aacedf8d44a01533150ef07f9996edbfe
                                                                                                  • Opcode Fuzzy Hash: d5397b8b35d38c4a4ee516d4f0413d7020e4bbff7161dbfa696be0a0158928e3
                                                                                                  • Instruction Fuzzy Hash: E141E572D10245AFEF411FB8CD47B9D3BB6EB04264F14422BF927963ECD63989418B50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                    • Part of subcall function 6D0E8251: SetFilePointer.KERNEL32(00000000,00000000,00000002,00000000,00000000,00BFBBEF,6D0E92B8,6D0E92B8,?,6D0E6AD7,00BFBBEF,00000000,00000000,00000002,00000000,00000000), ref: 6D0E8293
                                                                                                    • Part of subcall function 6D0E8251: GetLastError.KERNEL32(?,6D0E6AD7,00BFBBEF,00000000,00000000,00000002,00000000,00000000,00000002), ref: 6D0E82A0
                                                                                                    • Part of subcall function 6D0E8251: __dosmaperr.LIBCMT ref: 6D0E82AB
                                                                                                  • GetProcessHeap.KERNEL32(00000008,00001000,?,?,?,?,?,00000000,00000109,00000000,?,?,6D0E907D,00000109,6D0D7D8D), ref: 6D0EAC50
                                                                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00000000,00000109,00000000,?,?,6D0E907D,00000109,6D0D7D8D), ref: 6D0EAC57
                                                                                                  • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,6D0E907D), ref: 6D0EACD3
                                                                                                  • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,6D0E907D,00000109), ref: 6D0EACDA
                                                                                                  • SetEndOfFile.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,6D0E907D), ref: 6D0EAD35
                                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,00000109,00000000,?,?,6D0E907D,00000109), ref: 6D0EAD62
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Heap$ErrorFileLastProcess$AllocFreePointer__dosmaperr
                                                                                                  • String ID:
                                                                                                  • API String ID: 3789379547-0
                                                                                                  • Opcode ID: aa3ae7b94dc3d691b41645dda6aeccc55bd5811464026ef70714a32aa6dc87c4
                                                                                                  • Instruction ID: f3f01a0c1bb95371ad7209d53c051afce1d095b36b969bffb3843413ad66f5ad
                                                                                                  • Opcode Fuzzy Hash: aa3ae7b94dc3d691b41645dda6aeccc55bd5811464026ef70714a32aa6dc87c4
                                                                                                  • Instruction Fuzzy Hash: F3412772D04519AFFF015FB4CC41FAD3AB6EF483A4F214626FA35A71A0DB354940A791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ba5c6e9f973de281b075ccfff0bdd33ac4af56dc0184cc3b824b6a3217cdfe44
                                                                                                  • Instruction ID: fa9fcf67c5cfab6be6122dda3be79ac153cb4ebb447de0392199bb77b40b8f98
                                                                                                  • Opcode Fuzzy Hash: ba5c6e9f973de281b075ccfff0bdd33ac4af56dc0184cc3b824b6a3217cdfe44
                                                                                                  • Instruction Fuzzy Hash: 6131F932C187024EF7214A3AC80075A7BE0AFC63F5B118A0DF5F5C7293DB24E5418B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ___initconout.LIBCMT ref: 73AD12BF
                                                                                                    • Part of subcall function 73AD2314: CreateFileA.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,73AD12C4,?,?,?,73ACE097,?), ref: 73AD2327
                                                                                                  • WriteConsoleW.KERNEL32(FFFFFFFE,73ACE097,00000001,?,00000000,?,?,?,73ACE097,?), ref: 73AD12E0
                                                                                                  • GetLastError.KERNEL32(?,?,73ACE097,?), ref: 73AD12F3
                                                                                                  • GetConsoleOutputCP.KERNEL32(00000000,73ACE097,00000001,?,00000005,00000000,00000000,?,?,?,73ACE097,?), ref: 73AD1313
                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,?,?,73ACE097,?), ref: 73AD131A
                                                                                                  • WriteConsoleA.KERNEL32(FFFFFFFE,?,00000000,?,00000000,?,?,73ACE097,?), ref: 73AD1336
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide___initconout
                                                                                                  • String ID:
                                                                                                  • API String ID: 3734994816-0
                                                                                                  • Opcode ID: 95e73907af543842bacb042f680816408a2c62d17c201ca9f06bca6d95ed7342
                                                                                                  • Instruction ID: 5fa338c2efb3db87f5eae194519d26641c2ceb38a46e96c3c48ea61d184ae480
                                                                                                  • Opcode Fuzzy Hash: 95e73907af543842bacb042f680816408a2c62d17c201ca9f06bca6d95ed7342
                                                                                                  • Instruction Fuzzy Hash: E521A472610114AFD744EBB2C84ABEA377EFB09721B20022EF616C64CCDB748546C790
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ___initconout.LIBCMT ref: 6D0EA6EC
                                                                                                    • Part of subcall function 6D0EB2C3: CreateFileA.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6D0EA6F1,?,?,?,6D0E6CEC,?), ref: 6D0EB2D6
                                                                                                  • WriteConsoleW.KERNEL32(FFFFFFFE,6D0E6CEC,00000001,?,00000000,?,?,?,6D0E6CEC,?), ref: 6D0EA70D
                                                                                                  • GetLastError.KERNEL32(?,?,6D0E6CEC,?), ref: 6D0EA720
                                                                                                  • GetConsoleOutputCP.KERNEL32(00000000,6D0E6CEC,00000001,?,00000005,00000000,00000000,?,?,?,6D0E6CEC,?), ref: 6D0EA740
                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,?,?,6D0E6CEC,?), ref: 6D0EA747
                                                                                                  • WriteConsoleA.KERNEL32(FFFFFFFE,?,00000000,?,00000000,?,?,6D0E6CEC,?), ref: 6D0EA763
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide___initconout
                                                                                                  • String ID:
                                                                                                  • API String ID: 3734994816-0
                                                                                                  • Opcode ID: e8ac36603d9897b458c0f40cbce6a24d05668f828b2c4ec9078b79486494931b
                                                                                                  • Instruction ID: 37240f0373e379068cf5fc8d8c3108875324d126ad84d4f8cc4b6aece4e27835
                                                                                                  • Opcode Fuzzy Hash: e8ac36603d9897b458c0f40cbce6a24d05668f828b2c4ec9078b79486494931b
                                                                                                  • Instruction Fuzzy Hash: AD214D74A01119AEEF00DFA4CD48FFA3BB8EF4A7A5B20461EF921C6085DB709545CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ___initconout.LIBCMT ref: 00F22010
                                                                                                    • Part of subcall function 00F22C72: CreateFileA.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00F22015,?,?,?,00F1F195,?), ref: 00F22C85
                                                                                                  • WriteConsoleW.KERNEL32(FFFFFFFE,00F1F195,00000001,?,00000000,?,?,?,00F1F195,?), ref: 00F22031
                                                                                                  • GetLastError.KERNEL32(?,?,00F1F195,?), ref: 00F22044
                                                                                                  • GetConsoleOutputCP.KERNEL32(00000000,00F1F195,00000001,?,00000005,00000000,00000000,?,?,?,00F1F195,?), ref: 00F22064
                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,?,?,00F1F195,?), ref: 00F2206B
                                                                                                  • WriteConsoleA.KERNEL32(FFFFFFFE,?,00000000,?,00000000,?,?,00F1F195,?), ref: 00F22087
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide___initconout
                                                                                                  • String ID:
                                                                                                  • API String ID: 3734994816-0
                                                                                                  • Opcode ID: 462f9fd25afee9a29d6a679fe4243439cc04e788b87b4d630d96aaa470dd29b9
                                                                                                  • Instruction ID: c7e5bfafca35edf7aec748e29a9c3ef7cf4d1fae4f9feb6cc88c7a87c18c56a8
                                                                                                  • Opcode Fuzzy Hash: 462f9fd25afee9a29d6a679fe4243439cc04e788b87b4d630d96aaa470dd29b9
                                                                                                  • Instruction Fuzzy Hash: DC21817590122CBADB20DBA0EC08AFE7B6DFF09760F114218F61686090DB719946FB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LoadImageA.USER32(00F168CF,00001B5B,00000000,00000000,00000000,00002000,74DF0A60,75294BC0,00000000,?,00F168CF,?), ref: 00F16D1A
                                                                                                  • CreateCompatibleDC.GDI32(00000000,?,00F168CF,?,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16D28
                                                                                                  • SelectObject.GDI32(00000000,?,00F168CF,?,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16D3C
                                                                                                  • LoadImageA.USER32(00F168CF,00001B5C,00000000,00000000,00000000,00002000,?,00F168CF,?,?,?,?,?,?,?,00000000), ref: 00F16D50
                                                                                                  • CreateCompatibleDC.GDI32(00000000,?,00F168CF,?,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16D59
                                                                                                  • SelectObject.GDI32(00000000,?,00F168CF,?,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16D67
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CompatibleCreateImageLoadObjectSelect
                                                                                                  • String ID:
                                                                                                  • API String ID: 301843087-0
                                                                                                  • Opcode ID: a85eaa80e4cfa68a2f9bf66d3b9e4f6449ffb7af81d4015a5e8d495d3e2592a4
                                                                                                  • Instruction ID: 4264abcde040425b8abe420f70e6fce959188333d004619626653e340206c54a
                                                                                                  • Opcode Fuzzy Hash: a85eaa80e4cfa68a2f9bf66d3b9e4f6449ffb7af81d4015a5e8d495d3e2592a4
                                                                                                  • Instruction Fuzzy Hash: 1DF0FFB190434C7EEB205F62AC89EA77F6EF7C5750F018016FB04D7160DAB55811EA60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • DeleteObject.GDI32(00000000,74DF0A60,00000000,00F168E3,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16D89
                                                                                                  • DeleteObject.GDI32(00000000,74DF0A60,00000000,00F168E3,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16D9B
                                                                                                  • DeleteObject.GDI32(00000000,74DF0A60,00000000,00F168E3,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16DAD
                                                                                                  • DeleteDC.GDI32(00000000,74DF0A60,00000000,00F168E3,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16DC5
                                                                                                  • DeleteDC.GDI32(00000000,74DF0A60,00000000,00F168E3,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16DD7
                                                                                                  • DeleteDC.GDI32(00000000,74DF0A60,00000000,00F168E3,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16DE9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Delete$Object
                                                                                                  • String ID:
                                                                                                  • API String ID: 3217310620-0
                                                                                                  • Opcode ID: 6ae8f45c76efcd1f2fa71eff23a8ac5ea747ff9988d6fc0d6ca5470bf6e877f7
                                                                                                  • Instruction ID: 6ee129324cdadb0f1fa008e57db9c4439afb3f82a8905191fa5da5a31a693932
                                                                                                  • Opcode Fuzzy Hash: 6ae8f45c76efcd1f2fa71eff23a8ac5ea747ff9988d6fc0d6ca5470bf6e877f7
                                                                                                  • Instruction Fuzzy Hash: 0001C271E2421C9B8B219F6DFC84895B7EEF7847107294517E100D3124D7F59C82AF50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CloseHandle.KERNEL32(?,00000000,00F16927,?,?,?,?,?,?,00000000,00000000,?), ref: 00F16272
                                                                                                  • GetLastError.KERNEL32(00000000,?,?,?,?,?,?,00000000,00000000,?), ref: 00F1627D
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F1393B
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F13944
                                                                                                    • Part of subcall function 00F1390A: _strrchr.LIBCMT ref: 00F1398A
                                                                                                  Strings
                                                                                                  • CDXWSetup::~CDXWSetup, xrefs: 00F16289
                                                                                                  • ~CDXWSetup(), xrefs: 00F1625D
                                                                                                  • CloseHandle(), xrefs: 00F16284
                                                                                                  • e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp, xrefs: 00F16290
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime$CloseErrorHandleLast_strrchr
                                                                                                  • String ID: CDXWSetup::~CDXWSetup$CloseHandle()$e:\bt\382730\setup\deliverables\dxsetup\psheets.cpp$~CDXWSetup()
                                                                                                  • API String ID: 4205222315-3347362006
                                                                                                  • Opcode ID: 7700e0aa7d2fc97e78403ed17b88bd46bf5d7d8e770a22b58cb6faa3eb8784fe
                                                                                                  • Instruction ID: 154a11a5e311dde6168e38d7ffcc571eb88acb9a96de08cfe973c1f5569974c1
                                                                                                  • Opcode Fuzzy Hash: 7700e0aa7d2fc97e78403ed17b88bd46bf5d7d8e770a22b58cb6faa3eb8784fe
                                                                                                  • Instruction Fuzzy Hash: EAE0E572A00B607B9A3436705C06EEA365CAB44B203164908BA09B7181DA68DCC0F292
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime$_strrchr
                                                                                                  • String ID: GetSectionNamesFromInf() failed.$Invalid buffer.$IsSectionInInf$e:\bt\382730\setup\deliverables\dsetup\dsetup32\inline.h
                                                                                                  • API String ID: 4138713405-2443459792
                                                                                                  • Opcode ID: c407f25fbf124d1cf1ce842447b8659ac55dd552bea6e7f38abb7b611eff72bc
                                                                                                  • Instruction ID: 0f1cb612f7eab5ba6b40d3bf22d82f31b424463e586d049e98809b891cb472e5
                                                                                                  • Opcode Fuzzy Hash: c407f25fbf124d1cf1ce842447b8659ac55dd552bea6e7f38abb7b611eff72bc
                                                                                                  • Instruction Fuzzy Hash: 00110BB180C309BEFB916AA68C80FBE7AB8DB14358F71086BF654A3081E6715A455650
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • _strnlen.LIBCMT ref: 6D0DDD66
                                                                                                  • _strnlen.LIBCMT ref: 6D0DDD7E
                                                                                                  • _strrchr.LIBCMT ref: 6D0DDD22
                                                                                                    • Part of subcall function 6D0D66CC: CompareStringA.KERNEL32(00000409,00000001,6D0D6892,000000FF,?,000000FF,?,6D0D6723,00000001,inf,6D0D6892,?,6D0D67C5,6D0D6892,6D0D6892,?), ref: 6D0D66E2
                                                                                                  Strings
                                                                                                  • dxxpdbg, xrefs: 6D0DDD2D
                                                                                                  • Changing source media for file %s\%s to %s\%s, xrefs: 6D0DDDA0
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _strnlen$CompareString_strrchr
                                                                                                  • String ID: Changing source media for file %s\%s to %s\%s$dxxpdbg
                                                                                                  • API String ID: 895441675-2375301040
                                                                                                  • Opcode ID: 0c154600053ea7d06ed2ff269eaa0785c6c98a1b3b81d758f8504a4f7c548416
                                                                                                  • Instruction ID: cb00bff8c502831372ac0d8514b7fa36d04264a2808afdfea8611dafc0045098
                                                                                                  • Opcode Fuzzy Hash: 0c154600053ea7d06ed2ff269eaa0785c6c98a1b3b81d758f8504a4f7c548416
                                                                                                  • Instruction Fuzzy Hash: 5D11947194C306AEFB969A249C44F7E3BB8EBC6364B1148AFD945DB195DF21D4008A70
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • FreeLibrary.KERNEL32(?,?,00F162AB,00000000,00F16927,?,?,?,?,?,?,00000000,00000000,?), ref: 00F151B3
                                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,00000000,?), ref: 00F151BD
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F1393B
                                                                                                    • Part of subcall function 00F1390A: __wstrtime.LIBCMT ref: 00F13944
                                                                                                    • Part of subcall function 00F1390A: _strrchr.LIBCMT ref: 00F1398A
                                                                                                  Strings
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h, xrefs: 00F151D9
                                                                                                  • FreeLibrary(), xrefs: 00F151CA
                                                                                                  • CDllLoader::FreeLibrary, xrefs: 00F151CF
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime$ErrorFreeLastLibrary_strrchr
                                                                                                  • String ID: CDllLoader::FreeLibrary$FreeLibrary()$e:\bt\382730\setup\deliverables\dsetup\inc\dsinline.h
                                                                                                  • API String ID: 2808663981-1330908120
                                                                                                  • Opcode ID: af5288fffa87e5ae2b4fe2a664c8305f5e3496a4fa0451cd3c7cc811697c326b
                                                                                                  • Instruction ID: c54de1d247382201488b60bc44d12a7f30ff5199fad0dff1f9afc4ee9bd02dfd
                                                                                                  • Opcode Fuzzy Hash: af5288fffa87e5ae2b4fe2a664c8305f5e3496a4fa0451cd3c7cc811697c326b
                                                                                                  • Instruction Fuzzy Hash: 8DE0DF33B50225BBE7212A79BC0AFE235CDFB80F62F154428BA40E2080EA90C9C1B191
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _memset$__fileno__locking_memcpy_s
                                                                                                  • String ID:
                                                                                                  • API String ID: 2792269882-0
                                                                                                  • Opcode ID: e5c4a98e0dd5c029622459a431dffb8e21ca16eeedef59267bf75a4a5bd1fa90
                                                                                                  • Instruction ID: 6a726dc284eb049bac91236f72e3d69e595b1129655501790545bf3b70b71ce7
                                                                                                  • Opcode Fuzzy Hash: e5c4a98e0dd5c029622459a431dffb8e21ca16eeedef59267bf75a4a5bd1fa90
                                                                                                  • Instruction Fuzzy Hash: 5041D631908709EFEB118FAAC84479EBBF5FF453A8F10C559E924A3190DB309A51DF51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 73AC8A74
                                                                                                  • GetCurrentProcessId.KERNEL32 ref: 73AC8A80
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 73AC8A88
                                                                                                  • GetTickCount.KERNEL32 ref: 73AC8A90
                                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 73AC8A9C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                                                                  • String ID:
                                                                                                  • API String ID: 1445889803-0
                                                                                                  • Opcode ID: 00c9fa4402df0fa74ec264e7dda504bac43090a55f55f90011ce342db57637d9
                                                                                                  • Instruction ID: 046b6920f32664a40e2dff7750755a27e94b6522d7f8c9674c7a049daa7a8d6b
                                                                                                  • Opcode Fuzzy Hash: 00c9fa4402df0fa74ec264e7dda504bac43090a55f55f90011ce342db57637d9
                                                                                                  • Instruction Fuzzy Hash: 5D017577D101249FCB10FBB6D50A79EB7F8FF4C251F660956D419E7208DB349A518B80
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 6D0E224B
                                                                                                  • GetCurrentProcessId.KERNEL32 ref: 6D0E2257
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 6D0E225F
                                                                                                  • GetTickCount.KERNEL32 ref: 6D0E2267
                                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 6D0E2273
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                                                                  • String ID:
                                                                                                  • API String ID: 1445889803-0
                                                                                                  • Opcode ID: 8051c949e57ae7c575db30e4d9fb08b05552ed6417e53437a2feb50d81988dd5
                                                                                                  • Instruction ID: e4ab402d09040789d76e4e9de17bf6184de58117b28025df1ddff9d26f88b9b8
                                                                                                  • Opcode Fuzzy Hash: 8051c949e57ae7c575db30e4d9fb08b05552ed6417e53437a2feb50d81988dd5
                                                                                                  • Instruction Fuzzy Hash: 82010C76D00225ABDF20EBB8D4487EEB7F8FB89691F964556E821E7104DB309940CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 00F195C5
                                                                                                  • GetCurrentProcessId.KERNEL32 ref: 00F195D1
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00F195D9
                                                                                                  • GetTickCount.KERNEL32 ref: 00F195E1
                                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 00F195ED
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                                                                  • String ID:
                                                                                                  • API String ID: 1445889803-0
                                                                                                  • Opcode ID: ba27c44f1d6e299fdebdbf9675e0a0df125a53cd5b606dd9d1db67a6703f0c39
                                                                                                  • Instruction ID: 5b6f95312c3eb732893fe68395553f0ce642303ab4a1522a0a7e6156beabfa00
                                                                                                  • Opcode Fuzzy Hash: ba27c44f1d6e299fdebdbf9675e0a0df125a53cd5b606dd9d1db67a6703f0c39
                                                                                                  • Instruction Fuzzy Hash: 5C017172C0012CABCB20DBB8E9486DEF7F8FF48395F564951DA11F7110EA749945EB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetDlgItem.USER32(?,00000BB9), ref: 00F152EC
                                                                                                  • SendMessageA.USER32(00000000,00000401,00000000,?,?,00000BB9), ref: 00F1530A
                                                                                                  • SendMessageA.USER32(00000000,00000402,00000000,00000000,?,00000BB9), ref: 00F15316
                                                                                                  • SendMessageA.USER32(00000000,00000404,00000001,00000000,?,00000BB9), ref: 00F15322
                                                                                                  • ShowWindow.USER32(00000000,00000001,?,00000BB9), ref: 00F15327
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MessageSend$ItemShowWindow
                                                                                                  • String ID:
                                                                                                  • API String ID: 1207805008-0
                                                                                                  • Opcode ID: 09f1141911a942cf7ad7c9bfab60501a30d3bb7c23f10dcf92fcecfa6535928f
                                                                                                  • Instruction ID: 55b897d86cb57d38074e0cc05adb27a0ab31e6426d63615afd0a5af533ac2784
                                                                                                  • Opcode Fuzzy Hash: 09f1141911a942cf7ad7c9bfab60501a30d3bb7c23f10dcf92fcecfa6535928f
                                                                                                  • Instruction Fuzzy Hash: 66F06D7528032876F63017169C4AFBB7E2DE7C2FA1F118016FB04B90D0CAF66802E5A9
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __itow
                                                                                                  • String ID: $#$.
                                                                                                  • API String ID: 3482036329-1065809056
                                                                                                  • Opcode ID: 90863fc4d4e4cae700df31648c31e1ead277949d966e1f81e3c44735b998aa16
                                                                                                  • Instruction ID: ffc6f96a080878b2aeb966ad6a26c2e0d15ba42f97d8ffcbeec5392ef80a0e97
                                                                                                  • Opcode Fuzzy Hash: 90863fc4d4e4cae700df31648c31e1ead277949d966e1f81e3c44735b998aa16
                                                                                                  • Instruction Fuzzy Hash: 5621423190028DABDB11CF6CE945BEE7FE4AF19300F280498EC80E7281D7749A05D7B9
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetKeyboardType.USER32(00000000,?,73AC5DA5), ref: 73AC4987
                                                                                                  • GetKeyboardType.USER32(00000001,?,73AC5DA5), ref: 73AC4997
                                                                                                  Strings
                                                                                                  • distinction98 failed GetKeyboardType, xrefs: 73AC498E
                                                                                                  • distinction98 failed generally, xrefs: 73AC49AB
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: KeyboardType
                                                                                                  • String ID: distinction98 failed GetKeyboardType$distinction98 failed generally
                                                                                                  • API String ID: 1620330385-80016554
                                                                                                  • Opcode ID: de866e5f1006b4511c95fc55d0ecdccdb5b9688a4d85a439ceda008ba1002d68
                                                                                                  • Instruction ID: 1500f949406bcdfcab2aac005c0eacfeab0793000ff13cbdc998bb037b1e5ef1
                                                                                                  • Opcode Fuzzy Hash: de866e5f1006b4511c95fc55d0ecdccdb5b9688a4d85a439ceda008ba1002d68
                                                                                                  • Instruction Fuzzy Hash: BEE0C23372C1B02AE74A61BC3C027AD06D68789130F19052BA15ADA188E440C8820695
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: String___crt$__freea_strnlen
                                                                                                  • String ID:
                                                                                                  • API String ID: 2812305112-0
                                                                                                  • Opcode ID: 4aebe93d83e6d12d9c166f133bf67b2d6f5ebda517da2f403c31b79affeda0de
                                                                                                  • Instruction ID: 586718c2a9079372210fb207d88b563cd9f29acc493bb4e25ead0702309fbc40
                                                                                                  • Opcode Fuzzy Hash: 4aebe93d83e6d12d9c166f133bf67b2d6f5ebda517da2f403c31b79affeda0de
                                                                                                  • Instruction Fuzzy Hash: 2841F3B2A0C205AEDF14BF648C919EE7B75DF85320F244069F10D9B262D73889C1BB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __locking$__fileno__lseeki64
                                                                                                  • String ID:
                                                                                                  • API String ID: 3501863086-0
                                                                                                  • Opcode ID: ad39bbdefc5f9786eae92deb8d3ad064318ae55d4f9ccb41b7cb692198b53a68
                                                                                                  • Instruction ID: c34085c13c8f77f39ee1373758f317217dbf9a78bb4b47d7f5e48ec7d7f048b6
                                                                                                  • Opcode Fuzzy Hash: ad39bbdefc5f9786eae92deb8d3ad064318ae55d4f9ccb41b7cb692198b53a68
                                                                                                  • Instruction Fuzzy Hash: 62412672901B109FC7348F28DC41A6677E4FF91374B14CA2DE8BA8B291E63CD941AF54
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • _memset.LIBCMT ref: 73ACE6B8
                                                                                                  • WideCharToMultiByte.KERNEL32(680779C0,00000000,?,00000001,?,73AC643C,00000000,?,?,?,?,?,73AC643C,?,?,00000000), ref: 73ACE74B
                                                                                                  • GetLastError.KERNEL32 ref: 73ACE769
                                                                                                  • _memset.LIBCMT ref: 73ACE78B
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _memset$ByteCharErrorLastMultiWide
                                                                                                  • String ID:
                                                                                                  • API String ID: 773584764-0
                                                                                                  • Opcode ID: e611fe05db9648e9c320acd6a7dfd951a36ec0e6f6d43281dd81668afc0f77b3
                                                                                                  • Instruction ID: c7994c069916cbfb5f779d6da8b9330c4e17873e9d6948c5006ee1f031bbc548
                                                                                                  • Opcode Fuzzy Hash: e611fe05db9648e9c320acd6a7dfd951a36ec0e6f6d43281dd81668afc0f77b3
                                                                                                  • Instruction Fuzzy Hash: 394118319002C5AFDB119F54C986F9D37B5EB16215B49016FE0264B2ECD734CD419B61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • _memset.LIBCMT ref: 6D0E8552
                                                                                                  • WideCharToMultiByte.KERNEL32(680779C0,00000000,?,00000001,?,6D0D62C9,00000000,?,?,?,?,?,6D0D62C9,?,?,00000000), ref: 6D0E85E5
                                                                                                  • GetLastError.KERNEL32 ref: 6D0E8603
                                                                                                  • _memset.LIBCMT ref: 6D0E8625
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _memset$ByteCharErrorLastMultiWide
                                                                                                  • String ID:
                                                                                                  • API String ID: 773584764-0
                                                                                                  • Opcode ID: 59656e084ac641dacc61ad770237d0dbb7dd85711dcc66666599c8409ec6c05f
                                                                                                  • Instruction ID: 5950a95cb05581a2809d66022219326310347879d682b8c70d62d8cf695482ea
                                                                                                  • Opcode Fuzzy Hash: 59656e084ac641dacc61ad770237d0dbb7dd85711dcc66666599c8409ec6c05f
                                                                                                  • Instruction Fuzzy Hash: 5941F973904146EFFB119F58C8D0BAD7BB5EB82394B51426EE5209B1A1DF318D408BD1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • _memset.LIBCMT ref: 00F1F7B6
                                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,?,?,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00F1F849
                                                                                                  • GetLastError.KERNEL32(?,?,00000000), ref: 00F1F867
                                                                                                  • _memset.LIBCMT ref: 00F1F889
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: _memset$ByteCharErrorLastMultiWide
                                                                                                  • String ID:
                                                                                                  • API String ID: 773584764-0
                                                                                                  • Opcode ID: 459fdc5b585e9da1799b7958fd1c30785a2d5650314f5ffbb0b8edaa4e65d446
                                                                                                  • Instruction ID: 52c900c8f8bf6a06705a0dd09b636c545d3adba18274e45ca9c242e0159629e1
                                                                                                  • Opcode Fuzzy Hash: 459fdc5b585e9da1799b7958fd1c30785a2d5650314f5ffbb0b8edaa4e65d446
                                                                                                  • Instruction Fuzzy Hash: 1941E372D00105AFCB20AF68DC859EE7B75AB01330B554279F5259B2E2D7309DC9FBA2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __locking$__fileno__lseeki64
                                                                                                  • String ID:
                                                                                                  • API String ID: 3501863086-0
                                                                                                  • Opcode ID: c34fedf1ddaaedeef0ee4944752dc3581d25047ade713d2dee3ebc2906a14fbd
                                                                                                  • Instruction ID: 27192a69aa83da71b371ba7ce327e17d46043cdf7e0ba18587eca5c49a2d68a4
                                                                                                  • Opcode Fuzzy Hash: c34fedf1ddaaedeef0ee4944752dc3581d25047ade713d2dee3ebc2906a14fbd
                                                                                                  • Instruction Fuzzy Hash: F241C3B15107019FD7608F68C942B9677F5EF55324B14C62FE46A9BAECD634DA008B50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __mtinitlocknum.LIBCMT ref: 73ACF48A
                                                                                                    • Part of subcall function 73ACAD11: __FF_MSGBANNER.LIBCMT ref: 73ACAD2D
                                                                                                  • ___crtInitCritSecAndSpinCount.LIBCMT ref: 73ACF502
                                                                                                  • EnterCriticalSection.KERNEL32(00000115,73AD29D0,00000018,73ACF9A1,00000109,00000000,00000000), ref: 73ACF529
                                                                                                  • LeaveCriticalSection.KERNEL32(00000115), ref: 73ACF536
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CriticalSection$CountCritEnterInitLeaveSpin___crt__mtinitlocknum
                                                                                                  • String ID:
                                                                                                  • API String ID: 2663194512-0
                                                                                                  • Opcode ID: e9a92b54dda1483cb5f685577014bbdc2e86d555b3d27349f7fbec88bf5d79a8
                                                                                                  • Instruction ID: d44ae3ac78547fb3ad35cb87e2f3e3b81a255e979070e207f36ab4eb1339d8a2
                                                                                                  • Opcode Fuzzy Hash: e9a92b54dda1483cb5f685577014bbdc2e86d555b3d27349f7fbec88bf5d79a8
                                                                                                  • Instruction Fuzzy Hash: 7A416771A0178B8FE711CFA9C95634D7BF5AF05324F28824FD2669A2E9CB70D5418B10
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __mtinitlocknum.LIBCMT ref: 6D0E89DB
                                                                                                    • Part of subcall function 6D0E495C: __FF_MSGBANNER.LIBCMT ref: 6D0E4978
                                                                                                  • ___crtInitCritSecAndSpinCount.LIBCMT ref: 6D0E8A53
                                                                                                  • EnterCriticalSection.KERNEL32(00000115,6D0EB7A0,00000018,6D0E8EF2,00000109,00000000,00000000), ref: 6D0E8A7A
                                                                                                  • LeaveCriticalSection.KERNEL32(00000115), ref: 6D0E8A87
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CriticalSection$CountCritEnterInitLeaveSpin___crt__mtinitlocknum
                                                                                                  • String ID:
                                                                                                  • API String ID: 2663194512-0
                                                                                                  • Opcode ID: 45b0d3a7f48d7ea13d22c3e0ce7ae773418e31a4c0f6947165116a3ea063b59a
                                                                                                  • Instruction ID: 6590371ccc0fcc68fdb009b96622ff4958953b6a401dfb7876e4f3e6569b4713
                                                                                                  • Opcode Fuzzy Hash: 45b0d3a7f48d7ea13d22c3e0ce7ae773418e31a4c0f6947165116a3ea063b59a
                                                                                                  • Instruction Fuzzy Hash: BF4127719483038FFB14CF69D84479DBBF0AF863A8F29821DC261A71D0C7748541CB25
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __mtinitlocknum.LIBCMT ref: 00F1FC4B
                                                                                                    • Part of subcall function 00F1DA99: __FF_MSGBANNER.LIBCMT ref: 00F1DAB5
                                                                                                  • ___crtInitCritSecAndSpinCount.LIBCMT ref: 00F1FCC3
                                                                                                  • EnterCriticalSection.KERNEL32(00000115,00F26428,00000018,00F20162,00000109,00000000,00000000), ref: 00F1FCEA
                                                                                                  • LeaveCriticalSection.KERNEL32(00000115), ref: 00F1FCF7
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CriticalSection$CountCritEnterInitLeaveSpin___crt__mtinitlocknum
                                                                                                  • String ID:
                                                                                                  • API String ID: 2663194512-0
                                                                                                  • Opcode ID: 4d62b8208c19a4d0552c8d1222f223a0975c6598e5aae72de4dfd6c042852f0d
                                                                                                  • Instruction ID: 2d408b068b69a02ebea34d8c6c76a3c279215594182f5611894b639253f768ff
                                                                                                  • Opcode Fuzzy Hash: 4d62b8208c19a4d0552c8d1222f223a0975c6598e5aae72de4dfd6c042852f0d
                                                                                                  • Instruction Fuzzy Hash: 08414A31D0474A8BDB24DFA8EC457EDBBE0AF01338F24822DD962961D1C7748AC9BB51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __getptd.LIBCMT ref: 73ACD630
                                                                                                    • Part of subcall function 73AC7CB1: __amsg_exit.LIBCMT ref: 73AC7CC1
                                                                                                  • __amsg_exit.LIBCMT ref: 73ACD650
                                                                                                  • InterlockedDecrement.KERNEL32(?,73AD2930,0000000C,73AC8E71,?,?,73ACE7D2), ref: 73ACD67D
                                                                                                  • InterlockedIncrement.KERNEL32(03521228,73AD2930,0000000C,73AC8E71,?,?,73ACE7D2), ref: 73ACD6A8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd
                                                                                                  • String ID:
                                                                                                  • API String ID: 2662827482-0
                                                                                                  • Opcode ID: 859f23a299614fa662e48f2f30a2c996849f42b07f7ea3b8bde3391995c883df
                                                                                                  • Instruction ID: 654066f79f87ee6648b579e1da6829b4bde4e743358166b2ec1f46e4b5c2f593
                                                                                                  • Opcode Fuzzy Hash: 859f23a299614fa662e48f2f30a2c996849f42b07f7ea3b8bde3391995c883df
                                                                                                  • Instruction Fuzzy Hash: A101E133A207619BEB11BB66910774D7770BB04710F15000BD81EA769CCF28D841CBD4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __getptd.LIBCMT ref: 6D0E57C8
                                                                                                    • Part of subcall function 6D0E1488: __amsg_exit.LIBCMT ref: 6D0E1498
                                                                                                  • __amsg_exit.LIBCMT ref: 6D0E57E8
                                                                                                  • InterlockedDecrement.KERNEL32(?,6D0EB608,0000000C,6D0E06CE,?,?,6D0E866C), ref: 6D0E5815
                                                                                                  • InterlockedIncrement.KERNEL32(013C1228,6D0EB608,0000000C,6D0E06CE,?,?,6D0E866C), ref: 6D0E5840
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd
                                                                                                  • String ID:
                                                                                                  • API String ID: 2662827482-0
                                                                                                  • Opcode ID: 51f7055c401d2d3ef227583030889fd770297ce329c4bfc644888d69b268d568
                                                                                                  • Instruction ID: 4465ca9895598285482d0202be5164daacbda4e00a07e4af761e1e9f95ab2a98
                                                                                                  • Opcode Fuzzy Hash: 51f7055c401d2d3ef227583030889fd770297ce329c4bfc644888d69b268d568
                                                                                                  • Instruction Fuzzy Hash: B501AD39908A22EFFB119B6585087BD77B0FF85BA4F41050AE810A7280CB249951CBE6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • __getptd.LIBCMT ref: 00F1BCD1
                                                                                                    • Part of subcall function 00F18F41: __amsg_exit.LIBCMT ref: 00F18F51
                                                                                                  • __amsg_exit.LIBCMT ref: 00F1BCF1
                                                                                                  • InterlockedDecrement.KERNEL32(?,00F26270,0000000C,00F17A01,?,?,00F1988D,?,?,?), ref: 00F1BD1E
                                                                                                  • InterlockedIncrement.KERNEL32(02FF1228,00F26270,0000000C,00F17A01,?,?,00F1988D,?,?,?), ref: 00F1BD49
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd
                                                                                                  • String ID:
                                                                                                  • API String ID: 2662827482-0
                                                                                                  • Opcode ID: c53c45082e74b7fd2758c97b34d958923dc7aefea5c72f6b5dcc5e1f34a6a6b5
                                                                                                  • Instruction ID: a1249c70e0da7fd81911560c13f86b5f32f8b11496096fc1c3666d7a63d6bb71
                                                                                                  • Opcode Fuzzy Hash: c53c45082e74b7fd2758c97b34d958923dc7aefea5c72f6b5dcc5e1f34a6a6b5
                                                                                                  • Instruction Fuzzy Hash: F601C471D02616EBC729AF65A805BE9B360BF00B60F160145E810A7291CF386DC2FBD6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetLastError.KERNEL32(00000000,?,73AC9C8A,73AC7462,e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c,00000000,?,GetRegistryDXVersion,e:\bt\382730\setup\deliverables\dsetup\dsetup\dsetup.c,00000000), ref: 73AC7C34
                                                                                                  • ___set_flsgetvalue.LIBCMT ref: 73AC7C3C
                                                                                                    • Part of subcall function 73AC7B06: TlsGetValue.KERNEL32(73AC7C41), ref: 73AC7B0C
                                                                                                    • Part of subcall function 73AC7B06: TlsSetValue.KERNEL32(00000000), ref: 73AC7B29
                                                                                                  • TlsGetValue.KERNEL32 ref: 73AC7C4D
                                                                                                  • SetLastError.KERNEL32(00000000), ref: 73AC7CA1
                                                                                                    • Part of subcall function 73ACDAC2: __calloc_impl.LIBCMT ref: 73ACDAD3
                                                                                                    • Part of subcall function 73ACDAC2: Sleep.KERNEL32(00000000,?,00000000,00000000,?,73AC7C67,00000001,00000214), ref: 73ACDAEA
                                                                                                    • Part of subcall function 73AC7A8D: TlsGetValue.KERNEL32(?,?,73AC7B21), ref: 73AC7A9F
                                                                                                    • Part of subcall function 73AC7A8D: TlsGetValue.KERNEL32(00000006,?,73AC7B21), ref: 73AC7AB6
                                                                                                    • Part of subcall function 73AC7B77: GetModuleHandleA.KERNEL32(KERNEL32.DLL,73AD2740,0000000C,73AC7C90,00000000,00000000), ref: 73AC7B88
                                                                                                    • Part of subcall function 73AC7B77: GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 73AC7BB1
                                                                                                    • Part of subcall function 73AC7B77: GetProcAddress.KERNEL32(?,DecodePointer), ref: 73AC7BC1
                                                                                                    • Part of subcall function 73AC7B77: InterlockedIncrement.KERNEL32(73AD47D8), ref: 73AC7BE3
                                                                                                    • Part of subcall function 73AC7B77: ___addlocaleref.LIBCMT ref: 73AC7C0A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value$AddressErrorLastProc$HandleIncrementInterlockedModuleSleep___addlocaleref___set_flsgetvalue__calloc_impl
                                                                                                  • String ID:
                                                                                                  • API String ID: 2909133767-0
                                                                                                  • Opcode ID: 187f7dc290d76fdc916595a8ebf3567e708fec5241e216d2f8cea6cfb72d8a16
                                                                                                  • Instruction ID: c7680920b3b44c53b1c6921fb9d1b9c5e8e6f1050524fa91e972aa854a142432
                                                                                                  • Opcode Fuzzy Hash: 187f7dc290d76fdc916595a8ebf3567e708fec5241e216d2f8cea6cfb72d8a16
                                                                                                  • Instruction Fuzzy Hash: EFF028336053A2AFD3223776BD0FF1A3B55DF446B1B25411AE019E21ECDE16CC1246E0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetLastError.KERNEL32(00066BDB,6D0D7D8D,6D0E33DE,6D0E4192,?,?,6D0DFCAF,6D0D7D8D,?,?,6D0D770E,00066BDC,?,?,00000000), ref: 6D0E140B
                                                                                                  • ___set_flsgetvalue.LIBCMT ref: 6D0E1413
                                                                                                    • Part of subcall function 6D0E12DD: TlsGetValue.KERNEL32(6D0E1418,?,?,6D0DFCAF,6D0D7D8D,?,?,6D0D770E,00066BDC,?,?,00000000,?,?,6D0D77A6,SETUP_AGREEMENT_ENG), ref: 6D0E12E3
                                                                                                    • Part of subcall function 6D0E12DD: TlsSetValue.KERNEL32(00000000,?,6D0DFCAF,6D0D7D8D,?,?,6D0D770E,00066BDC,?,?,00000000,?,?,6D0D77A6,SETUP_AGREEMENT_ENG,000012F1), ref: 6D0E1300
                                                                                                  • TlsGetValue.KERNEL32(?,?,6D0DFCAF,6D0D7D8D,?,?,6D0D770E,00066BDC,?,?,00000000,?,?,6D0D77A6,SETUP_AGREEMENT_ENG,000012F1), ref: 6D0E1424
                                                                                                  • SetLastError.KERNEL32(00000000,?,?,6D0DFCAF,6D0D7D8D,?,?,6D0D770E,00066BDC,?,?,00000000,?,?,6D0D77A6,SETUP_AGREEMENT_ENG), ref: 6D0E1478
                                                                                                    • Part of subcall function 6D0E818B: __calloc_impl.LIBCMT ref: 6D0E819C
                                                                                                    • Part of subcall function 6D0E818B: Sleep.KERNEL32(00000000,00066BDB,6D0D7D8D), ref: 6D0E81B3
                                                                                                    • Part of subcall function 6D0E1264: TlsGetValue.KERNEL32(6D0D7D8D,?,6D0E41C6,?,6D0E418C,6D0D7D8D,?,?,6D0DFCAF,6D0D7D8D,?,?,6D0D770E,00066BDC), ref: 6D0E1276
                                                                                                    • Part of subcall function 6D0E1264: TlsGetValue.KERNEL32(00000007,?,6D0E41C6,?,6D0E418C,6D0D7D8D,?,?,6D0DFCAF,6D0D7D8D,?,?,6D0D770E,00066BDC), ref: 6D0E128D
                                                                                                    • Part of subcall function 6D0E134E: GetModuleHandleA.KERNEL32(KERNEL32.DLL,6D0EB4B8,0000000C,6D0E1467,00000000,00000000,?,?,6D0DFCAF,6D0D7D8D,?,?,6D0D770E,00066BDC), ref: 6D0E135F
                                                                                                    • Part of subcall function 6D0E134E: GetProcAddress.KERNEL32(00000000,EncodePointer,?,?,6D0DFCAF,6D0D7D8D), ref: 6D0E1388
                                                                                                    • Part of subcall function 6D0E134E: GetProcAddress.KERNEL32(?,DecodePointer,?,?,6D0DFCAF,6D0D7D8D), ref: 6D0E1398
                                                                                                    • Part of subcall function 6D0E134E: InterlockedIncrement.KERNEL32(6D0ED950), ref: 6D0E13BA
                                                                                                    • Part of subcall function 6D0E134E: ___addlocaleref.LIBCMT ref: 6D0E13E1
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value$AddressErrorLastProc$HandleIncrementInterlockedModuleSleep___addlocaleref___set_flsgetvalue__calloc_impl
                                                                                                  • String ID:
                                                                                                  • API String ID: 2909133767-0
                                                                                                  • Opcode ID: f6cd34f68f67f4790af709d6d32a569660c6f82ca9d29c4e5dabee866d278b77
                                                                                                  • Instruction ID: e3d059e64d5d451c82ed6ee6ac0f1b65901517b3569cc0fcb5724f6de502569d
                                                                                                  • Opcode Fuzzy Hash: f6cd34f68f67f4790af709d6d32a569660c6f82ca9d29c4e5dabee866d278b77
                                                                                                  • Instruction Fuzzy Hash: 9FF0C8325095226FFB2627B49C09BAE3AB5DF82BF5B154217FA60D31D1CF2088014692
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetLastError.KERNEL32(?,?,00F18F49,?,00F179B9,?,?,00F1988D,?,?,?,00000000), ref: 00F18EC4
                                                                                                  • ___set_flsgetvalue.LIBCMT ref: 00F18ECC
                                                                                                    • Part of subcall function 00F18D96: TlsGetValue.KERNEL32(00F18ED1,?,00F1988D,?,?,?,00000000), ref: 00F18D9C
                                                                                                    • Part of subcall function 00F18D96: TlsSetValue.KERNEL32(00000000,00F1988D,?,?,?,00000000), ref: 00F18DB9
                                                                                                  • TlsGetValue.KERNEL32(?,00F1988D,?,?,?,00000000), ref: 00F18EDD
                                                                                                  • SetLastError.KERNEL32(00000000,?,00F1988D,?,?,?,00000000), ref: 00F18F31
                                                                                                    • Part of subcall function 00F1E453: __calloc_impl.LIBCMT ref: 00F1E464
                                                                                                    • Part of subcall function 00F1E453: Sleep.KERNEL32(00000000,?,?,00000000), ref: 00F1E47B
                                                                                                    • Part of subcall function 00F18D1D: TlsGetValue.KERNEL32(?,?,00F18DB1,?,00F1988D,?,?,?,00000000), ref: 00F18D2F
                                                                                                    • Part of subcall function 00F18D1D: TlsGetValue.KERNEL32(00000005,?,00F18DB1,?,00F1988D,?,?,?,00000000), ref: 00F18D46
                                                                                                    • Part of subcall function 00F18E07: GetModuleHandleA.KERNEL32(KERNEL32.DLL,00F26140,0000000C,00F18F20,00000000,00000000,?,00F1988D,?,?,?,00000000), ref: 00F18E18
                                                                                                    • Part of subcall function 00F18E07: GetProcAddress.KERNEL32(00000000,EncodePointer,?,00F1988D,?,?,?,00000000), ref: 00F18E41
                                                                                                    • Part of subcall function 00F18E07: GetProcAddress.KERNEL32(?,DecodePointer,?,00F1988D,?,?,?,00000000), ref: 00F18E51
                                                                                                    • Part of subcall function 00F18E07: InterlockedIncrement.KERNEL32(00F285D0,?,00F1988D,?,?,?,00000000), ref: 00F18E73
                                                                                                    • Part of subcall function 00F18E07: ___addlocaleref.LIBCMT ref: 00F18E9A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Value$AddressErrorLastProc$HandleIncrementInterlockedModuleSleep___addlocaleref___set_flsgetvalue__calloc_impl
                                                                                                  • String ID:
                                                                                                  • API String ID: 2909133767-0
                                                                                                  • Opcode ID: 8de93e748aa2124b1c6c6fe892004bf11adc20c7e6444e5dbbc899e929f7fea8
                                                                                                  • Instruction ID: 558d1872ec93ee277670e3a38d0461fe885fdccd46fcce367340e8d83262433e
                                                                                                  • Opcode Fuzzy Hash: 8de93e748aa2124b1c6c6fe892004bf11adc20c7e6444e5dbbc899e929f7fea8
                                                                                                  • Instruction Fuzzy Hash: A1F0283290662166D33123B4BD09BDA7A16EF807F1B210119FA14E61F0CF15CC83BBD0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetMessageA.USER32(?,00000000,00000000,00000000,?,?,?,73AC3D93), ref: 73AC3D38
                                                                                                  • TranslateMessage.USER32(?,?,?,?,73AC3D93), ref: 73AC3D46
                                                                                                  • DispatchMessageA.USER32(?,?,?,?,73AC3D93), ref: 73AC3D50
                                                                                                  • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000,?,?,?,?,?,73AC3D93), ref: 73AC3D5E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Message$DispatchPeekTranslate
                                                                                                  • String ID:
                                                                                                  • API String ID: 4217535847-0
                                                                                                  • Opcode ID: 83f741be0efe1ab3ae444b25db30297c3b8ae19640fc81df17d42c6d4b3c4681
                                                                                                  • Instruction ID: e35a8b574ce73ef21497e260bc9cc23bae3ac08396c1902bfc3de2250c1a4c12
                                                                                                  • Opcode Fuzzy Hash: 83f741be0efe1ab3ae444b25db30297c3b8ae19640fc81df17d42c6d4b3c4681
                                                                                                  • Instruction Fuzzy Hash: C4F012B3D0112A678B117AE78C4DEDB7FBCDD865907144615B50AD2048D628D107C6F0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetMessageA.USER32(?,00000000,00000000,00000000,?,6D0DB658,?,?), ref: 6D0D9D48
                                                                                                  • TranslateMessage.USER32(?,?,6D0DB658,?,?), ref: 6D0D9D56
                                                                                                  • DispatchMessageA.USER32(?,?,6D0DB658,?,?), ref: 6D0D9D60
                                                                                                  • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000,?,00000000,?,6D0DB658,?,?), ref: 6D0D9D6E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Message$DispatchPeekTranslate
                                                                                                  • String ID:
                                                                                                  • API String ID: 4217535847-0
                                                                                                  • Opcode ID: bda4952c3987a0a08a8e66ec62c528c77839df753c82297a1a840ab475d95560
                                                                                                  • Instruction ID: c1f6ae90404e6fb46f77f54bd6ef195f3ff63c229f987dad90a10e4cd0b4b9e5
                                                                                                  • Opcode Fuzzy Hash: bda4952c3987a0a08a8e66ec62c528c77839df753c82297a1a840ab475d95560
                                                                                                  • Instruction Fuzzy Hash: 6AF01276D0122A77DF20ABE69C0CEDFBFBCDE972907404012B915D2004DA24D116C6B1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetLastError.KERNEL32 ref: 6D0DE32A
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63C2
                                                                                                    • Part of subcall function 6D0D6391: __wstrtime.LIBCMT ref: 6D0D63CB
                                                                                                    • Part of subcall function 6D0D6391: _strrchr.LIBCMT ref: 6D0D6411
                                                                                                  Strings
                                                                                                  • CabCallback, xrefs: 6D0DE356
                                                                                                  • SPFILENOTIFY_DELETEERROR: %s, error = %d., xrefs: 6D0DE34D
                                                                                                  • e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp, xrefs: 6D0DE360
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __wstrtime$ErrorLast_strrchr
                                                                                                  • String ID: CabCallback$SPFILENOTIFY_DELETEERROR: %s, error = %d.$e:\bt\382730\setup\deliverables\dsetup\dsetup32\setup.cpp
                                                                                                  • API String ID: 205445871-2425475416
                                                                                                  • Opcode ID: 47c2509da64982021a77f3cf5865f6d9e8c5ce87ea66aec4fa99e1bd1cc06c83
                                                                                                  • Instruction ID: 49b56fcb956f6cb4769ddd8382d5ca316b1ae12b657668c181ebac6af0f55e77
                                                                                                  • Opcode Fuzzy Hash: 47c2509da64982021a77f3cf5865f6d9e8c5ce87ea66aec4fa99e1bd1cc06c83
                                                                                                  • Instruction Fuzzy Hash: 85E0D835348306BAF7B087694C42FFD3250DFCA305F508853F643EA0C6CAF080408921
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: __fltout2
                                                                                                  • String ID: -
                                                                                                  • API String ID: 3994888974-2547889144
                                                                                                  • Opcode ID: d65da4bc9b521966fd0dc17d1002195c5964a75af0158738872218bc1c85f080
                                                                                                  • Instruction ID: 00962b64ee1d5d6b74fd29281416d8bd826ad034d68642f823b660510c8cbeb1
                                                                                                  • Opcode Fuzzy Hash: d65da4bc9b521966fd0dc17d1002195c5964a75af0158738872218bc1c85f080
                                                                                                  • Instruction Fuzzy Hash: E821D8B3A00129AFCF14EF78DC818EF7B69EB08320715812DF422E3180DA39DA54A761
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ___initmbctable.LIBCMT ref: 73AC8719
                                                                                                    • Part of subcall function 73ACDA9F: __setmbcp.LIBCMT ref: 73ACDAAA
                                                                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe,00000104,?,?,?,73AC687F), ref: 73AC8730
                                                                                                  Strings
                                                                                                  • C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe, xrefs: 73AC8723, 73AC8728
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileModuleName___initmbctable__setmbcp
                                                                                                  • String ID: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                  • API String ID: 2741541922-2796865217
                                                                                                  • Opcode ID: 7ca70e11f44b25f6b3d623c78fbb741d43d0916e945c20cab07d7a42e7d20c2b
                                                                                                  • Instruction ID: be95ac96d580b6b52d9885d8168570c1b54f6cc7a4def0dcd050267c2f3dd8fb
                                                                                                  • Opcode Fuzzy Hash: 7ca70e11f44b25f6b3d623c78fbb741d43d0916e945c20cab07d7a42e7d20c2b
                                                                                                  • Instruction Fuzzy Hash: 8D21AB72901198AFCF01DB7A8C82A9D7BBEFB46364760066BE515D3258D730DD41CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ___initmbctable.LIBCMT ref: 6D0E1EF0
                                                                                                    • Part of subcall function 6D0E5C37: __setmbcp.LIBCMT ref: 6D0E5C42
                                                                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe,00000104,?,?,?,6D0DF326), ref: 6D0E1F07
                                                                                                  Strings
                                                                                                  • C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe, xrefs: 6D0E1EFA, 6D0E1EFF
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileModuleName___initmbctable__setmbcp
                                                                                                  • String ID: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                  • API String ID: 2741541922-2796865217
                                                                                                  • Opcode ID: 59a0ca68901ce95a49e01622b9f777c8a4e8c3bcf74b7935a0314c2ee6dbb7a2
                                                                                                  • Instruction ID: 03a5ccd5bfff5c4af302a57ad9eb91550a90445f5eda436504ccec20fc3f8aa3
                                                                                                  • Opcode Fuzzy Hash: 59a0ca68901ce95a49e01622b9f777c8a4e8c3bcf74b7935a0314c2ee6dbb7a2
                                                                                                  • Instruction Fuzzy Hash: 09210A71E0414DBFEF10CF6A9980A9EFBFDEA453A4B500665F924E3180D3309E41CB92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ___initmbctable.LIBCMT ref: 00F1887E
                                                                                                    • Part of subcall function 00F1C140: __setmbcp.LIBCMT ref: 00F1C14B
                                                                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe,00000104), ref: 00F18895
                                                                                                  Strings
                                                                                                  • C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe, xrefs: 00F18888, 00F1888D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2879356052.0000000000F11000.00000020.00000001.01000000.00000014.sdmp, Offset: 00F10000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2879318508.0000000000F10000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879404259.0000000000F28000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2879442469.0000000000F2C000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_f10000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: FileModuleName___initmbctable__setmbcp
                                                                                                  • String ID: C:\Program Files (x86)\Epic Games\DirectXRedist\DXSETUP.exe
                                                                                                  • API String ID: 2741541922-2796865217
                                                                                                  • Opcode ID: 91f85f879c30f7329713ad1972779cac6f13122f744778442b2cc22118a1ccb6
                                                                                                  • Instruction ID: f35fed8bd0bea01e083baaa1b314145da71feda0fcd0bef8f98881b5ec0ba6e9
                                                                                                  • Opcode Fuzzy Hash: 91f85f879c30f7329713ad1972779cac6f13122f744778442b2cc22118a1ccb6
                                                                                                  • Instruction Fuzzy Hash: 2B21D271D04258AFCB20DFA99D808EE7F68EB413B8B540669E514E3291DA305E86EB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetUserDefaultUILanguage.KERNEL32(?,00000004,ENG,?,?,?,6D0D7E1D,?), ref: 6D0D7957
                                                                                                  • GetSystemDefaultUILanguage.KERNEL32(?,00000000,?,?,?,6D0D7E1D,?), ref: 6D0D79A2
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DefaultLanguage$SystemUser
                                                                                                  • String ID: ENG
                                                                                                  • API String ID: 384301227-257040513
                                                                                                  • Opcode ID: bbaa0e88b717df88f28baac171a9267ee93e53aa8339d42641409dc57b4396d9
                                                                                                  • Instruction ID: 492e6653e66877aa748435d943eb09b950379789c33d53f944584bbe49ab2faf
                                                                                                  • Opcode Fuzzy Hash: bbaa0e88b717df88f28baac171a9267ee93e53aa8339d42641409dc57b4396d9
                                                                                                  • Instruction Fuzzy Hash: 7C11C663E00354ABEB49AF24CC01B6EBAABEBC5B14B158077E7168B091EAB1C5538161
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • _strrchr.LIBCMT ref: 6D0D8306
                                                                                                    • Part of subcall function 6D0D66CC: CompareStringA.KERNEL32(00000409,00000001,6D0D6892,000000FF,?,000000FF,?,6D0D6723,00000001,inf,6D0D6892,?,6D0D67C5,6D0D6892,6D0D6892,?), ref: 6D0D66E2
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882355639.000000006D0D1000.00000020.00000001.01000000.00000016.sdmp, Offset: 6D0D0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882320877.000000006D0D0000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882414826.000000006D0ED000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882486706.000000006D0F1000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_6d0d0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CompareString_strrchr
                                                                                                  • String ID: ini$png
                                                                                                  • API String ID: 987711976-1989627829
                                                                                                  • Opcode ID: e05ea02322c5428ca74792d99145a3a1e7fac713967b91dd0aa0f6da850bf233
                                                                                                  • Instruction ID: aa290915e54c8098bb3198b7d3df8c7a259276d1b3921866bcb33eb825e26fb4
                                                                                                  • Opcode Fuzzy Hash: e05ea02322c5428ca74792d99145a3a1e7fac713967b91dd0aa0f6da850bf233
                                                                                                  • Instruction Fuzzy Hash: 51E04F7214875766F7C195715D04BA72A8CCF423E47425037AA1CD6196EF11D511C0E5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  • DirectXSetupIsJapanNec == 1, xrefs: 73AC5DA9
                                                                                                  • DirectXSetupIsJapanNec == 0, xrefs: 73AC5DB8
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000015.00000002.2882750502.0000000073AC1000.00000020.00000001.01000000.00000015.sdmp, Offset: 73AC0000, based on PE: true
                                                                                                  • Associated: 00000015.00000002.2882697081.0000000073AC0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882814592.0000000073AD4000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                                                                  • Associated: 00000015.00000002.2882875802.0000000073AD7000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_21_2_73ac0000_DXSETUP.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: KeyboardType
                                                                                                  • String ID: DirectXSetupIsJapanNec == 0$DirectXSetupIsJapanNec == 1
                                                                                                  • API String ID: 1620330385-1182196344
                                                                                                  • Opcode ID: 30dfec136bfc0997ea6799f641959a54a23ea5860a805c72cff8b97b294c5861
                                                                                                  • Instruction ID: 386dddae6879f8d73fbe79264fcbf071607485112b9666812f3845ca39fa1245
                                                                                                  • Opcode Fuzzy Hash: 30dfec136bfc0997ea6799f641959a54a23ea5860a805c72cff8b97b294c5861
                                                                                                  • Instruction Fuzzy Hash: 70C012512953D047BF01D2F90B033E501874D49083318093B6D93C43ADDF00C0409561
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 042F392D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000021.00000003.2939335650.00000000042F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_33_3_42f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DispatcherExceptionUser
                                                                                                  • String ID:
                                                                                                  • API String ID: 6842923-0
                                                                                                  • Opcode ID: fe06f9cee94d2638b13d92552b06dd209f3d5e4558560617b5433fad399d352a
                                                                                                  • Instruction ID: 7959d06461140782fbff8f4441417765f677a638b1527b403743bf026ed9851b
                                                                                                  • Opcode Fuzzy Hash: fe06f9cee94d2638b13d92552b06dd209f3d5e4558560617b5433fad399d352a
                                                                                                  • Instruction Fuzzy Hash: 0CE022766163801FC7014B74BC1ACAF3FBCABC9219305416EF806C3252E9344802CB22
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 042F392D
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000021.00000003.2939335650.00000000042F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_33_3_42f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DispatcherExceptionUser
                                                                                                  • String ID:
                                                                                                  • API String ID: 6842923-0
                                                                                                  • Opcode ID: 44b1f0170f7b8843d201db1115d309c65c7a0280a4cf59fdbfa9dacc6f995d44
                                                                                                  • Instruction ID: ad44d82b9f33d564eb05c7d3d440d2d0b52326de793c228119a58c538a9d6844
                                                                                                  • Opcode Fuzzy Hash: 44b1f0170f7b8843d201db1115d309c65c7a0280a4cf59fdbfa9dacc6f995d44
                                                                                                  • Instruction Fuzzy Hash: 79E08C362102006B87045B7AAC0D82F7BADEBCC222700812AF80AC3300E9309C41CBB5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000021.00000002.2941567338.000000000079D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_33_2_79d000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: fba52b955a2708d939e15b5b6f6ea97ebf2ad80138141105b34ca1b314dcbd12
                                                                                                  • Instruction ID: 17f2be230f4dc1271e5871b2cb6f0c20a5a895416655796d22ff10e3349d926e
                                                                                                  • Opcode Fuzzy Hash: fba52b955a2708d939e15b5b6f6ea97ebf2ad80138141105b34ca1b314dcbd12
                                                                                                  • Instruction Fuzzy Hash: FC2145B5504200EFCF21DF54E9C0B2ABF61FB98324F20C569D9094B256C33ADC56C7A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000021.00000002.2941567338.000000000079D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_33_2_79d000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 402c6a8559748647fef594cd0c7d6ed57cea98399c5c457cfc3d558c3163147f
                                                                                                  • Instruction ID: 9ccf5b753e3f27ee191c4142ae3a2cf6197699bd3637c2c13cae711eaf9068f3
                                                                                                  • Opcode Fuzzy Hash: 402c6a8559748647fef594cd0c7d6ed57cea98399c5c457cfc3d558c3163147f
                                                                                                  • Instruction Fuzzy Hash: 0911B176504280DFCF16CF50D9C4B16BF72FB94324F24C6A9D8094B656C33AD85ACBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000021.00000002.2941567338.000000000079D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_33_2_79d000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a2d31d8aaf1071e0c05aee265a593efdb018fb23bbf4a81e46275f99f02650b5
                                                                                                  • Instruction ID: 0533d30d0c43cd57fb33f20df2e0a32bf644e422298f64e792d71248eb3a7849
                                                                                                  • Opcode Fuzzy Hash: a2d31d8aaf1071e0c05aee265a593efdb018fb23bbf4a81e46275f99f02650b5
                                                                                                  • Instruction Fuzzy Hash: EE01A2715093449AEB208A6DEE84B67BF98EF41324F18C52AED494B286C27D9C41C6B1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000021.00000002.2941567338.000000000079D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0079D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_33_2_79d000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c9c91df1393f4674d10bf91aea871e19514368561043a5f320804dff390d3a59
                                                                                                  • Instruction ID: 932658aa57a41bb318f197b61a7ef7066c6b46c0b7cb4bdbde9dc25cb4cae8dd
                                                                                                  • Opcode Fuzzy Hash: c9c91df1393f4674d10bf91aea871e19514368561043a5f320804dff390d3a59
                                                                                                  • Instruction Fuzzy Hash: 99F06271409344AEEB208A1ADD84B62FF98EB51734F18C55AED4C4F286C2799C45CAB1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: LR^q
                                                                                                  • API String ID: 0-2625958711
                                                                                                  • Opcode ID: 925692c766df346c9df7b2c1ebe569fa9b46980b53777031d642ef1edc78aac8
                                                                                                  • Instruction ID: f42ce5b145bfec43283d9784ed8c0bd2cb96c52712547e4b19552d634a917d7d
                                                                                                  • Opcode Fuzzy Hash: 925692c766df346c9df7b2c1ebe569fa9b46980b53777031d642ef1edc78aac8
                                                                                                  • Instruction Fuzzy Hash: B4C17930A402199FCF18DFA5D854BAEB7F2BF88304F14C5A9E409AB265DF35AC81CB51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: LR^q
                                                                                                  • API String ID: 0-2625958711
                                                                                                  • Opcode ID: 78c8b8e96f9f0b5320765bdb5f2a310ea24021adc450f481ff538446e85169b2
                                                                                                  • Instruction ID: 6df5e954875655e120401b0b9e9525efaf8bf4e856f6396275b7859a289cb89d
                                                                                                  • Opcode Fuzzy Hash: 78c8b8e96f9f0b5320765bdb5f2a310ea24021adc450f481ff538446e85169b2
                                                                                                  • Instruction Fuzzy Hash: 7D715530A40215DFDF18CF60E944BAAB7B2BF88308F14D5A9D509AB2A0DF35AC85CF51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8b88d8e26b668341a928d9462c14d72f862f848481cdca05f81729a9e95dcda9
                                                                                                  • Instruction ID: d50228e19c8730425cf38931ed411be3d488275316d8c137aa3460d803d1d79c
                                                                                                  • Opcode Fuzzy Hash: 8b88d8e26b668341a928d9462c14d72f862f848481cdca05f81729a9e95dcda9
                                                                                                  • Instruction Fuzzy Hash: 44F0E9622493911FC717567C69B04EA7FF59DC722030940E7E588CF267EA198D8693B1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4f85e580fe7cfb46d53a0e36c54cbe243517ba09d149f655cbdc3ba5b5c18a16
                                                                                                  • Instruction ID: 694d6adbd6f0e94ac0f1698672b6e857a46cd7b5484df3a907735cf271ebb6e5
                                                                                                  • Opcode Fuzzy Hash: 4f85e580fe7cfb46d53a0e36c54cbe243517ba09d149f655cbdc3ba5b5c18a16
                                                                                                  • Instruction Fuzzy Hash: 4A51AE35A002059FCF14DB69D940AADBBB6FF88314F19D0A9D009AB261EF34EC86CB51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 112ede47183cb3278eacc0272de5c0e144e703894dd7aac9565e05cd8f41a688
                                                                                                  • Instruction ID: d79bd14ea5a6a81e2a01fbe3311770d165f72f21fc9b31360031af83e489cadc
                                                                                                  • Opcode Fuzzy Hash: 112ede47183cb3278eacc0272de5c0e144e703894dd7aac9565e05cd8f41a688
                                                                                                  • Instruction Fuzzy Hash: D93148B5900209CFCB14DF99D484B9EFBF0FB48310F24882AD559AB341C735A985CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e386f93af5e4e9ae7cd0dffe3f65dc593516d0d4dfc5657544f95432904cbcf7
                                                                                                  • Instruction ID: e9e93e16a15e87f40fbb075ba8eb80105936b63cad21da1f3836588a2d5d63c0
                                                                                                  • Opcode Fuzzy Hash: e386f93af5e4e9ae7cd0dffe3f65dc593516d0d4dfc5657544f95432904cbcf7
                                                                                                  • Instruction Fuzzy Hash: CF11D332B402059B8B28DF7DA86456EB7EAEF84250304892EE41EDF354FF34DC458B51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: fac419fb5a32d83b26680982237bf679c65693470c829ab7024ddce611f0484c
                                                                                                  • Instruction ID: e67b85f3594928dffb74514961b0c3270f537e3bab8a140fa74d5a27a13fcb38
                                                                                                  • Opcode Fuzzy Hash: fac419fb5a32d83b26680982237bf679c65693470c829ab7024ddce611f0484c
                                                                                                  • Instruction Fuzzy Hash: 862123B5D002198FCF10CF99E884ADEFBF4FB88314F14855AD808BB245D774A944CBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 085b59f4006f80df0e6d8fda8e699521ca163139d31c0ca595c8df39b179aaf1
                                                                                                  • Instruction ID: a2d55753c432e2c8e42f60858dab73739d6975f705b06d9b6934424693d75fe1
                                                                                                  • Opcode Fuzzy Hash: 085b59f4006f80df0e6d8fda8e699521ca163139d31c0ca595c8df39b179aaf1
                                                                                                  • Instruction Fuzzy Hash: 8C2112B6D002198FCF50CFA9D884ADEBBF0BB88314F14855AD808AB245D774A944CFA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8fb2b855c9caec8f47d6836fe42cc2fb17ddac02c2d26f439e5387edde5dd884
                                                                                                  • Instruction ID: 85c37d4482933dc623c7e18b61916e68c054d00cbda562e684add4f62682a4f5
                                                                                                  • Opcode Fuzzy Hash: 8fb2b855c9caec8f47d6836fe42cc2fb17ddac02c2d26f439e5387edde5dd884
                                                                                                  • Instruction Fuzzy Hash: 2921F2B59002499FCB14DF9AD984ADEFBF4FB48324F10842AE959A7300D774AA44CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d31ce6c281160f89730847cbc21f8bc3baa8ac3749f064b50c7e70d3bd3da3cf
                                                                                                  • Instruction ID: d0901bff7edb04658f8c7b9f4e7f092f3dd73c01389819b437d46f4e7e803eec
                                                                                                  • Opcode Fuzzy Hash: d31ce6c281160f89730847cbc21f8bc3baa8ac3749f064b50c7e70d3bd3da3cf
                                                                                                  • Instruction Fuzzy Hash: 3021F4B5D002599FCB20CF9AD484ADEFBF4FB48314F20842AD958A7301D375A945CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b15d0bc532f544f90996eab6d81c003beeeb70a4e0bfd3bfa781f1f305b367ad
                                                                                                  • Instruction ID: 3469dd0b0c377d1df12bd37c692809a8c0672f8906dfb8d39b7a027af07126d7
                                                                                                  • Opcode Fuzzy Hash: b15d0bc532f544f90996eab6d81c003beeeb70a4e0bfd3bfa781f1f305b367ad
                                                                                                  • Instruction Fuzzy Hash: E6019672B406149F8B25DF79A85066E77EAAF84250300992EE41DDB350FF74DC468B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4fe7a6ce8c488124bbe803fe8fb2809242e7a400b421f6241618c047806405a2
                                                                                                  • Instruction ID: 65cf3110c9d8e8f21010ddb3e90aa64aaa4033560f8d5eb6f5919007f4dd98bb
                                                                                                  • Opcode Fuzzy Hash: 4fe7a6ce8c488124bbe803fe8fb2809242e7a400b421f6241618c047806405a2
                                                                                                  • Instruction Fuzzy Hash: 3F0168315492409FC710DB29E88066EFFA6EF86350B08C5ABE46CCF215CB30E989C361
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 23e2f297b10c92670eb0c8d27f9877809541e9af9ae36ef10e60282e4e32a8e2
                                                                                                  • Instruction ID: be80f4a5f6d8622cf222a3e0924988a6756b616b8dcbf9d23531b2d901a9736d
                                                                                                  • Opcode Fuzzy Hash: 23e2f297b10c92670eb0c8d27f9877809541e9af9ae36ef10e60282e4e32a8e2
                                                                                                  • Instruction Fuzzy Hash: F1017532B406159B8B25DE79A41066F77EAAB84250300993EE41DDB354FF34EC468B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4d0bfb04fdb52dff1719752de0fff787089a14c5cbc4b6e3707af57f65af5ebe
                                                                                                  • Instruction ID: 2e2dbe0d936526e6008db94138e4cd156b605e702080ff3445012d97be6cadb6
                                                                                                  • Opcode Fuzzy Hash: 4d0bfb04fdb52dff1719752de0fff787089a14c5cbc4b6e3707af57f65af5ebe
                                                                                                  • Instruction Fuzzy Hash: 74F08B213C43101FCA09267C282077E6E9BDFC5610F048427E60DDF385DE158C8283B5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 04a826f93c20126653988825cd1f91d05913ad62f587544ebf0ddebed6650dea
                                                                                                  • Instruction ID: 1e26c93a0c1181b1ce4a9ad77a1a74fc3bbf9b7ca026e63af767e85c6623ad24
                                                                                                  • Opcode Fuzzy Hash: 04a826f93c20126653988825cd1f91d05913ad62f587544ebf0ddebed6650dea
                                                                                                  • Instruction Fuzzy Hash: D01133B4900649CFCB20DF99D544BDEBBF4EB09324F208459D869B7350D774A980CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 94820bf28d9a25acc5bf63cda1936b88c9de2ee6f03a9c67aa20945b8e6e29f2
                                                                                                  • Instruction ID: 954ade666752d601958e0e30c32ae3b82bee8f0e150f1e322a65bd811b142d22
                                                                                                  • Opcode Fuzzy Hash: 94820bf28d9a25acc5bf63cda1936b88c9de2ee6f03a9c67aa20945b8e6e29f2
                                                                                                  • Instruction Fuzzy Hash: 391133B5C00349CFCB20DF99D584BEEBBF4EB49324F20845AC869A7210C3746980CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e41a38a243a0c76579f67138c7f8cdf04f9dad2e389c5da9cacd84f5aa0a10da
                                                                                                  • Instruction ID: 5f7d6f296a8f51625c340de16e70daf0a8efade31177721f3e2c55f384ee0a57
                                                                                                  • Opcode Fuzzy Hash: e41a38a243a0c76579f67138c7f8cdf04f9dad2e389c5da9cacd84f5aa0a10da
                                                                                                  • Instruction Fuzzy Hash: D5014F75E002155BDB18DA6E98405AFF7EAFFC8360B14C13AE459A7354DA345C018BA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 50e5bfefa2aa7ad624c0eaa699335100bd1ae02b38854e1d82cbe5aa8f694eb4
                                                                                                  • Instruction ID: ddccd11c2620ca15622f568bf1184bab6350e526098c4818530d739c38c14408
                                                                                                  • Opcode Fuzzy Hash: 50e5bfefa2aa7ad624c0eaa699335100bd1ae02b38854e1d82cbe5aa8f694eb4
                                                                                                  • Instruction Fuzzy Hash: 7CF0C8315402405FC724DF25E480AADBBE5EFC5310744C56BE46D8F215DB35D989C760
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f55572bc54669ea18e31783b68ef99da0f3b88626dc30de5202b6af2d8e18ec0
                                                                                                  • Instruction ID: 927a8f77cdf3a751c6da3e1b6a59eab7cb61d66f0c93b539828e13276e29424b
                                                                                                  • Opcode Fuzzy Hash: f55572bc54669ea18e31783b68ef99da0f3b88626dc30de5202b6af2d8e18ec0
                                                                                                  • Instruction Fuzzy Hash: 23F062315402109FC754DE29E480AADBBA5EBC5360B54C66AE46D8F205DB31D989C760
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000022.00000002.3185796021.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E40000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_34_2_2e40000_InstallChainer.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ee50f3f339c5d8850c8c5dcb6cfeb33e9f4150f09c2a3ea7b8854063a9bd704b
                                                                                                  • Instruction ID: 68af5a8b74f3e42bf3f1e64e0fad3c5316abc86a4cc431195c47aac740260aac
                                                                                                  • Opcode Fuzzy Hash: ee50f3f339c5d8850c8c5dcb6cfeb33e9f4150f09c2a3ea7b8854063a9bd704b
                                                                                                  • Instruction Fuzzy Hash: 32E026726402141A8714566C68509BFAB9E9EC9260304813AE50CCB305CF258C4283B0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq$LR^q
                                                                                                  • API String ID: 0-516514815
                                                                                                  • Opcode ID: fcdbdcf9625684f5410dbde6c2207936c1535660f5a7c57bb695fccd4cac11b6
                                                                                                  • Instruction ID: 69c27e7956b39f6494a244f64386f8d4d6d2f35f5c855620b681c58ec46c9b17
                                                                                                  • Opcode Fuzzy Hash: fcdbdcf9625684f5410dbde6c2207936c1535660f5a7c57bb695fccd4cac11b6
                                                                                                  • Instruction Fuzzy Hash: 62312231B042455FEB089B399C5437E3BE6EFC5208F1498AAE606CB295EF39EC058755
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: 8d1931c9c1cfb5d38aada3ae9fd9776a9603b3811c47d417a5b858d620c9e9f1
                                                                                                  • Instruction ID: 669799160962e58f04299e359885236d48109b7dd6caad4892997c59a4d66eb7
                                                                                                  • Opcode Fuzzy Hash: 8d1931c9c1cfb5d38aada3ae9fd9776a9603b3811c47d417a5b858d620c9e9f1
                                                                                                  • Instruction Fuzzy Hash: 0B71C631B00218DFEB049BB5CC546AEB6E7AFC8314F149069D606EB3A4DE75ED528B50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: 44f14d4fb2f30341acb85a52bd1752967651989b53b666a45d6360c9dbd02296
                                                                                                  • Instruction ID: 38c13d8c1c03b3cfe84ff341718b01cf694fe172fb8fa1a777309f43ed1bd086
                                                                                                  • Opcode Fuzzy Hash: 44f14d4fb2f30341acb85a52bd1752967651989b53b666a45d6360c9dbd02296
                                                                                                  • Instruction Fuzzy Hash: D3110830B04159DBFB06A76989143AE7BF79BC9304F64546AC102FB386DE356C0587D1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 16c63381ad8b672939d55b38e53066cb1885b89c9bb02f2373547000544c7040
                                                                                                  • Instruction ID: c48010b4d245cf0a4c9c684e9b4c87c8603602c20f8abbacaf3b445e4595e7ed
                                                                                                  • Opcode Fuzzy Hash: 16c63381ad8b672939d55b38e53066cb1885b89c9bb02f2373547000544c7040
                                                                                                  • Instruction Fuzzy Hash: 8C410D75B011149FCB54DF69D88099EB7B2FF8C714B148169EA05EB360EB31ED42CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f00535b83171b79f35889f045570e5c286cfbb8295cfb4681135ce23c59d74d5
                                                                                                  • Instruction ID: 5abeac97f99ee2d714c0335afeeb8a858e43cc8f17cc27376a0505542e0730af
                                                                                                  • Opcode Fuzzy Hash: f00535b83171b79f35889f045570e5c286cfbb8295cfb4681135ce23c59d74d5
                                                                                                  • Instruction Fuzzy Hash: 022115B1D042498FDB10DFAAC8846EEFBF0FB88324F108529D55967640C7796946CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 273feb031304b0dddb087a8df96225a2a3be6ec24fdc7d8c934658c2b9b9e664
                                                                                                  • Instruction ID: b4f7afa7699f13861cc1238c3497c71217cbb1deccc2d4284d9995b732abc437
                                                                                                  • Opcode Fuzzy Hash: 273feb031304b0dddb087a8df96225a2a3be6ec24fdc7d8c934658c2b9b9e664
                                                                                                  • Instruction Fuzzy Hash: 84014710B182E89BFB1527B41D513AA1BDA8B82388F8464A7C601CB286DD99FC4A0396
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6c1a52786a31eeaa20c951844bb031447edca81f323083030173e4703d77b5c8
                                                                                                  • Instruction ID: 816199dfca755f34def2e8448695bf33fdc73fbae6f75c57ac486ab4c3069325
                                                                                                  • Opcode Fuzzy Hash: 6c1a52786a31eeaa20c951844bb031447edca81f323083030173e4703d77b5c8
                                                                                                  • Instruction Fuzzy Hash: 5F112E34A40108FFDB08DF66D894AAABBB7EF8C321F144019D609A7394CE796C55CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 654b88b7295466a292ea22e9eb9cd6fa66e6bb79e589c0e2f91850ff54b7fba2
                                                                                                  • Instruction ID: 1f16bf6abbfdb00b0570beb9817298226f564a0a387df1418ca263efa517e278
                                                                                                  • Opcode Fuzzy Hash: 654b88b7295466a292ea22e9eb9cd6fa66e6bb79e589c0e2f91850ff54b7fba2
                                                                                                  • Instruction Fuzzy Hash: 5511E3B59042498EDB10DFAAC881AEEFBF4FB88324F10842AD55967250C7746945CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b016eaf401958dadc478bef22e70e514eeefeabc06021f06cc59f972e45b3c90
                                                                                                  • Instruction ID: 526f139ddba5efcf1c37f983a5fb2e0f0485784085a3d84bcb90fa7bad69c526
                                                                                                  • Opcode Fuzzy Hash: b016eaf401958dadc478bef22e70e514eeefeabc06021f06cc59f972e45b3c90
                                                                                                  • Instruction Fuzzy Hash: 89019429708344DBD7155B365C5422FBF579BC6250F0494AADB05CB305ED38EC01C391
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 179f0bb868be5c45758f9bc6fe04dacc230f9e6fd91f061d9172f2418c41d3ce
                                                                                                  • Instruction ID: d50a45201d9790376ca4ca6a0e85ef95abceb66ffd01b903504befa0a5e0fd8d
                                                                                                  • Opcode Fuzzy Hash: 179f0bb868be5c45758f9bc6fe04dacc230f9e6fd91f061d9172f2418c41d3ce
                                                                                                  • Instruction Fuzzy Hash: 4A115431A00115FFCB04DF65D894AAABBB6EF8C312F144019E50AE7394CF796C55CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: bf3e5c10903d5cfceb71e2ab81a30dbb4330264ae855726eb087a5fa9f3a17e6
                                                                                                  • Instruction ID: 0be0924e7a0ce6528728cbb1de11d1185eaef2c8312698a1edf0b83c84764d49
                                                                                                  • Opcode Fuzzy Hash: bf3e5c10903d5cfceb71e2ab81a30dbb4330264ae855726eb087a5fa9f3a17e6
                                                                                                  • Instruction Fuzzy Hash: 44F028247493489FE71527B50C657767BA69FC1214F04E86AD742CA18AEC69BC0543E2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e0fa3302f878421950abc5a9f06bf2e5e373d77c64f329e02688b50171e52ed4
                                                                                                  • Instruction ID: 553412e0241eb0365f28945e4be5c9f8ffe1daa1bbe596d0c44ec51c4a139546
                                                                                                  • Opcode Fuzzy Hash: e0fa3302f878421950abc5a9f06bf2e5e373d77c64f329e02688b50171e52ed4
                                                                                                  • Instruction Fuzzy Hash: 89012630E093099FCB0AAF785DB81167FAADFC160430518AAC345CF1A1F928EC0AC3D2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 317e218508b5c0fb637a95e42c5472e16557cfd2169377beffd55e0bba9632cb
                                                                                                  • Instruction ID: c6abc10a8f8f3465fae236c1f0a2348ed310b63dd7b0afe70bc2f2fcb448ac65
                                                                                                  • Opcode Fuzzy Hash: 317e218508b5c0fb637a95e42c5472e16557cfd2169377beffd55e0bba9632cb
                                                                                                  • Instruction Fuzzy Hash: 37F06234340211CBDB0DA720E95051E7393A7E8624320816AEF0587785EF3DEE438785
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c8747287ab84452b70c5a8d97688999f7892f22bd34a9d61a40b6144ee2de646
                                                                                                  • Instruction ID: ee50a0530ca878217ea84bcaac03fdba68d76a1ca7879e4d79e50f58d3707f86
                                                                                                  • Opcode Fuzzy Hash: c8747287ab84452b70c5a8d97688999f7892f22bd34a9d61a40b6144ee2de646
                                                                                                  • Instruction Fuzzy Hash: E3E02B1164536D6EE31523762C203F73B484F42225F0060E2DF4C8B591C90A9C858390
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 02427e236298410d9e75524d9ff1639d77ac90e54c01e77e3cdabddb1c87ec95
                                                                                                  • Instruction ID: d1d212899a282666d78d01f34e9d93700af055dc303a8005295becf582639289
                                                                                                  • Opcode Fuzzy Hash: 02427e236298410d9e75524d9ff1639d77ac90e54c01e77e3cdabddb1c87ec95
                                                                                                  • Instruction Fuzzy Hash: 3AE0613294450ED7E3113BE158107DB7F16CB551A5F409425E70D50115C926D852C7D1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 06d482b2843b528dce978ef2e6bbc09d25eb2dc25f608995cec536cee3d6e43a
                                                                                                  • Instruction ID: d3964fd7d3392e04109cb5dda137dc00a338278153c0f1a25eb6d894d62068bd
                                                                                                  • Opcode Fuzzy Hash: 06d482b2843b528dce978ef2e6bbc09d25eb2dc25f608995cec536cee3d6e43a
                                                                                                  • Instruction Fuzzy Hash: AFE02015A963547BF70133741D641A97B58CF83059F44BCA3E705E71179915FC454380
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0b03486c2377b56ba2e3386f52554525fab3bede083d4574595d2056784c7049
                                                                                                  • Instruction ID: cfdc0abf57f9a73183839b0a5a575ec0c08761be37e30572b584a4113b065e7e
                                                                                                  • Opcode Fuzzy Hash: 0b03486c2377b56ba2e3386f52554525fab3bede083d4574595d2056784c7049
                                                                                                  • Instruction Fuzzy Hash: 42E06574F402196EDF0C9F7959A422A76CAEBC4615301182D830ACF2D4FA29EC1587C2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5607088516c7694685d33e1e34aa45cd4a5bbd770df6f21c0090d28483b230b1
                                                                                                  • Instruction ID: f9522e7708178f33a393afef00ececa7defb2ac32284cd47227f5b8d4cdc94fa
                                                                                                  • Opcode Fuzzy Hash: 5607088516c7694685d33e1e34aa45cd4a5bbd770df6f21c0090d28483b230b1
                                                                                                  • Instruction Fuzzy Hash: 03E01260F142E895FF2427A45E413A745CD4B8468CF8060BA8B41C6A96DADDFC4513D2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f3114b63154edc5ca57d5f0d063cb33672855f68f382a995398a9fd3780eb35b
                                                                                                  • Instruction ID: 79e4909d6e27059e6db3dc7578c91f9e5faa38b4e7df657710122106a0199edc
                                                                                                  • Opcode Fuzzy Hash: f3114b63154edc5ca57d5f0d063cb33672855f68f382a995398a9fd3780eb35b
                                                                                                  • Instruction Fuzzy Hash: C0E0C2B1D00229DF8B44DFA998001EEBBF4AF48240B10456ADA19E3200E7355A00CB95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: fbc89713c25ea5b31585b6094ac9acc02f72cad9697cece93ab9918f85bac7f1
                                                                                                  • Instruction ID: 77f4f90ab3558f14b549d5caf721566b6da2c504ebc2b514d1b5eb97e837e6dd
                                                                                                  • Opcode Fuzzy Hash: fbc89713c25ea5b31585b6094ac9acc02f72cad9697cece93ab9918f85bac7f1
                                                                                                  • Instruction Fuzzy Hash: 15D0A931390120ABD604A32CE8508B97798DB8A729B0009AAF60ACB320CD92FC00078A
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3c9d192860f353946614565e941396790ebd5f8e67af78b8068e8bcd20e09760
                                                                                                  • Instruction ID: 2284a67f574b9df0a97eb4ba79019a0a49bbc539d68e147d75cd226b728789e7
                                                                                                  • Opcode Fuzzy Hash: 3c9d192860f353946614565e941396790ebd5f8e67af78b8068e8bcd20e09760
                                                                                                  • Instruction Fuzzy Hash: A2E0BF71E00259DFCF14DFA898014DDFBB0EB48254B5046A9D619E7350E73A5902CF94
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d72ed36ecb9c3d0d3963ce58d379212f2fb6227c48df3d525d0cdd73814f55cb
                                                                                                  • Instruction ID: 2acee4394e7183ce5e0a5da3afb7d84bca77287b7a824aae1d74bf42ab4284cf
                                                                                                  • Opcode Fuzzy Hash: d72ed36ecb9c3d0d3963ce58d379212f2fb6227c48df3d525d0cdd73814f55cb
                                                                                                  • Instruction Fuzzy Hash: 73D0A73235001C7B96046719DC8586AB759E7D52607505437FB0687224DD61BC518395
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 20c4b5d475eb125b1013f04e3674a1eeb264ea0d44674508aa67976fd77117d7
                                                                                                  • Instruction ID: b122e94a2e4b88cfde2391176947a5037b6a7537c5d633ba2da85e7a333e3d21
                                                                                                  • Opcode Fuzzy Hash: 20c4b5d475eb125b1013f04e3674a1eeb264ea0d44674508aa67976fd77117d7
                                                                                                  • Instruction Fuzzy Hash: 84C04C353505214FD7049768E06496833659B89719B104095E60A8B7B1CE66DC414B45
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4e5c9add60f0aab87e75a19996bfab4739e7dde746442646c37cfbb1850ebd12
                                                                                                  • Instruction ID: f10d481b17f2dd9dd54e818bbebf6181f550292f2b6e4c3c3093e82264aa0ca0
                                                                                                  • Opcode Fuzzy Hash: 4e5c9add60f0aab87e75a19996bfab4739e7dde746442646c37cfbb1850ebd12
                                                                                                  • Instruction Fuzzy Hash: 87C08C363000045F8609AB11E8804997723A7A82203108023EA0A82A60CA341861C740
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7d784725e4eebf50df0a594fcae0d8d4ce7441808717e65d8903f27522e1641f
                                                                                                  • Instruction ID: 9397370807f136bafa8e95203958cf0c67fb2fa500639283339d8e6c5281badd
                                                                                                  • Opcode Fuzzy Hash: 7d784725e4eebf50df0a594fcae0d8d4ce7441808717e65d8903f27522e1641f
                                                                                                  • Instruction Fuzzy Hash: CEB09B26F5031457DA1016A4640436D5249C744025F519095DF0996205DA3558510340
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 094b98a4193c51b872e66238868bbee3ec2a8c9f7cc142e576c251d8293a5883
                                                                                                  • Instruction ID: d5cff31c996f83a631ac66f80104ab1202d78200e766c2d0aa3f8b1f4f88efda
                                                                                                  • Opcode Fuzzy Hash: 094b98a4193c51b872e66238868bbee3ec2a8c9f7cc142e576c251d8293a5883
                                                                                                  • Instruction Fuzzy Hash: DBB01246654005D2B500A7354CD44B6C0829BC0304BC4FC102602A801E5C14F4001014
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000023.00000003.2989007196.0000000004EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_35_3_4ef0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 742d4b8406f698ec03ec3986a93fb174ebba3d077cc7fe7dd4b5eb8a4a8ee17d
                                                                                                  • Instruction ID: f556d5917dbdca6dc1470c1cc2c39077f536d6c113aa72403f84cf4f039accc8
                                                                                                  • Opcode Fuzzy Hash: 742d4b8406f698ec03ec3986a93fb174ebba3d077cc7fe7dd4b5eb8a4a8ee17d
                                                                                                  • Instruction Fuzzy Hash:
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q
                                                                                                  • API String ID: 0-355816377
                                                                                                  • Opcode ID: 49de6126a25ed2c308bfd19238bcdb34acab8030a87d80f7a1a9605d7dc47859
                                                                                                  • Instruction ID: af4513d53efb912cd85d9f77db92a4583cd757a0502644c039731fd0ee9ef205
                                                                                                  • Opcode Fuzzy Hash: 49de6126a25ed2c308bfd19238bcdb34acab8030a87d80f7a1a9605d7dc47859
                                                                                                  • Instruction Fuzzy Hash: D351B031B00209DFC725DF79D8506AEBBF6FBC5350B15812AEA18DB364DA309C02CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: e804f7cdb8bc4ca2e91683cc3a6d90a4a6b914afcf348f06cfbdeb4739ad8958
                                                                                                  • Instruction ID: 3d61ca5dba8d4558653c1a462cac42af349b52dbcd08ccd0a777551315996d47
                                                                                                  • Opcode Fuzzy Hash: e804f7cdb8bc4ca2e91683cc3a6d90a4a6b914afcf348f06cfbdeb4739ad8958
                                                                                                  • Instruction Fuzzy Hash: 4C71A535B00214DFDB159BB5CC54AAE76E7FFC8304F158429E606AB3A4DE35EC428791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: 2c5838b428263e70cc8e7caaaef2f86d18bfeae9826fc337f78b60d7337643b7
                                                                                                  • Instruction ID: 3e81c34fd26f472ad0f508a7d4237baf90b33edd55303acb25d87961aa177795
                                                                                                  • Opcode Fuzzy Hash: 2c5838b428263e70cc8e7caaaef2f86d18bfeae9826fc337f78b60d7337643b7
                                                                                                  • Instruction Fuzzy Hash: 5851E430704244EFEB159B69D8747AE7BB2EF89318F15846AD506E7385CE396C05CBE0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 28f0b50c53fbc79999194521187583cd2d64554a7145db1e90431ae966e4673b
                                                                                                  • Instruction ID: d98be9aa8dc16bf3ca0ee0f91c12be20046e90d7c8c7e98d36360c3e915cd7ae
                                                                                                  • Opcode Fuzzy Hash: 28f0b50c53fbc79999194521187583cd2d64554a7145db1e90431ae966e4673b
                                                                                                  • Instruction Fuzzy Hash: 0F610635704215CFD724CB69D89456EBBB1FF88318B1681E9EA44DB3A2DB32EC42C791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: da1e48be0fb285aa29c7f5bbc917941dcc08e9594ab09c6ae988cc98fd260f3a
                                                                                                  • Instruction ID: d69731234621af1342d50301bfaf3fd1f8742fdba2f1cc40455aea0b0892c6ee
                                                                                                  • Opcode Fuzzy Hash: da1e48be0fb285aa29c7f5bbc917941dcc08e9594ab09c6ae988cc98fd260f3a
                                                                                                  • Instruction Fuzzy Hash: 50314C36B00224D7DB349E6A9CA46EE7BDAEFC4354F05803ADA06D7344EE30ED058391
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5b479bf67941e1f3f0c9eba529bb9eba1cb41e2211073cb818ecb537e0407a04
                                                                                                  • Instruction ID: 51e03d60c8ec840fb57158e3f0a6eb7f8afe379cf90f43c640ada8dad0a740a0
                                                                                                  • Opcode Fuzzy Hash: 5b479bf67941e1f3f0c9eba529bb9eba1cb41e2211073cb818ecb537e0407a04
                                                                                                  • Instruction Fuzzy Hash: 20411D75B001189FCB55DF69D88499DBBF2FF88714B118169EA05EB360DB32ED41CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 655de56ff24dd09b3c811d71f8fa9799c6dca066437140f18313109469315363
                                                                                                  • Instruction ID: 8168e7977e140aab8109ccfcb1b0b74678624721ad87167a5dd54f6096fb95f9
                                                                                                  • Opcode Fuzzy Hash: 655de56ff24dd09b3c811d71f8fa9799c6dca066437140f18313109469315363
                                                                                                  • Instruction Fuzzy Hash: EC11DA31B00214DBDB248AA59D607EE77EBEB88255F05803ADE06D7344EE34ED068791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 401bc84a65732ef248c6a9faf9e42e60a90a0c8154619e147584ed3615dd5739
                                                                                                  • Instruction ID: ca2b5bf82081af42c24e3c142a8bb1a86949b938f334d458fe9331e230851613
                                                                                                  • Opcode Fuzzy Hash: 401bc84a65732ef248c6a9faf9e42e60a90a0c8154619e147584ed3615dd5739
                                                                                                  • Instruction Fuzzy Hash: 0B21FC75E101189FCB54DF69D8849DDBBB2FF4C714B118169E915EB360EB31A842CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b8bc8c5fb42cdc31fbc3e2ddb1449bc5c7308da9b91055847b080e677f418afd
                                                                                                  • Instruction ID: f451c1d7f35456ddea399d2ada6cdc693e74724b298d3870b35ec036919ddecd
                                                                                                  • Opcode Fuzzy Hash: b8bc8c5fb42cdc31fbc3e2ddb1449bc5c7308da9b91055847b080e677f418afd
                                                                                                  • Instruction Fuzzy Hash: B92115B1D002498FDB20DFAAC8806DEFBF0FB88324F108129D95967240C779694ACFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 20b94ad246ed66eff8f1025b9a997bc54b84b03eec61948a882855b27c5a0386
                                                                                                  • Instruction ID: 65e5d3999dcf18bc8ffabd17bb2da410d40774b68c98c18008220b27c44e40f9
                                                                                                  • Opcode Fuzzy Hash: 20b94ad246ed66eff8f1025b9a997bc54b84b03eec61948a882855b27c5a0386
                                                                                                  • Instruction Fuzzy Hash: 29114F35604215EFCB44DFA8E4B86A9BBB6EF8C319F144019E909A3390DF795C46CBD0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4d74865614af51af1aa8c8c5b0914322394782644029b96214727ef7b2e255dd
                                                                                                  • Instruction ID: 2fa4647203a0bdbf5e55807f4e4a62d3f274da0f7bf4d046b4a7f2a6eeed744e
                                                                                                  • Opcode Fuzzy Hash: 4d74865614af51af1aa8c8c5b0914322394782644029b96214727ef7b2e255dd
                                                                                                  • Instruction Fuzzy Hash: A011E3B19042498ADB20DFAAC881ADEFBF4FB88324F108429D55967250C7756945CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0ee47910986578f1d865c0b8a485babf0f579304cbed32bf3fb97dd8f59b0bc8
                                                                                                  • Instruction ID: fa13c88aa387ad0fa5a4cda57d2bccfb5cf6c8d3a081908b926a599addb45874
                                                                                                  • Opcode Fuzzy Hash: 0ee47910986578f1d865c0b8a485babf0f579304cbed32bf3fb97dd8f59b0bc8
                                                                                                  • Instruction Fuzzy Hash: E6111935A04215EFCB44DF69E878AA9BBB6EF8C318F144019E50AA7390CA799C45CBD0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e24de90d1ce462cd043387df52c12f9291686e01bb4dd657b98f07e35c3ef12c
                                                                                                  • Instruction ID: 09e8144b407b7aa4247b390fd24904d15abbe4ff7a52e781e2f3bdf701574b45
                                                                                                  • Opcode Fuzzy Hash: e24de90d1ce462cd043387df52c12f9291686e01bb4dd657b98f07e35c3ef12c
                                                                                                  • Instruction Fuzzy Hash: D9018470B09345DFCB199F74797911A7FEAEAC160830608AAC64ACF261FD19DC0A87D2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000002.3000461079.0000000004B4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B4D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_2_4b4d000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9232c6aa03b4f9269a0f9ef1440577a93e5c49afaf69ade15a6fbf06d7a4f8ad
                                                                                                  • Instruction ID: 3ddfef4e9ecf71c655ba3e3a9c801982c723e7e6aa02a3869af605291dce83b0
                                                                                                  • Opcode Fuzzy Hash: 9232c6aa03b4f9269a0f9ef1440577a93e5c49afaf69ade15a6fbf06d7a4f8ad
                                                                                                  • Instruction Fuzzy Hash: FD015E7100D3809FE7128B359D94762BFA8EF83224F1885DBE9888F297C2695C45D772
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000002.3000461079.0000000004B4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B4D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_2_4b4d000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9dd3e13653cde0c6fcc5ba4c7e8f27c2ba931629a55233248bf07a9aaa5dad5b
                                                                                                  • Instruction ID: 6ce9fad142e9c6a262e9098d63b31a46bc5bbd9f82550c2212c2099d403b1c0c
                                                                                                  • Opcode Fuzzy Hash: 9dd3e13653cde0c6fcc5ba4c7e8f27c2ba931629a55233248bf07a9aaa5dad5b
                                                                                                  • Instruction Fuzzy Hash: E701DB715083409AE7108E39DD94767BF9CDFC1364F18C5AAED484B386D279E841D6B1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e42675269857b633d8062859ec6da213cf6e67b9520320195faaa54b87db295c
                                                                                                  • Instruction ID: 10512d76ea1f32e2c37c09d77d3f279ffd857ac690d6b9247f1d0cc77d3314ed
                                                                                                  • Opcode Fuzzy Hash: e42675269857b633d8062859ec6da213cf6e67b9520320195faaa54b87db295c
                                                                                                  • Instruction Fuzzy Hash: CF01F931B40115D7EB28AA688AA03EF77F7D7C8714F52412DCA05B7385CE796C0697E1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2ec10d25110170b40a96062f2a4e762a6c6e173dadf2ae95139ce8acb64d3be0
                                                                                                  • Instruction ID: dfdd2abe05a8735e8ca63dbffadbd486c5c56a90921147d96bcd3a1933468b54
                                                                                                  • Opcode Fuzzy Hash: 2ec10d25110170b40a96062f2a4e762a6c6e173dadf2ae95139ce8acb64d3be0
                                                                                                  • Instruction Fuzzy Hash: 9CF09074B45206DFDB0D9F74657911A3BDAEBC1618706086AC24ACF2A0FD29D806C7C2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 543cc348b7366ee6c0fb71cd769af54beb24171dcb8fb0ad3545b9d2e649f0a1
                                                                                                  • Instruction ID: fe8e5d8b1817d494fab7239e560a1156e6d6ea4bf7de747dfcb074ce9ffb2c17
                                                                                                  • Opcode Fuzzy Hash: 543cc348b7366ee6c0fb71cd769af54beb24171dcb8fb0ad3545b9d2e649f0a1
                                                                                                  • Instruction Fuzzy Hash: 3EE0C236300160CFC3045B1CE4646E937B2DF4932870200E6CD45CF272DE22D8928740
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7a4a8d847dd558f9a175888e3c0543dab230d25c5d01fb64d9cbadf03fde43dd
                                                                                                  • Instruction ID: 6439c8e86fe64c4d4a8c6a016b32fdd3dd0372c61468a2d59eba9f24a8256bdf
                                                                                                  • Opcode Fuzzy Hash: 7a4a8d847dd558f9a175888e3c0543dab230d25c5d01fb64d9cbadf03fde43dd
                                                                                                  • Instruction Fuzzy Hash: 43D0A931390120ABD604A32CF8608B977A8DB8A729B0108AAF60BCB320CD92EC0006C9
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d48d40ced7ea3d49d4efe3ad1f227116507705e6d61698ab86a8784d848fc7b1
                                                                                                  • Instruction ID: 14e7d2d5c285e6ffa200910c526f6600506980d523ee2d1a4b39479cbfb13ab8
                                                                                                  • Opcode Fuzzy Hash: d48d40ced7ea3d49d4efe3ad1f227116507705e6d61698ab86a8784d848fc7b1
                                                                                                  • Instruction Fuzzy Hash: 1FD0A73231401CBB96146719DC9586ABBA9EB852647514433FB4283324DD61BC4093D5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2ecabb3cbc206476279f6bd0b8995d56ed9b40ca7a379abf34a986f151a73fd7
                                                                                                  • Instruction ID: d21c4020b9a7d04012e17358e158adf05ab400255122d46f572f67f3e24f8f06
                                                                                                  • Opcode Fuzzy Hash: 2ecabb3cbc206476279f6bd0b8995d56ed9b40ca7a379abf34a986f151a73fd7
                                                                                                  • Instruction Fuzzy Hash: E9D02E363081809FC30AEB95E81946A3F73BB4A22030540ABEE818B2B6CE3004A0E340
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000024.00000003.2998066667.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_36_3_4df0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: bd1da329b0e2f649f265010d43591de6f87fd2da8e73f83f3e874752fee63f15
                                                                                                  • Instruction ID: cdc9cb603d4b07570461f0bdb772b89f1e9ccc4b046b92f73f646b98597a7de6
                                                                                                  • Opcode Fuzzy Hash: bd1da329b0e2f649f265010d43591de6f87fd2da8e73f83f3e874752fee63f15
                                                                                                  • Instruction Fuzzy Hash: 26C080F7D5A950BFE32609041C915D17730F57130438B8265CC4066007511F741791B4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q
                                                                                                  • API String ID: 0-355816377
                                                                                                  • Opcode ID: 977c156e3d6e163fec18e33214d0237d22440c83c32b7eb0dc4c127b124055e6
                                                                                                  • Instruction ID: 1f834cb2249af6f6a1144060add65395c44babc2da9ecbc4a2ec29fe98647c43
                                                                                                  • Opcode Fuzzy Hash: 977c156e3d6e163fec18e33214d0237d22440c83c32b7eb0dc4c127b124055e6
                                                                                                  • Instruction Fuzzy Hash: 1351D331B002099FD714DF79D8546AEBBF6AFC5350B14862AEA18DB368DF349C02CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: 2f660028244e4bfaaa82eb67ffe5a9b4a95e44d7c9e0d499274bc1e0d15db1ee
                                                                                                  • Instruction ID: ece34b0b0095082ace003b7fbfbf2583505985411353aa44dcd2f7a8bdd5cee4
                                                                                                  • Opcode Fuzzy Hash: 2f660028244e4bfaaa82eb67ffe5a9b4a95e44d7c9e0d499274bc1e0d15db1ee
                                                                                                  • Instruction Fuzzy Hash: 16719835B00218DFDB049BB9CC5466EB7ABEFC8314F148929D606EB3A4EE75EC428751
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: 88dafe0f2767fba9ae278cdeecb6d016373bd53575426b4ef3bfd62b386a9798
                                                                                                  • Instruction ID: 7c98852b458780d6d191185841c16ec14c4ebc4932cc459e9aa326fa7d0e69f7
                                                                                                  • Opcode Fuzzy Hash: 88dafe0f2767fba9ae278cdeecb6d016373bd53575426b4ef3bfd62b386a9798
                                                                                                  • Instruction Fuzzy Hash: 9351F430B00244AFE704AF68D8647AE7BF6EFC9314F14896AD606E7395CE786C05CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8c21c147407d142b05deb36dd901a93df9739b84612e88201e9ff4d5d487fcba
                                                                                                  • Instruction ID: 5a6808929e44de8c3b1cc2f9c9b73ddf76bfe6a1d60216d82a862cf4b0c6ab75
                                                                                                  • Opcode Fuzzy Hash: 8c21c147407d142b05deb36dd901a93df9739b84612e88201e9ff4d5d487fcba
                                                                                                  • Instruction Fuzzy Hash: 1E51BF35B00215CFDB14DBA8D8906AEB7B6FF88314F148AA9D504DB391DB36EC42CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1d1770bad3f85e7049a09110a8a1aeb7d53a88e2873c9f2a24d4963c401406b0
                                                                                                  • Instruction ID: 0f588831f5e0945e6dbfef5ce6fac2a6753c692cc136c298241dfec7e32754d7
                                                                                                  • Opcode Fuzzy Hash: 1d1770bad3f85e7049a09110a8a1aeb7d53a88e2873c9f2a24d4963c401406b0
                                                                                                  • Instruction Fuzzy Hash: 87316B32B00224D7DB20AE69DD946AE7B9AEFC4214F044A3BDF06D7255EE74ED068790
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c087b8101132f017d5969479cf9269574fe2d52784ec1372fdeb878a6143e374
                                                                                                  • Instruction ID: c125b7decb118c984f56e257abc765b54d7ae01f15cb820a4593f7636c8d3022
                                                                                                  • Opcode Fuzzy Hash: c087b8101132f017d5969479cf9269574fe2d52784ec1372fdeb878a6143e374
                                                                                                  • Instruction Fuzzy Hash: 8C412F75B001149FCB54DF68D88099DBBB2FF8D714B108169E905EB360DB31EC42CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ec5f2d89e36198b126a8a3b4f386fe91b6a497eae3862a05462f6dfc338ace6d
                                                                                                  • Instruction ID: 57f0b25d15294e1408a07e07f570baf581189fac0be6a01a5d1c7f3c690b91cd
                                                                                                  • Opcode Fuzzy Hash: ec5f2d89e36198b126a8a3b4f386fe91b6a497eae3862a05462f6dfc338ace6d
                                                                                                  • Instruction Fuzzy Hash: B2113A32B00214DBDB109E698C446AEB7EEEBC8255F04493BDA06D7355EE74DD068791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5f048ae057e3d105ebbea7bcd9993f3f82034d303820f4674fc55fc8a86f5c52
                                                                                                  • Instruction ID: 77d3771ded591dfd0f55315121fa6012fc7cc62e3b14d623d6691df6e0af0f69
                                                                                                  • Opcode Fuzzy Hash: 5f048ae057e3d105ebbea7bcd9993f3f82034d303820f4674fc55fc8a86f5c52
                                                                                                  • Instruction Fuzzy Hash: C521F975E102089FCB44DF68D88099DBBB2FF8C715B10856AE915EB360DB319842CF50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a51ab80ccd551e0a9993d5d69908f57c3a7157e3afa2be86ab5494d166821a78
                                                                                                  • Instruction ID: 8c590a1c95a6de625e2f1199fb315d0e8c11594dcdb544e60d6a3f4a1afa37e6
                                                                                                  • Opcode Fuzzy Hash: a51ab80ccd551e0a9993d5d69908f57c3a7157e3afa2be86ab5494d166821a78
                                                                                                  • Instruction Fuzzy Hash: 76115175600115EFD704DFA4D459AA9BBBAEFCC310F14881AE40AE73A4CF795D85CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ae7e674a8a1ee8b694e30d00a1c85ccde850d537761ed1dc645385d872f79a4d
                                                                                                  • Instruction ID: 1fe1f79bface21c600af83f0843f70fddac1afe2a7e6946f4bec04465d217e72
                                                                                                  • Opcode Fuzzy Hash: ae7e674a8a1ee8b694e30d00a1c85ccde850d537761ed1dc645385d872f79a4d
                                                                                                  • Instruction Fuzzy Hash: 692102B1904209CFDB10DFAAC884ADEFBB4FF88324F10842AD559A7240C7796945CFA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 55983e7bf6d70e003704db97230b11dbbf04dbbed75d328ac27caf09c139a50e
                                                                                                  • Instruction ID: a1d4031242074eaa4f36bc2800baad447328f3a4e683cd4278eef95cfd2e88fd
                                                                                                  • Opcode Fuzzy Hash: 55983e7bf6d70e003704db97230b11dbbf04dbbed75d328ac27caf09c139a50e
                                                                                                  • Instruction Fuzzy Hash: 531110B0904209CBDB10DFAAC884AEEFBF4FB88324F10842AD559A7240C775A945CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 57cc7b09756410adb0a5ba2eb0c12a16d3897670fc6c8c0b80f95f2ae2406a6d
                                                                                                  • Instruction ID: 3733d0ffc5b0967e579a5b058cc49695b5647798e952a0b3db32959f1f30323b
                                                                                                  • Opcode Fuzzy Hash: 57cc7b09756410adb0a5ba2eb0c12a16d3897670fc6c8c0b80f95f2ae2406a6d
                                                                                                  • Instruction Fuzzy Hash: 61113D71600115BFDB04DFA4D858AA9BBBAEFCC310F14481AE50AE73A4CF795D85CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3d0053082e8b4a168641e6607390675529df34473ab3a89f3b924b05eb4fcaec
                                                                                                  • Instruction ID: be4bdbfa57e659e6f9c9b3f1365eabd4341dd3866ee448afa47f64f4a9cc4fe0
                                                                                                  • Opcode Fuzzy Hash: 3d0053082e8b4a168641e6607390675529df34473ab3a89f3b924b05eb4fcaec
                                                                                                  • Instruction Fuzzy Hash: 1C0184306053495FCB09AFB869792267FDEDFC16047050DAEC649CB261ED14DC068792
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000002.3009386350.000000000464D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0464D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_2_464d000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 69b70639b27b431450442c555b50f8b9d4e17935d2937fbc491c6d624edfe8ca
                                                                                                  • Instruction ID: 2d88dbcc2b31d64c9a83e5d1abda32eae8dcf596f78d9a537a66c260a301ae29
                                                                                                  • Opcode Fuzzy Hash: 69b70639b27b431450442c555b50f8b9d4e17935d2937fbc491c6d624edfe8ca
                                                                                                  • Instruction Fuzzy Hash: 5301DB71908340AAEB104F25DDC4B67BF98DF91724F18C56AED484B246E279E846C6B1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000002.3009386350.000000000464D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0464D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_2_464d000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2a9da67e2a8865d689b7dba9433d0af904d6a8b28cb493f2a96bb915179c0a12
                                                                                                  • Instruction ID: db9fbba69e5766d151348b3c02908eb6a77bb38f94fed103ea812cb6a16d5a23
                                                                                                  • Opcode Fuzzy Hash: 2a9da67e2a8865d689b7dba9433d0af904d6a8b28cb493f2a96bb915179c0a12
                                                                                                  • Instruction Fuzzy Hash: BF01526140D3C05FD7128B259894B56BFB4EF53624F1DC5DBD8888F293C2699848C772
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d2ab7166566fd3cd68fcd31d2a6eecc81b09fd0b10a5ab9abdda0e30d5482c96
                                                                                                  • Instruction ID: 9bdb7e378853480455942943b4b830262aa6925a40673fcc8b9771c218d356f5
                                                                                                  • Opcode Fuzzy Hash: d2ab7166566fd3cd68fcd31d2a6eecc81b09fd0b10a5ab9abdda0e30d5482c96
                                                                                                  • Instruction Fuzzy Hash: E801AD31F50209CBEB189A58C6643AE76F3AB88714F60496EC202E7391CEB92C059B81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 92c97633024fea0d4ac54936cab365d1d1227c69e283084264bdf925ccdd10c0
                                                                                                  • Instruction ID: 2aefb1b8680492377e96609451eb7fb7c12dcb4a3216568c37327dde786d11c0
                                                                                                  • Opcode Fuzzy Hash: 92c97633024fea0d4ac54936cab365d1d1227c69e283084264bdf925ccdd10c0
                                                                                                  • Instruction Fuzzy Hash: F7F09030A402055FCB0DAFB8952922A7FDAEFC0604B050D6EC28ACF260ED24DD0687C2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4939afdbf82d63a7d9bba5919b0f056cd68d80c7021513c11c95cc78ec486ab8
                                                                                                  • Instruction ID: 4f558ffd9f270437fa77f0894d498f9252312af8fd1a2acadc87cb3abf02cc75
                                                                                                  • Opcode Fuzzy Hash: 4939afdbf82d63a7d9bba5919b0f056cd68d80c7021513c11c95cc78ec486ab8
                                                                                                  • Instruction Fuzzy Hash: 77E0C276289791CFC3025B6CE8204E83BF1AF4B23530208D3D145CF272EE2A5C96CB45
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8d8521fc275358a0b58d7a229315a4e18dcbbc503263281dae8aa201bfa76b1b
                                                                                                  • Instruction ID: 8f40e673d90d1f4ecbb0da7308b71c2710d09d8fa08f58ba4643e2788d37d0cb
                                                                                                  • Opcode Fuzzy Hash: 8d8521fc275358a0b58d7a229315a4e18dcbbc503263281dae8aa201bfa76b1b
                                                                                                  • Instruction Fuzzy Hash: 8BD0A7313901245FD604531CD450879779CDF8971AB00096AF70AC7330CD51EC410689
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 64a51f73e0dd09b84850322161e48bb3ff55c13bcae2e97f136316b5b4de4fdc
                                                                                                  • Instruction ID: 2097722872244467e04554d7db8db11d4864fb7a34fc089c216eaaca73741ef4
                                                                                                  • Opcode Fuzzy Hash: 64a51f73e0dd09b84850322161e48bb3ff55c13bcae2e97f136316b5b4de4fdc
                                                                                                  • Instruction Fuzzy Hash: 27D0A73232001C6B56046618EC9986ABB99E7992613904933FB02C3224DD61BC459396
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5a8f9800d29bd28d293b33e49b22fbb242a2c69d280cfa3aace3f33908e2c2d7
                                                                                                  • Instruction ID: 45528fb58e36bfffc334083b4af0623ae1c32285fdca292029e6d0891e5b6d23
                                                                                                  • Opcode Fuzzy Hash: 5a8f9800d29bd28d293b33e49b22fbb242a2c69d280cfa3aace3f33908e2c2d7
                                                                                                  • Instruction Fuzzy Hash: 58D0A73635D6804FD309E758F4650697FB2AB5732231504ABE541CB1FADD240862C761
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000025.00000003.3007303725.00000000048F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048F0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_37_3_48f0000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 28a8159c5aad6fdce67b7cb59f4f0af597cbe7619a28ee4b5e42a72189210153
                                                                                                  • Instruction ID: 6094cd4288bcca2ffb49d32e7e7f57fbcc6091a3473aca08aacd368367b3eb04
                                                                                                  • Opcode Fuzzy Hash: 28a8159c5aad6fdce67b7cb59f4f0af597cbe7619a28ee4b5e42a72189210153
                                                                                                  • Instruction Fuzzy Hash: EFC08CB3EA0A108BE2288A0404012E5A3A0EB71326B80CA2EC284C0105922D50578918
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegQueryValueExA.KERNEL32(?,00000000,?,?,00000000,?), ref: 0738447F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000026.00000003.3037049952.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_38_3_7380000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: 8615ef4cab381bef1a065a18e328507d707d864aa86b5dd3e5a6b990f55dcba3
                                                                                                  • Instruction ID: c5f904f56ac5a1b466e08cc3250959c7e57a107b02c7659e7ddee6c3af885df3
                                                                                                  • Opcode Fuzzy Hash: 8615ef4cab381bef1a065a18e328507d707d864aa86b5dd3e5a6b990f55dcba3
                                                                                                  • Instruction Fuzzy Hash: BC7158B0D0035ADFEB54DFA9C880B9EBBF1BF48314F148129E859A7650DB75A941CF81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegQueryValueExA.KERNEL32(?,00000000,?,?,00000000,?), ref: 0738447F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000026.00000003.3037049952.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_38_3_7380000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: QueryValue
                                                                                                  • String ID:
                                                                                                  • API String ID: 3660427363-0
                                                                                                  • Opcode ID: 9e9e46d00a25c7c5572754288cc441ddf293c34c18c9efa3871a838a99f2ea3a
                                                                                                  • Instruction ID: 54db3596747e65eebc6c4ecd6cf391a821b1fbe617627daaa22a6cadc6db33f9
                                                                                                  • Opcode Fuzzy Hash: 9e9e46d00a25c7c5572754288cc441ddf293c34c18c9efa3871a838a99f2ea3a
                                                                                                  • Instruction Fuzzy Hash: 9F7168B0D0035ADFEB14DFA9C880B9EBBB1FF48314F148129E859A7650DB75A941CF81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegOpenKeyExA.KERNEL32(?,04F6A2B0,?,?,?), ref: 0738422C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000026.00000003.3037049952.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_38_3_7380000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Open
                                                                                                  • String ID:
                                                                                                  • API String ID: 71445658-0
                                                                                                  • Opcode ID: f557f21970f0d2ba7614367d9ab2579a038af270d246787d5c2f24ccaa333c54
                                                                                                  • Instruction ID: 946aab78371e608d186068b5d690d9f08bb6a1897a72a8ee158976f619ffc688
                                                                                                  • Opcode Fuzzy Hash: f557f21970f0d2ba7614367d9ab2579a038af270d246787d5c2f24ccaa333c54
                                                                                                  • Instruction Fuzzy Hash: 154155B4D0039A9FEB40DFA9C88079EBBF1FB48314F208129E818AB650DB749841CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegOpenKeyExA.KERNEL32(?,04F6A2B0,?,?,?), ref: 0738422C
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000026.00000003.3037049952.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_38_3_7380000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Open
                                                                                                  • String ID:
                                                                                                  • API String ID: 71445658-0
                                                                                                  • Opcode ID: eaf226b9fab9b078f7961681ed2d66806f926a207c8d7718304875dadd7f2609
                                                                                                  • Instruction ID: 2d41f1b172f46cb5447d1653669012f80ddf62c8b0a644e88c5274e0169dd3c6
                                                                                                  • Opcode Fuzzy Hash: eaf226b9fab9b078f7961681ed2d66806f926a207c8d7718304875dadd7f2609
                                                                                                  • Instruction Fuzzy Hash: E24165B5D0439A9FDB40DFA8D88079DBFF1BB48304F248129E858AB690DB749841CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 07383D85
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000026.00000003.3037049952.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_38_3_7380000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DispatcherExceptionUser
                                                                                                  • String ID:
                                                                                                  • API String ID: 6842923-0
                                                                                                  • Opcode ID: 0bb6a1b2f40a28f06414eba423bd76ce82d00a88d5bc9777a8ceaef630df790a
                                                                                                  • Instruction ID: 12d4fb606288212687a2e6468085d150f7c7b943199a21008c341f93f34cf4d4
                                                                                                  • Opcode Fuzzy Hash: 0bb6a1b2f40a28f06414eba423bd76ce82d00a88d5bc9777a8ceaef630df790a
                                                                                                  • Instruction Fuzzy Hash: B431E8B9740204EFD718EB64E944AAD37B6FFD8714F104029F60697360DB38AC46CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegCloseKey.KERNEL32(00000000), ref: 073845BF
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000026.00000003.3037049952.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_38_3_7380000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Close
                                                                                                  • String ID:
                                                                                                  • API String ID: 3535843008-0
                                                                                                  • Opcode ID: 837b64dddbd4602d552134f300ed575b3ebef14b58b6eaeb7d3b6ba35dd3131e
                                                                                                  • Instruction ID: ee36355fced1630710b2bcb0241ddbcdd77f6aa614e74ef9f514eea618372fc5
                                                                                                  • Opcode Fuzzy Hash: 837b64dddbd4602d552134f300ed575b3ebef14b58b6eaeb7d3b6ba35dd3131e
                                                                                                  • Instruction Fuzzy Hash: EE1152B580024ACFDB20DF9AC544BDEFBF4EB48324F208429D928A7700D778A944CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • RegCloseKey.KERNEL32(00000000), ref: 073845BF
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000026.00000003.3037049952.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_38_3_7380000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Close
                                                                                                  • String ID:
                                                                                                  • API String ID: 3535843008-0
                                                                                                  • Opcode ID: 5e11b5fc071530353c14685733f99dc0a0a190f3061ef58bf9fdbb22edb3dedc
                                                                                                  • Instruction ID: 605ceca08b7dea762b755b92ebd37bff9f8ccb4eb730060da6a6a65098d7f766
                                                                                                  • Opcode Fuzzy Hash: 5e11b5fc071530353c14685733f99dc0a0a190f3061ef58bf9fdbb22edb3dedc
                                                                                                  • Instruction Fuzzy Hash: 6F1152B580024ACFCB10CF9AC584BDEFFF4EB48324F20842AD928A7640C734A945CFA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 07383D85
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000026.00000003.3037049952.0000000007380000.00000040.00000800.00020000.00000000.sdmp, Offset: 07380000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_38_3_7380000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DispatcherExceptionUser
                                                                                                  • String ID:
                                                                                                  • API String ID: 6842923-0
                                                                                                  • Opcode ID: 3b4636ea81f84f7222a245546a3c3a1e9e476000ff894cdaf08ba2db217dc20f
                                                                                                  • Instruction ID: e0c71b922fd28b23d848efe4790a8a85b9bd96971f5cf9ff818de499f323e79c
                                                                                                  • Opcode Fuzzy Hash: 3b4636ea81f84f7222a245546a3c3a1e9e476000ff894cdaf08ba2db217dc20f
                                                                                                  • Instruction Fuzzy Hash: 86E0C2B6B00114FB87189B75FA0CC3B77AEEBDA261300442BFA06D3200D93CAC0286B1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000026.00000002.3039688812.0000000004CBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CBD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_38_2_4cbd000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 88d24559d2ee240bcbed26befd404a8f9f992b33c551fef41cae57b437110277
                                                                                                  • Instruction ID: a2e60686ade68b81600ec6c35587489ae5ab47929f2d179df71bee99b364627b
                                                                                                  • Opcode Fuzzy Hash: 88d24559d2ee240bcbed26befd404a8f9f992b33c551fef41cae57b437110277
                                                                                                  • Instruction Fuzzy Hash: B6214571604200DFCB05DF14DAC0B67BF66FB98314F248969D84E4B256C336E456CAE1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000026.00000002.3039688812.0000000004CBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CBD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_38_2_4cbd000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 402c6a8559748647fef594cd0c7d6ed57cea98399c5c457cfc3d558c3163147f
                                                                                                  • Instruction ID: 546472da5129eaf2054c88b71abbd0f9ae41893c950def0379a307fcd8f441b3
                                                                                                  • Opcode Fuzzy Hash: 402c6a8559748647fef594cd0c7d6ed57cea98399c5c457cfc3d558c3163147f
                                                                                                  • Instruction Fuzzy Hash: 99112672504240CFCB02CF10D5C4B56BF72FB94314F24C6A9DC4A0B256C336E55ACBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000026.00000002.3039688812.0000000004CBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CBD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_38_2_4cbd000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c8577c74038b0e1f5a389d812e57a1d488595ac830db3ba0e2392bd386d261fe
                                                                                                  • Instruction ID: d5e3d41463eec2d1f444902794cf99e8f7bf6c700d3b377ed9d5b3976684955e
                                                                                                  • Opcode Fuzzy Hash: c8577c74038b0e1f5a389d812e57a1d488595ac830db3ba0e2392bd386d261fe
                                                                                                  • Instruction Fuzzy Hash: B501926100E7C05ED7138B259894792BFB4DF43224F0CC0DBD8888F193C2699845C7B2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000026.00000002.3039688812.0000000004CBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CBD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_38_2_4cbd000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: bcb26539336ef979a3eecca7c279afc30054ab1208efde13cbf4cb9018eb7932
                                                                                                  • Instruction ID: 6a4ddd6c3e17c6efcdd5ee821eb5f00042d93e6aa3e9a261834519dc45d2c1a6
                                                                                                  • Opcode Fuzzy Hash: bcb26539336ef979a3eecca7c279afc30054ab1208efde13cbf4cb9018eb7932
                                                                                                  • Instruction Fuzzy Hash: 62012B71108B009AE7114E26FDC47A7BF99DF41324F0CC52AED8A0B246D679E941C6F2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: fcq$(bq$LR^q
                                                                                                  • API String ID: 0-1659346014
                                                                                                  • Opcode ID: 6ef85da38000a53cb7756765389562a1f40abd4cf20d6a03c13c1cff78ceb0f3
                                                                                                  • Instruction ID: 7c877b0ea8397c41460e4bf2a3244333493ddcad62b5b4000bb54444820fbd57
                                                                                                  • Opcode Fuzzy Hash: 6ef85da38000a53cb7756765389562a1f40abd4cf20d6a03c13c1cff78ceb0f3
                                                                                                  • Instruction Fuzzy Hash: 31C1DE32B002159FEB099F74981076EBBE2BFC5705F2485A9E406AB395EF34ED46C781
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq$(bq$(bq$$^q
                                                                                                  • API String ID: 0-2201410301
                                                                                                  • Opcode ID: 97865204e6aeafa437285ac247cd61b848ca9ed24078da20725f2de55725af63
                                                                                                  • Instruction ID: 566de263a7fe339ab5fbb171982cb9816ce64ac6a9b1add24a8829336c7b4ddd
                                                                                                  • Opcode Fuzzy Hash: 97865204e6aeafa437285ac247cd61b848ca9ed24078da20725f2de55725af63
                                                                                                  • Instruction Fuzzy Hash: 0DA1E570B082159BEF255F69841476EBBF59BC9B42F544439FC06EB381FA78EC018B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q
                                                                                                  • API String ID: 0-355816377
                                                                                                  • Opcode ID: e84b34f4a11efb584f70e00a305a50cc01adf1d695150b93726f8cdf0715ad39
                                                                                                  • Instruction ID: 7317cc12f24bd2a838d4555dc91a39ccc245e6dd0d024a56606f93040ecc8d3a
                                                                                                  • Opcode Fuzzy Hash: e84b34f4a11efb584f70e00a305a50cc01adf1d695150b93726f8cdf0715ad39
                                                                                                  • Instruction Fuzzy Hash: 7051C471B002099FC715DF78D950AAEBBF6FFC9351B14812AE414DB364EA30AC42CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: b5f3ca92fbcb9c83cc1fa6d043a9c9338f37425c35f0239cc0a0cc2002f66e18
                                                                                                  • Instruction ID: ee9d8c1188145609378cb929f01e16a25986665599e44819afc1ebc78a9d4e12
                                                                                                  • Opcode Fuzzy Hash: b5f3ca92fbcb9c83cc1fa6d043a9c9338f37425c35f0239cc0a0cc2002f66e18
                                                                                                  • Instruction Fuzzy Hash: 7271C531B00214DFDB049BB5C954AAEBBE7AFC8711F158439F506AB3A4EE35EC428750
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: fcq
                                                                                                  • API String ID: 0-2768158334
                                                                                                  • Opcode ID: df2148209baac5ded1d75cb396932380720957fb5e6b30c372c94c10eafd559f
                                                                                                  • Instruction ID: ca366fa8eabcffdaea7a6d828549a10cb20b07d4bcc1dd683f861ecac0f754cc
                                                                                                  • Opcode Fuzzy Hash: df2148209baac5ded1d75cb396932380720957fb5e6b30c372c94c10eafd559f
                                                                                                  • Instruction Fuzzy Hash: 4B510132A006169BDB15CF64C5107AEBBB2BFC1745F14C5A9E805AF285FB74EC46CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: f712a983c47bdee69fd351abb4a5a970a3c11f67a896283f6db88221237ac375
                                                                                                  • Instruction ID: 98b9b6cb925d2a21ec55b17e1c19f0d020b0b38a1931251cfdb549ceee9e78d7
                                                                                                  • Opcode Fuzzy Hash: f712a983c47bdee69fd351abb4a5a970a3c11f67a896283f6db88221237ac375
                                                                                                  • Instruction Fuzzy Hash: FB51F530B08254AFE704AF68D4547AE7FF2EF89315F14846AE406E7385DE38AC06CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: (bq
                                                                                                  • API String ID: 0-149360118
                                                                                                  • Opcode ID: a9601d5782eebc77a4c2f396ebde6bfb084867956ccf8b8a8bb295aaa31f7967
                                                                                                  • Instruction ID: 8c9e37accad2fda12e5f7f9fa1c323ee3216cbc5c66962e59e56e7b0a98b97ca
                                                                                                  • Opcode Fuzzy Hash: a9601d5782eebc77a4c2f396ebde6bfb084867956ccf8b8a8bb295aaa31f7967
                                                                                                  • Instruction Fuzzy Hash: D1517070E482099FDB45DFA9C4546AEBBF2EF88301F14846DD805B7344EB349942CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: LR^q
                                                                                                  • API String ID: 0-2625958711
                                                                                                  • Opcode ID: 75475b9a2a00aa8d828dcc140d778e27471c4176c2d221e0493ae7ca8f6d5339
                                                                                                  • Instruction ID: 3b084ec713e85ff073b5baef100bbca6431d811ec18af624a8f3589e1d1f5520
                                                                                                  • Opcode Fuzzy Hash: 75475b9a2a00aa8d828dcc140d778e27471c4176c2d221e0493ae7ca8f6d5339
                                                                                                  • Instruction Fuzzy Hash: 3B2100327042155FDB04CF28A8867BF7BABEF84616F2484BDF406C7288FB34A8018390
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: LR^q
                                                                                                  • API String ID: 0-2625958711
                                                                                                  • Opcode ID: 8a24f7ed3328eb9eff15fda8746f23111e3d3d8a60281d894022c67296685128
                                                                                                  • Instruction ID: 11d444dc08b59dd9289f424c39248dbd5e82e83690add11a8da2697f45a4af20
                                                                                                  • Opcode Fuzzy Hash: 8a24f7ed3328eb9eff15fda8746f23111e3d3d8a60281d894022c67296685128
                                                                                                  • Instruction Fuzzy Hash: 2F21AE327041155BEB149F28985577F7BAAEF84616F2488BDF406D7288FB34A9018754
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7da400f58689ca979ba16f687e502f82b0e389b12b23ad00e5f866923f097c83
                                                                                                  • Instruction ID: aa0c3185725ded3142343ee391bfd1fd9f086bf9fadc665d83348d4caae8d539
                                                                                                  • Opcode Fuzzy Hash: 7da400f58689ca979ba16f687e502f82b0e389b12b23ad00e5f866923f097c83
                                                                                                  • Instruction Fuzzy Hash: 0B3127313082148FDB15DF69D8506AE7BE9EF85252F10847AE94ACB291EA35E905C790
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5a2334381b985e42b46e93fc9e4a64c89935e70b7fd67051913391c87562d2c2
                                                                                                  • Instruction ID: 12fe494884f03b0544ec4dc9d854115c70f65cb52fd71966496664b9fd405cf0
                                                                                                  • Opcode Fuzzy Hash: 5a2334381b985e42b46e93fc9e4a64c89935e70b7fd67051913391c87562d2c2
                                                                                                  • Instruction Fuzzy Hash: CB41BD35B042049FDB08AB35E45076EBBE7EBC5715B148569F80AEB384EE35FD028B94
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f7bfafdbd39d93690bd285665622ed1bf6aa9ad43cc53f617c8f7c6e90bf243e
                                                                                                  • Instruction ID: 881a8f7097971af60167afd4b5ac0ca4dde57c1940fdb12efb376fdc5babc3da
                                                                                                  • Opcode Fuzzy Hash: f7bfafdbd39d93690bd285665622ed1bf6aa9ad43cc53f617c8f7c6e90bf243e
                                                                                                  • Instruction Fuzzy Hash: E741FC36B102149FCB54DF68D98099EBBB2FF88715B148169E905EB364EB31EC42CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d84449f4cdc334205978fb7f80a7e4a78d2a0d9cbf6a90f9027031224d697f37
                                                                                                  • Instruction ID: ffe6122a4df0a58ac83065cea2f665859246f09be1bd892d76b4df8057db64ff
                                                                                                  • Opcode Fuzzy Hash: d84449f4cdc334205978fb7f80a7e4a78d2a0d9cbf6a90f9027031224d697f37
                                                                                                  • Instruction Fuzzy Hash: 9E21E470B042599FEB14DFA8C4583EE7FF1AB8D215F10442AE401F7241EE785C49CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 07a9b6f0342b57884232ff4e10f2ad73dd3002bcf78b4adf1c45e02d091e00fd
                                                                                                  • Instruction ID: b92b87e3dbfc244bb625094e8a49036d639d66ee6f91eb1c2d93f511c47075dd
                                                                                                  • Opcode Fuzzy Hash: 07a9b6f0342b57884232ff4e10f2ad73dd3002bcf78b4adf1c45e02d091e00fd
                                                                                                  • Instruction Fuzzy Hash: 0411DA31B01314D7EB148B699950AEEBBEADBC8652F04403AE906D7345FE74DD028791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2e36d0be59a98b4c9ce16144f13aec707d6c718da8747c86f1230ee248662512
                                                                                                  • Instruction ID: 956dddf933629c269bbf68bcfea53bafddb244b8b6ca712abd7eeee149011f93
                                                                                                  • Opcode Fuzzy Hash: 2e36d0be59a98b4c9ce16144f13aec707d6c718da8747c86f1230ee248662512
                                                                                                  • Instruction Fuzzy Hash: 34219270A091149FDF159B69C1687AEBBF1EB88701F148429E805E7350EB789846CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1a7061278fe28bc771417bfe6642a6cb5eddae759ace3dfb771e578779cf1523
                                                                                                  • Instruction ID: 4250d452b5ea586fecd07fb81bc5c1fad71f905eac496ea1753b862c0698781d
                                                                                                  • Opcode Fuzzy Hash: 1a7061278fe28bc771417bfe6642a6cb5eddae759ace3dfb771e578779cf1523
                                                                                                  • Instruction Fuzzy Hash: 11219930A44115EFDB04EF64D95099D7FB6EF8C315F14802AE809A7391EF75AC45CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 56d5f906c2d8e040e057d746ac503b46b16199bc9d8d72a79fd8d4ed9a436b5e
                                                                                                  • Instruction ID: 26aebdb46a9f0848d124ecf17b21407b89817f0d2fc67bdb4942feda3d1ab4fd
                                                                                                  • Opcode Fuzzy Hash: 56d5f906c2d8e040e057d746ac503b46b16199bc9d8d72a79fd8d4ed9a436b5e
                                                                                                  • Instruction Fuzzy Hash: 6211BC35B042049FDB18DB35A54076EBBBAEBC5615B1480BAF805E7394EE34FD02CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4c7c839480e0654dc1e509e7f4c3e05bf33b4cd61c4419e994ae2802342d0cea
                                                                                                  • Instruction ID: 76335d2aacbc39bfc9acc56074b27840d90a9223fe71f44fba0bd32e9a2a5b77
                                                                                                  • Opcode Fuzzy Hash: 4c7c839480e0654dc1e509e7f4c3e05bf33b4cd61c4419e994ae2802342d0cea
                                                                                                  • Instruction Fuzzy Hash: F0211775A112189FCB54DF69D8849DEBBF1EF8D710B10816AE815AB320EB31A842CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 49d03af0092f72ae74a2a80482d23cf21ec5593f3e4c862507326314a6adeacf
                                                                                                  • Instruction ID: 08f34dc24bed4e7e6f34e484467c0d1a97166b78d45ace1740feff62b902287e
                                                                                                  • Opcode Fuzzy Hash: 49d03af0092f72ae74a2a80482d23cf21ec5593f3e4c862507326314a6adeacf
                                                                                                  • Instruction Fuzzy Hash: A5114530A04105AFDB04EF64D950AADBBB6EF8C315F158429E409A7395EF75AC45CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7b7b2a0e849dad4333cc4e808b289015ea35e79c008add1d52f44717927f2c2a
                                                                                                  • Instruction ID: ce55e3b241a3104ccf9aef8c7a540c6e1bf230f0a91c2705975862b116bb13f6
                                                                                                  • Opcode Fuzzy Hash: 7b7b2a0e849dad4333cc4e808b289015ea35e79c008add1d52f44717927f2c2a
                                                                                                  • Instruction Fuzzy Hash: 26117F30A04155EFCB04DF64E459AA9BFB6EF8C321F15442AE809A7381DF39AC45CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5d8f3b84a8a80d53574ded2b9b8ca10314eedef8701c6b00b5e65b24ecc0c24e
                                                                                                  • Instruction ID: d626a0699f16cf3c5c9c4f38841df48ea65045815c7e79c7b6cbd51377356266
                                                                                                  • Opcode Fuzzy Hash: 5d8f3b84a8a80d53574ded2b9b8ca10314eedef8701c6b00b5e65b24ecc0c24e
                                                                                                  • Instruction Fuzzy Hash: 152113B1D042098FDB20DFAAC485ADEFBB0FF48324F10802AD559A7250DB756945CFA6
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 12f4feef45dc1bfb58780a9903aeea4378227a3183704fc50fa02f371eb3708f
                                                                                                  • Instruction ID: abea34d58a5e9f49de4b3e640d17a509a85ac60484ee555beb7c66d4733f2dd3
                                                                                                  • Opcode Fuzzy Hash: 12f4feef45dc1bfb58780a9903aeea4378227a3183704fc50fa02f371eb3708f
                                                                                                  • Instruction Fuzzy Hash: EA11E3B5D042498ADB10DFAAC481ADEFBF4FB48324F10842AD45967250C7746945CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: fd55a4e680e826c847bd1c4170de0f78889b87ef016fce0355805d6953155546
                                                                                                  • Instruction ID: d4b508a3ea4c4c6e540eaa248d8d1951aa70e33db565ff82f04939b593067f5b
                                                                                                  • Opcode Fuzzy Hash: fd55a4e680e826c847bd1c4170de0f78889b87ef016fce0355805d6953155546
                                                                                                  • Instruction Fuzzy Hash: 5E112B31A04155FFCB04DF64E458AA9BFB6EF8C321F15402AE80AA7391DB79AC45CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e1e9f05438e870d6e49cc2a522c0accb37b73d145393cc8742a28a59e6813c88
                                                                                                  • Instruction ID: 1778d6849cae1af4c2edc2fa459a13a28b068b4fd55dba1d7f23f11781d6a160
                                                                                                  • Opcode Fuzzy Hash: e1e9f05438e870d6e49cc2a522c0accb37b73d145393cc8742a28a59e6813c88
                                                                                                  • Instruction Fuzzy Hash: 8E019270E002189BDF14DBA9C4547EEBAF9AB8C715F108039E401B7280EF746C058B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8433646eb0deaf25673a24d490b5d725de4c984f8ebcedc83565ec088eb1df91
                                                                                                  • Instruction ID: ef7fb52cb5672c4633b2a7c1b5514fe23847e3e6986562075188058bc7a697e1
                                                                                                  • Opcode Fuzzy Hash: 8433646eb0deaf25673a24d490b5d725de4c984f8ebcedc83565ec088eb1df91
                                                                                                  • Instruction Fuzzy Hash: 7601D470A0924A6FCB09AF7864352267FA9DFC16107060CBFD94DCF152F914D84683C2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000002.3087280781.0000000002E1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E1D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_2_2e1d000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a8bfb072b9155d40ce49cd0b14cc88437b77bdb2952c39867d13c183c60073e8
                                                                                                  • Instruction ID: 4140913fcf5c73c7b5bb6a1cc8234b6c19c2558c30bc727f3943357d3b118f24
                                                                                                  • Opcode Fuzzy Hash: a8bfb072b9155d40ce49cd0b14cc88437b77bdb2952c39867d13c183c60073e8
                                                                                                  • Instruction Fuzzy Hash: E5014C7140E3C09ED7128B258C94B52BFB4EF53228F19C1DBD9888F1A3C2699849C772
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000002.3087280781.0000000002E1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E1D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_2_2e1d000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a4743adeb22b044c2deeb89a9cf4f9b7149400ed80d75a2f5ff13f52fc021450
                                                                                                  • Instruction ID: a97762d039f8b382199eef8f087ca1a1b62c758a169cf12ec5006e2eae2b4363
                                                                                                  • Opcode Fuzzy Hash: a4743adeb22b044c2deeb89a9cf4f9b7149400ed80d75a2f5ff13f52fc021450
                                                                                                  • Instruction Fuzzy Hash: E601D671448340AAE7218A29DDC4BA7BFD9EF41328F18C53AED584B286C779D881C6B1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a92ec2358c663c576154a687ce7c7a4dd5710ba68999d373988b4c1b6874f4d0
                                                                                                  • Instruction ID: 96a0afa58e94ea2819c8707e6550aa1f71d29edef1a8c468ef2ac3c856bcd0a4
                                                                                                  • Opcode Fuzzy Hash: a92ec2358c663c576154a687ce7c7a4dd5710ba68999d373988b4c1b6874f4d0
                                                                                                  • Instruction Fuzzy Hash: D601F431B1421697EB18AB6C85A57EF7BF6DBC8705F20402DE002BB384EE716C028BD5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1ba31bb1a27c372092d1745248e0c07dc3a97c0b853a89f2f076bbb7c86cb508
                                                                                                  • Instruction ID: b11ace94ae6294be0dc8ecf9415a1518bfeaae8cae4b69513886709cf30161d5
                                                                                                  • Opcode Fuzzy Hash: 1ba31bb1a27c372092d1745248e0c07dc3a97c0b853a89f2f076bbb7c86cb508
                                                                                                  • Instruction Fuzzy Hash: 85F09670A481465ECB0CAF7461293157F96EFC46247060C7EC54D8F151F924D88687C2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e656736d744a91f1e0bca5343b906efa88ea7c71939a81b99363f53835db40b7
                                                                                                  • Instruction ID: 95b3d4fd98d3e570b6181c844cbaf6b6fd2127eb8f558290e4b7188ec666825f
                                                                                                  • Opcode Fuzzy Hash: e656736d744a91f1e0bca5343b906efa88ea7c71939a81b99363f53835db40b7
                                                                                                  • Instruction Fuzzy Hash: 3BE0687270D2400BC71402AF28C0893AFAEDBC623131900BBF90CC72D2E944CC03C3A1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a800a4e686de98ac93f7accf554f601eececf963bdf70be32d79b3c26f3ec9e9
                                                                                                  • Instruction ID: e1afa66c03e73f675bb47aa1a2402f080d5cd787647381472712a1c763167ea1
                                                                                                  • Opcode Fuzzy Hash: a800a4e686de98ac93f7accf554f601eececf963bdf70be32d79b3c26f3ec9e9
                                                                                                  • Instruction Fuzzy Hash: 9AE092313103159FD720AA28E44476EB7E6EFC5365B404979E106E7244EF60FC4A87C4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5c8ad266c44c16fb3547a454d48cb9986fbbabe62c4e1883fb2446eab9707c22
                                                                                                  • Instruction ID: 0c8ba09f6a806aa43619086e75eaac3bc0a15737e73fc835e3ee2dccba39b213
                                                                                                  • Opcode Fuzzy Hash: 5c8ad266c44c16fb3547a454d48cb9986fbbabe62c4e1883fb2446eab9707c22
                                                                                                  • Instruction Fuzzy Hash: 50E04F3624012CBBEF152F95E804BEA7F5AEB853B2F508026FD4D45160EB36A960E790
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 358faa1c9b234fb9ea8ef23a3348b226039012b1cf979669182bfc9194d7d4a2
                                                                                                  • Instruction ID: df37aec2fe0192b985aef4cde62685ed2c94b221b660cb5073b29e496dc24592
                                                                                                  • Opcode Fuzzy Hash: 358faa1c9b234fb9ea8ef23a3348b226039012b1cf979669182bfc9194d7d4a2
                                                                                                  • Instruction Fuzzy Hash: 7CD0973231E2241FC30AE794F89A5997F74EB1A020B04407BF9448B3E6DD700C82C3C0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8d1e127e78a7e736041d51c10104d3f8e4850ae8e037248ed5f8bc76802cc153
                                                                                                  • Instruction ID: 427cf5de889e672c4a80c07b0127a1c9eca0abe2c760bc0dfc335d1b17c9f470
                                                                                                  • Opcode Fuzzy Hash: 8d1e127e78a7e736041d51c10104d3f8e4850ae8e037248ed5f8bc76802cc153
                                                                                                  • Instruction Fuzzy Hash: 06D0A73231411C7B96087618D88686ABBA9E7952613504433F90293264ED60BC409399
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000027.00000003.3085610742.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_39_3_4a30000_rundll32.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2bda8c268f99c8a75f2a0ae5b24a02ebe77f8ab810a1299fc44b73f9c4aa3876
                                                                                                  • Instruction ID: 6979e646f59627fbaa0468cdbb073e57c965e6aed9ebd3001809c248151e2e57
                                                                                                  • Opcode Fuzzy Hash: 2bda8c268f99c8a75f2a0ae5b24a02ebe77f8ab810a1299fc44b73f9c4aa3876
                                                                                                  • Instruction Fuzzy Hash: 4FC08CB2A202118BC1144A0401896E6F3A0FB31322B8482B2D11409008F22140A78A99
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%