Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
https://download.brother.com/welcome/dlfp100270/cltw10100a.exe

Overview

General Information

Sample URL:https://download.brother.com/welcome/dlfp100270/cltw10100a.exe
Analysis ID:1415123
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Creates files in the recycle bin to hide itself
Drops executables to the windows directory (C:\Windows) and starts them
Checks for available system drives (often done to infect USB drives)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Remote Thread Creation By Uncommon Source Image
Sigma detected: Usage Of Web Request Commands And Cmdlets
Stores files to the Windows start menu directory
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic

Classification

  • System is w10x64
  • cmd.exe (PID: 4836 cmdline: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://download.brother.com/welcome/dlfp100270/cltw10100a.exe" > cmdline.out 2>&1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 380 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • wget.exe (PID: 6776 cmdline: wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://download.brother.com/welcome/dlfp100270/cltw10100a.exe" MD5: 3DADB6E2ECE9C4B3E1E322E617658B60)
  • cltw10100a.exe (PID: 1576 cmdline: "C:\Users\user\Desktop\download\cltw10100a.exe" MD5: 9541E83179ABDD1F0CEBCFEFF94BC9A2)
    • InstallManager.exe (PID: 4124 cmdline: "C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exe" /L:MULT /Model:CableLabelTool MD5: CDDFE6FF78C9EF7667321A1EBB9D8F33)
      • AccessDatabaseEngine.exe (PID: 736 cmdline: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exe /quiet /passive MD5: 77423E9942B09AFD564C307B26D1F4BA)
      • msiexec.exe (PID: 2888 cmdline: msiexec.exe /i "C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\CableLabel.msi" USERNAME="hardz" COMPANYNAME="" INSTPATH="C:\Program Files (x86)\Brother" NOCOMPANYNAME=0 SCDESKTOP=1 SCQUICK=1 GGANA=0 /norestart /qn MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 6448 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 2108 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding EB11130A8E2D63B3F747D23242553FAB MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 5328 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding A62CD37A4C11E58DF0BCDEEDF1919238 E Global\MSI0000 MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 4836 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 83F27F5FB60DD41C7AB11B9672B294FA MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • ISBEW64.exe (PID: 6152 cmdline: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3AFEB423-0B54-4B5C-AF4D-A716F5EC019D} MD5: B83D2774CDAF5016CD8765A630FA1150)
      • ISBEW64.exe (PID: 6256 cmdline: C:\Users\user\AppData\Local\Temp\{88126FF3-5FB8-4112-8A6E-8CC3757E4773}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8B431535-90AA-40F3-9655-445ADAB437CB} MD5: B83D2774CDAF5016CD8765A630FA1150)
      • ISBEW64.exe (PID: 5348 cmdline: C:\Users\user\AppData\Local\Temp\{4D3AAFCB-F4A5-4635-B876-40288960575F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{6BC22D34-1C49-421D-9176-A3AFA0E55D33} MD5: B83D2774CDAF5016CD8765A630FA1150)
    • MSICA89.tmp (PID: 5556 cmdline: "C:\Windows\Installer\MSICA89.tmp" /Commit MD5: E52FBF76B172E4BF99A5772D196E63A1)
    • msiexec.exe (PID: 5380 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding D4A9004CD4BE2ECB65C741789AB02FDC E Global\MSI0000 MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • ISBEW64.exe (PID: 6412 cmdline: C:\Users\user\AppData\Local\Temp\{BEB42744-6340-45B8-9F53-1E39881815F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{96E3FD8A-3439-49F5-85BF-4761FA9EF6C3} MD5: B83D2774CDAF5016CD8765A630FA1150)
      • ISBEW64.exe (PID: 3920 cmdline: C:\Users\user\AppData\Local\Temp\{C94AACC5-E97F-46C2-A601-8B973B2BC7F5}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{34B640B0-E1C5-4E02-93D5-01A751615909} MD5: B83D2774CDAF5016CD8765A630FA1150)
      • ISBEW64.exe (PID: 7100 cmdline: C:\Users\user\AppData\Local\Temp\{17CEC823-4AB4-40C3-B585-B72FBC1A1527}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{AE513F01-59BA-4495-8488-BB8EA735A7AC} MD5: B83D2774CDAF5016CD8765A630FA1150)
  • svchost.exe (PID: 6308 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • LogonUI.exe (PID: 368 cmdline: "LogonUI.exe" /flags:0x4 /state0:0xa3f98855 /state1:0x41c64e6d MD5: 893144FE49AA16124B5BD3034E79BBC6)
  • LockApp.exe (PID: 4372 cmdline: "C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exe" -ServerName:WindowsDefaultLockScreen.AppX7y4nbzq37zn4ks9k7amqjywdat7d3j2z.mca MD5: DD4966999D7DB48046CE6D12AF1F70F3)
  • svchost.exe (PID: 1224 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s BthAvctpSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSO.DLLJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    Source: Threat createdAuthor: Perez Diego (@darkquassar), oscd.community: Data: EventID: 8, SourceImage: C:\Windows\SysWOW64\msiexec.exe, SourceProcessId: 4836, StartAddress: 76D1D700, TargetImage: C:\Windows\SysWOW64\cmd.exe, TargetProcessId: 4836
    Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://download.brother.com/welcome/dlfp100270/cltw10100a.exe" > cmdline.out 2>&1, CommandLine: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://download.brother.com/welcome/dlfp100270/cltw10100a.exe" > cmdline.out 2>&1, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 5760, ProcessCommandLine: C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://download.brother.com/welcome/dlfp100270/cltw10100a.exe" > cmdline.out 2>&1, ProcessId: 4836, ProcessName: cmd.exe
    Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 6308, ProcessName: svchost.exe
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeWindow detected: -------------------------------------Brother Cable Label Tool-------------------------------------End-User License Agreement for Brother Software IMPORTANT- PLEASE READ CAREFULLY:This End-User License Agreement ("EULA") is a legal agreement between you and Brother Industries Ltd. ("Brother") which governs your use of the Brother software (including associated user manuals and electronic documents such as "help and read me files)(collectively "SOFTWARE") that will be installed if you press a button or check a box on this Dialog Box which indicates your intention of consent (such as a button or checkbox displayed as Accept Agree or Yes). By pressing the button or checking a box which indicates your intention of consent you agree to be legally bound by the terms of this EULA. If you do not agree to the terms of this EULA you obtain no license to the SOFTWARE. In such case you may not use the SOFTWARE.Terms and Conditions.1. Ownership.All right title and interest in and to the SOFTWARE (including but not limited to any programs incorporated in the SOFTWARE and/or any contents contained in the SOFTWARE such as documents images pictures movies) are owned by Brother or its suppliers. You acknowledge and agree that all copyrights and intellectual property rights in and to the SOFTWARE is licensed and not sold transferred or otherwise assigned to you in its whole or parts.2. Grant of License.2.1 Brother grants you a non-exclusive license to install and use the copy of the SOFTWARE on your computer or hardware such as storage device to the extent necessary for intended use of Brother's products for which such SOFTWARE will be used ("Products").2.2 Brother further grants you a license to make one copy only of the SOFTWARE solely for archival and back-up purposes. Any such copy shall also reproduce all copyright and intellectual property right notices from the original.2.3 Other than as expressly permitted by Sections 2.1 and 2.2 above or where you have a right at law to do so (and such right cannot lawfully be excluded) you may not: (i) make any copies of the SOFTWARE (ii) modify or alter the SOFTWARE in whole or part; or (iii) reverse engineer disassemble decompile or use the SOFTWARE to create any derivative work.2.4 With respect to your use of the SOFTWARE you agree and undertake: (i) to keep all copies of the SOFTWARE secure and to maintain accurate and up-to-date records of the number and locations of all copies of the SOFTWARE; (ii) where you are a business entity to supervise and control use of the SOFTWARE and ensure that the SOFTWARE is used by your employees and representatives in accordance with the terms of this EULA; (iii) to comply with the Section 21 2.2 and 2.3 above when you provide or otherwise make available the SOFTWARE in any form in whole or in part (including but not limited to contents programs object code and source code and their program listings) to any person; and (iv) in no event shall Brother be liable for your al
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\ARE\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\ARE\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\BGR\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\BGR\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\CHS\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\CHS\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\CHT\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\CHT\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\CRO\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\CRO\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\CZE\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\CZE\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\DAN\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\DAN\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\DUT\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\DUT\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\ENA\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\ENA\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\FIN\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\FIN\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\FRA\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\FRA\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\GER\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\GER\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\HEB\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\HEB\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\HUN\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\HUN\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\ITA\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\ITA\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\JPN\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\JPN\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\KOR\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\KOR\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\NOR\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\NOR\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\POL\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\POL\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\POR\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\POR\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\PTB\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\PTB\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\ROM\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\ROM\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\RUS\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\RUS\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\SPA\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\SPA\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\SVK\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\SVK\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\SVN\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\SVN\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\SWE\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\SWE\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\THA\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\THA\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\TRK\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\TRK\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\UK\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\UK\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\US\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\US\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\VIT\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\VIT\LICENSE_U.txtJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: C:\Windows\WinSxS\InstallTemp\20240325143928017.0\msvcr90.dllJump to behavior
    Source: Binary string: t:\ses\x86\ship\0\opatchinst.pdbhip\0\opatchinst.exe\bbtopt\opatchinstO.pdb@ source: AccessDatabaseEngine.exe.5.dr
    Source: Binary string: hip\0\opatchinst.exe\bbtopt\opatchinstO.pdb source: AccessDatabaseEngine.exe, AccessDatabaseEngine.exe, 00000008.00000002.2433851957.000000002DE81000.00000020.00000001.01000000.00000008.sdmp, AccessDatabaseEngine.exe, 00000008.00000000.2284491906.000000002DE81000.00000020.00000001.01000000.00000008.sdmp, AccessDatabaseEngine.exe.5.dr
    Source: Binary string: t:\ses\x86\ship\0\opatchinst.pdb source: AccessDatabaseEngine.exe, AccessDatabaseEngine.exe, 00000008.00000002.2433851957.000000002DE81000.00000020.00000001.01000000.00000008.sdmp, AccessDatabaseEngine.exe, 00000008.00000000.2284491906.000000002DE81000.00000020.00000001.01000000.00000008.sdmp, AccessDatabaseEngine.exe.5.dr
    Source: Binary string: C:\CodeBases\isdev\Redist\Language Independent\x64\ISBEW64.pdb source: ISBEW64.exe, 0000000E.00000000.2451122772.0000000140010000.00000002.00000001.01000000.0000000D.sdmp, ISBEW64.exe, 0000000E.00000002.2454711694.0000000140010000.00000002.00000001.01000000.0000000D.sdmp, ISBEW64.exe, 0000000F.00000000.2458075879.0000000140010000.00000002.00000001.01000000.0000000E.sdmp, ISBEW64.exe, 0000000F.00000002.2461094512.0000000140010000.00000002.00000001.01000000.0000000E.sdmp, ISBEW64.exe, 00000010.00000000.2463209450.0000000140010000.00000002.00000001.01000000.0000000F.sdmp, ISBEW64.exe, 00000010.00000002.2468255547.0000000140010000.00000002.00000001.01000000.0000000F.sdmp, ISBEW64.exe, 00000016.00000002.2604177716.0000000140010000.00000002.00000001.01000000.00000013.sdmp, ISBEW64.exe, 00000016.00000000.2599760147.0000000140010000.00000002.00000001.01000000.00000013.sdmp, ISBEW64.exe, 00000017.00000002.2612946518.0000000140010000.00000002.00000001.01000000.00000014.sdmp, ISBEW64.exe, 00000017.00000000.2607137586.0000000140010000.00000002.00000001.01000000.00000014.sdmp, ISBEW64.exe, 00000018.00000000.2614679127.0000000140010000.00000002.00000001.01000000.00000015.sdmp, ISBEW64.exe, 00000018.00000002.2617318108.0000000140010000.00000002.00000001.01000000.00000015.sdmp
    Source: Binary string: t:\ses\x86\ship\0\opatchinst.pdbhip\0\opatchinst.exe\bbtopt\opatchinstO.pdb source: AccessDatabaseEngine.exe, 00000008.00000002.2433851957.000000002DE81000.00000020.00000001.01000000.00000008.sdmp, AccessDatabaseEngine.exe, 00000008.00000000.2284491906.000000002DE81000.00000020.00000001.01000000.00000008.sdmp
    Source: Binary string: E:\Projects\ptedit51\bpac31\MergeModule\CustomEvent\Release\BIRegSet.pdb source: MSICA89.tmp, 00000014.00000000.2590849338.000000000053F000.00000002.00000001.01000000.00000012.sdmp, MSICA89.tmp, 00000014.00000002.2591823770.000000000053F000.00000002.00000001.01000000.00000012.sdmp
    Source: Binary string: C:\work\GitHub\InstallManager\Release\InstallManager.pdb source: InstallManager.exe, 00000006.00000000.2173483326.0000000000D92000.00000002.00000001.01000000.00000006.sdmp, InstallManager.exe, 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmp
    Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
    Source: C:\Windows\System32\LogonUI.exeFile opened: c:
    Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_004015DC wsprintfA,FindFirstFileA,FindClose,5_2_004015DC
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_004051E0 lstrcpyA,lstrcpyA,lstrcatA,lstrcatA,DeleteFileA,FindFirstFileA,lstrcpyA,lstrcatA,lstrcatA,lstrcpyA,lstrcatA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,lstrcpyA,lstrlenA,RemoveDirectoryA,5_2_004051E0
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C7711D __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,6_2_00C7711D
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C6A366 GetModuleHandleW,GetProcAddress,FindFirstFileW,6_2_00C6A366
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C6A75A lstrlenW,SetLastError,FindFirstFileW,GetLastError,__wfullpath,__wsplitpath_s,__wmakepath_s,6_2_00C6A75A
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C55B20 FindFirstFileW,FindClose,SHCreateDirectoryExW,CopyFileExW,FindFirstFileW,FindClose,CopyFileExW,SetFileAttributesW,6_2_00C55B20
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_0041430A __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,20_2_0041430A
    Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\userJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppDataJump to behavior
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownDNS traffic detected: queries for: download.brother.com
    Source: InstallManager.exe, 00000006.00000000.2173483326.0000000000D92000.00000002.00000001.01000000.00000006.sdmp, InstallManager.exe, 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpString found in binary or memory: http://.:
    Source: wget.exe, 00000002.00000003.2091467965.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000AD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
    Source: svchost.exe, 00000012.00000002.3350470629.000001AE4A400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
    Source: svchost.exe, 00000012.00000003.2528055650.000001AE4A160000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
    Source: LogonUI.exe, 00000019.00000002.3353316842.0000029FE36FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.a.0/sTy
    Source: LogonUI.exe, 00000019.00000002.3353316842.0000029FE36FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.hotosh
    Source: wget.exe, 00000002.00000003.2091467965.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000AD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
    Source: wget.exe, 00000002.00000002.2106239962.0000000000AE2000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000AD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
    Source: wget.exe, 00000002.00000002.2106239962.0000000000AE2000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000AD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s2.symcb.com0
    Source: wget.exe, 00000002.00000002.2106239962.0000000000AE2000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000AD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crl0a
    Source: wget.exe, 00000002.00000002.2106239962.0000000000AE2000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000AD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crt0
    Source: wget.exe, 00000002.00000002.2106239962.0000000000AE2000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000AD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sv.symcd.com0&
    Source: wget.exe, 00000002.00000003.2091467965.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000AD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
    Source: wget.exe, 00000002.00000003.2091467965.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000AD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
    Source: wget.exe, 00000002.00000003.2091467965.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000AD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
    Source: InstallManager.exe, 00000006.00000003.2174364165.0000000002680000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.brother.co.th/Support/Warranty.aspx
    Source: String1033.txt0.13.drString found in binary or memory: http://www.brother.com
    Source: InstallManager.exe, 00000006.00000003.2174364165.0000000002680000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.brother.com.hk/en/warranty/warranty_registration.html
    Source: InstallManager.exe, 00000006.00000003.2174364165.0000000002680000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.brother.com/registration/index.html
    Source: InstallManager.exe, 00000006.00000002.3347951008.00000000029C0000.00000004.00000020.00020000.00000000.sdmp, USAGE.TXT25.5.dr, USAGE.TXT1.5.drString found in binary or memory: http://www.google.com/analytics/learn/privacy.html
    Source: InstallManager.exe, 00000006.00000003.2174364165.0000000002680000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.reg.brother-cn.net/
    Source: wget.exe, 00000002.00000002.2106239962.0000000000AE2000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000AD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/cps0(
    Source: wget.exe, 00000002.00000002.2106239962.0000000000AE2000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000AD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/rpa00
    Source: wget.exe, 00000002.00000002.2106239962.0000000000AE2000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000AD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
    Source: wget.exe, 00000002.00000002.2106239962.0000000000AE2000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000AD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
    Source: wget.exe, 00000002.00000002.2106335874.0000000001255000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2105837767.0000000000AAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://download.brother.com/welcome/dlfp100270/cltw10100a.exe
    Source: wget.exe, 00000002.00000002.2106335874.0000000001250000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://download.brother.com/welcome/dlfp100270/cltw10100a.exeuser-h
    Source: wget.exe, 00000002.00000002.2106335874.0000000001250000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://download.brother.com/welcome/dlfp100270/cltw10100a.exe_d
    Source: wget.exe, 00000002.00000002.2106203273.0000000000AAD000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2105837767.0000000000AAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://download.brother.com/welcome/dlfp100270/cltw10100a.exeb
    Source: wget.exe, 00000002.00000002.2106335874.0000000001255000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://download.brother.com/welcome/dlfp100270/cltw10100a.exei
    Source: wget.exe, 00000002.00000002.2106203273.0000000000AAD000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2105837767.0000000000AAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://download.brother.com/welcome/dlfp100270/cltw10100a.exey
    Source: svchost.exe, 00000012.00000003.2528055650.000001AE4A1D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/Prod/C:
    Source: svchost.exe, 00000012.00000003.2528055650.000001AE4A160000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
    Source: InstallManager.exe, 00000006.00000003.2174364165.0000000002680000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://myportal.brother.co.jp/
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C88276 __EH_prolog3_GS,GetParent,GetParent,GetParent,UpdateWindow,SetCursor,GetAsyncKeyState,UpdateWindow,InflateRect,SetCapture,SetCursor,IsWindow,GetCursorPos,ScreenToClient,PtInRect,RedrawWindow,GetParent,GetParent,GetParent,RedrawWindow,RedrawWindow,GetParent,GetParent,GetParent,InvalidateRect,UpdateWindow,UpdateWindow,SetCapture,RedrawWindow,6_2_00C88276
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00CA8236 IsWindow,SendMessageW,GetCapture,GetKeyState,GetKeyState,GetKeyState,ImmGetContext,ImmGetOpenStatus,ImmReleaseContext,GetFocus,IsWindow,IsWindow,IsWindow,ClientToScreen,IsWindow,ClientToScreen,6_2_00CA8236
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00CA6398 IsWindow,SendMessageW,GetCapture,GetKeyState,GetKeyState,GetKeyState,ImmGetContext,ImmGetOpenStatus,ImmReleaseContext,GetFocus,IsWindow,IsWindow,IsWindow,ClientToScreen,IsWindow,ClientToScreen,6_2_00CA6398
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00CDF8D1 GetKeyState,GetKeyState,GetKeyState,GetKeyState,6_2_00CDF8D1
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00D13C3B GetWindowRect,GetKeyState,GetKeyState,GetKeyState,KillTimer,GetFocus,SetTimer,6_2_00D13C3B
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_00421168 GetParent,GetKeyState,GetKeyState,GetKeyState,SendMessageW,SendMessageW,SendMessageW,20_2_00421168
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_004231F1 MessageBeep,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageW,SendMessageW,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,20_2_004231F1
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_0044C3C2 SendMessageW,UpdateWindow,GetKeyState,GetKeyState,GetKeyState,GetParent,PostMessageW,20_2_0044C3C2
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_0042D80F __EH_prolog3_GS,GetKeyState,GetKeyState,GetKeyState,GetParent,SendMessageW,_memset,ScreenToClient,_memset,GetCursorPos,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SetWindowPos,SendMessageW,SendMessageW,_memset,_free,GetParent,20_2_0042D80F
    Source: Yara matchFile source: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSO.DLL, type: DROPPED
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C5F1B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,6_2_00C5F1B0
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\43584b.msiJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5C91.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5D3E.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{90140000-00D1-0409-0000-0000000FF1CE}Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5DBC.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5DCC.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5E4A.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5FF1.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\WinSxS\InstallTemp\20240325143928017.0Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\WinSxS\InstallTemp\20240325143928017.0\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_d495ac4e.catJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\WinSxS\InstallTemp\20240325143928033.0Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\WinSxS\InstallTemp\20240325143928033.0\9.0.30729.4148.catJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\WinSxS\InstallTemp\20240325143928017.0\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_d495ac4e.manifestJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\WinSxS\InstallTemp\20240325143928017.0\msvcm90.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\WinSxS\InstallTemp\20240325143928017.0\msvcp90.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\WinSxS\InstallTemp\20240325143928017.0\msvcr90.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\WinSxS\InstallTemp\20240325143928033.0\9.0.30729.4148.policyJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI786C.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\43584e.msiJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\43584e.msiJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\43584f.msiJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI91F0.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI953D.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI97BF.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9B3A.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRALABC0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRALARC0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRANOBC0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRANOIC0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRANORC0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRATLBS0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRATLIS0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRATLRS0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRATLVS0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRBELRT0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRBERRT0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\brbrcbt0.ttfJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\brbrcit0.ttfJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\brbrcrt0.ttfJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\brbrcvt0.ttfJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRBRUBS0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRBRUIS0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRBRURS0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRBRUVS0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRCONRC0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRDB1RT0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRDB2RT0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRDB3RT0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRDB4RT0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRGERRT0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRHELBS0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRHELIS0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRHELRS0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRHELVS0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRHENBS0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRHENIS0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRHENRS0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRHENVS0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRISTRT0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRKOUMW0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRLGOBC0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRLGOIC0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRLGORC0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRMISBW0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRMISLW0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRMISMW0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRRENMW0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRRYUMW0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRSANRT0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\brsy1rt0.ttfJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\brsy2rt0.ttfJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRTOULW0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRUS_RT0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRUTABC0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRUTAIC0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRUTARC0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRUTAVC0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRUTCBT0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRUTCIT0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRUTCRT0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRUTCVT0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRWAZBW0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Fonts\BRWAZMW0.TTFJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\msvcr110.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\vccorlib110.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92FJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_OLEPRO32_f0.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_STDOLE_f1.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_OLEAUT32_f2.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_OLEAUT32_f3.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}\ARPPRODUCTICON.exeJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}\NewShortcut1_E9BE88FB21B24B1191C0B79BB4908EC1.exeJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\435852.msiJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\435852.msiJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICA89.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICBA3.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICFAB.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSID1EE.tmpJump to behavior
    Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
    Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI5C91.tmpJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_004104255_2_00410425
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_004100F65_2_004100F6
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_0041310B5_2_0041310B
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_00412A5F5_2_00412A5F
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_0040DE335_2_0040DE33
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_0041229B5_2_0041229B
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_0041077A5_2_0041077A
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_0041277F5_2_0041277F
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C627206_2_00C62720
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C510006_2_00C51000
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C638406_2_00C63840
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C8E0636_2_00C8E063
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00D004836_2_00D00483
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00D7A88C6_2_00D7A88C
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00D6AAA56_2_00D6AAA5
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00D69DCB6_2_00D69DCB
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeCode function: 8_2_2DEB25CF8_2_2DEB25CF
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeCode function: 8_2_2DEBCD408_2_2DEBCD40
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeCode function: 8_2_2DEBB4CB8_2_2DEBB4CB
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeCode function: 8_2_2DEBAF878_2_2DEBAF87
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeCode function: 8_2_2DEBBBC28_2_2DEBBBC2
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeCode function: 8_2_2DEBAA438_2_2DEBAA43
    Source: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exeCode function: 14_2_0000000140001A0014_2_0000000140001A00
    Source: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exeCode function: 14_2_0000000140004D4014_2_0000000140004D40
    Source: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exeCode function: 14_2_000000014000961C14_2_000000014000961C
    Source: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exeCode function: 14_2_000000014000DEA814_2_000000014000DEA8
    Source: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exeCode function: 14_2_000000014000434014_2_0000000140004340
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_0044815320_2_00448153
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_004101CA20_2_004101CA
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_0052736020_2_00527360
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_005284D220_2_005284D2
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_0041976120_2_00419761
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_0051895620_2_00518956
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_0049D9E920_2_0049D9E9
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_00434ED420_2_00434ED4
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_00440E8520_2_00440E85
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_00431EA520_2_00431EA5
    Source: C:\Windows\Installer\MSICA89.tmpCode function: String function: 0051A1E0 appears 35 times
    Source: C:\Windows\Installer\MSICA89.tmpCode function: String function: 00517DC6 appears 69 times
    Source: C:\Windows\Installer\MSICA89.tmpCode function: String function: 00517D93 appears 200 times
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: String function: 00D69A85 appears 46 times
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: String function: 00D69A1C appears 196 times
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: String function: 00D6A820 appears 53 times
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: String function: 00C55420 appears 58 times
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeCode function: String function: 2DEAE595 appears 64 times
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeCode function: String function: 2DEA50A7 appears 92 times
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeCode function: String function: 2DEB14E9 appears 35 times
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\wget.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\wget.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\SysWOW64\wget.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\SysWOW64\wget.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\wget.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\SysWOW64\wget.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\wget.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\wget.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\SysWOW64\wget.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\SysWOW64\wget.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\wget.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\SysWOW64\wget.exeSection loaded: explorerframe.dllJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeSection loaded: lz32.dllJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeSection loaded: riched32.dllJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeSection loaded: oledlg.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: cabinet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: msxml3.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: msi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: srpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: tsappcmp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: wkscli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: linkinfo.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ntshrui.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: cscapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dwrite.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched32.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched32.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched32.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exeSection loaded: apphelp.dll
    Source: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exeSection loaded: kernel.appcore.dll
    Source: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exeSection loaded: uxtheme.dll
    Source: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exeSection loaded: sxs.dll
    Source: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exeSection loaded: windows.storage.dll
    Source: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exeSection loaded: wldp.dll
    Source: C:\Users\user\AppData\Local\Temp\{88126FF3-5FB8-4112-8A6E-8CC3757E4773}\ISBEW64.exeSection loaded: apphelp.dll
    Source: C:\Users\user\AppData\Local\Temp\{88126FF3-5FB8-4112-8A6E-8CC3757E4773}\ISBEW64.exeSection loaded: kernel.appcore.dll
    Source: C:\Users\user\AppData\Local\Temp\{88126FF3-5FB8-4112-8A6E-8CC3757E4773}\ISBEW64.exeSection loaded: uxtheme.dll
    Source: C:\Users\user\AppData\Local\Temp\{88126FF3-5FB8-4112-8A6E-8CC3757E4773}\ISBEW64.exeSection loaded: sxs.dll
    Source: C:\Users\user\AppData\Local\Temp\{88126FF3-5FB8-4112-8A6E-8CC3757E4773}\ISBEW64.exeSection loaded: windows.storage.dll
    Source: C:\Users\user\AppData\Local\Temp\{88126FF3-5FB8-4112-8A6E-8CC3757E4773}\ISBEW64.exeSection loaded: wldp.dll
    Source: C:\Users\user\AppData\Local\Temp\{4D3AAFCB-F4A5-4635-B876-40288960575F}\ISBEW64.exeSection loaded: apphelp.dll
    Source: C:\Users\user\AppData\Local\Temp\{4D3AAFCB-F4A5-4635-B876-40288960575F}\ISBEW64.exeSection loaded: kernel.appcore.dll
    Source: C:\Users\user\AppData\Local\Temp\{4D3AAFCB-F4A5-4635-B876-40288960575F}\ISBEW64.exeSection loaded: uxtheme.dll
    Source: C:\Users\user\AppData\Local\Temp\{4D3AAFCB-F4A5-4635-B876-40288960575F}\ISBEW64.exeSection loaded: sxs.dll
    Source: C:\Users\user\AppData\Local\Temp\{4D3AAFCB-F4A5-4635-B876-40288960575F}\ISBEW64.exeSection loaded: windows.storage.dll
    Source: C:\Users\user\AppData\Local\Temp\{4D3AAFCB-F4A5-4635-B876-40288960575F}\ISBEW64.exeSection loaded: wldp.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: esent.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: mi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: webio.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: es.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dll
    Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dll
    Source: C:\Windows\Installer\MSICA89.tmpSection loaded: apphelp.dll
    Source: C:\Windows\Installer\MSICA89.tmpSection loaded: msimg32.dll
    Source: C:\Windows\Installer\MSICA89.tmpSection loaded: uxtheme.dll
    Source: C:\Windows\Installer\MSICA89.tmpSection loaded: oleacc.dll
    Source: C:\Windows\Installer\MSICA89.tmpSection loaded: winmm.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched32.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched20.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: usp10.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msls31.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sxs.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: linkinfo.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntshrui.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cscapi.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched32.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched20.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: usp10.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msls31.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched32.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched20.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: usp10.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msls31.dll
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dll
    Source: C:\Users\user\AppData\Local\Temp\{BEB42744-6340-45B8-9F53-1E39881815F3}\ISBEW64.exeSection loaded: apphelp.dll
    Source: C:\Users\user\AppData\Local\Temp\{BEB42744-6340-45B8-9F53-1E39881815F3}\ISBEW64.exeSection loaded: kernel.appcore.dll
    Source: C:\Users\user\AppData\Local\Temp\{BEB42744-6340-45B8-9F53-1E39881815F3}\ISBEW64.exeSection loaded: uxtheme.dll
    Source: C:\Users\user\AppData\Local\Temp\{BEB42744-6340-45B8-9F53-1E39881815F3}\ISBEW64.exeSection loaded: sxs.dll
    Source: C:\Users\user\AppData\Local\Temp\{BEB42744-6340-45B8-9F53-1E39881815F3}\ISBEW64.exeSection loaded: windows.storage.dll
    Source: C:\Users\user\AppData\Local\Temp\{BEB42744-6340-45B8-9F53-1E39881815F3}\ISBEW64.exeSection loaded: wldp.dll
    Source: C:\Users\user\AppData\Local\Temp\{C94AACC5-E97F-46C2-A601-8B973B2BC7F5}\ISBEW64.exeSection loaded: apphelp.dll
    Source: C:\Users\user\AppData\Local\Temp\{C94AACC5-E97F-46C2-A601-8B973B2BC7F5}\ISBEW64.exeSection loaded: kernel.appcore.dll
    Source: C:\Users\user\AppData\Local\Temp\{C94AACC5-E97F-46C2-A601-8B973B2BC7F5}\ISBEW64.exeSection loaded: uxtheme.dll
    Source: C:\Users\user\AppData\Local\Temp\{C94AACC5-E97F-46C2-A601-8B973B2BC7F5}\ISBEW64.exeSection loaded: sxs.dll
    Source: C:\Users\user\AppData\Local\Temp\{C94AACC5-E97F-46C2-A601-8B973B2BC7F5}\ISBEW64.exeSection loaded: windows.storage.dll
    Source: C:\Users\user\AppData\Local\Temp\{C94AACC5-E97F-46C2-A601-8B973B2BC7F5}\ISBEW64.exeSection loaded: wldp.dll
    Source: C:\Users\user\AppData\Local\Temp\{17CEC823-4AB4-40C3-B585-B72FBC1A1527}\ISBEW64.exeSection loaded: apphelp.dll
    Source: C:\Users\user\AppData\Local\Temp\{17CEC823-4AB4-40C3-B585-B72FBC1A1527}\ISBEW64.exeSection loaded: kernel.appcore.dll
    Source: C:\Users\user\AppData\Local\Temp\{17CEC823-4AB4-40C3-B585-B72FBC1A1527}\ISBEW64.exeSection loaded: uxtheme.dll
    Source: C:\Users\user\AppData\Local\Temp\{17CEC823-4AB4-40C3-B585-B72FBC1A1527}\ISBEW64.exeSection loaded: sxs.dll
    Source: C:\Users\user\AppData\Local\Temp\{17CEC823-4AB4-40C3-B585-B72FBC1A1527}\ISBEW64.exeSection loaded: windows.storage.dll
    Source: C:\Users\user\AppData\Local\Temp\{17CEC823-4AB4-40C3-B585-B72FBC1A1527}\ISBEW64.exeSection loaded: wldp.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: uxtheme.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: logoncontroller.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: umpdc.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: dxgi.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: powrprof.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: userenv.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: powrprof.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: slc.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: sppc.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: dsreg.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: msvcp110_win.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: cryptsp.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: dwmapi.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: wtsapi32.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: winsta.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: windows.ui.logon.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: wincorlib.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: dcomp.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: windows.ui.xamlhost.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: mrmcorer.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: windows.ui.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: windowmanagementapi.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: textinputframework.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: inputhost.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: coreuicomponents.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: coremessaging.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: coremessaging.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: propsys.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: wintypes.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: coreuicomponents.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: ntmarta.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: coremessaging.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: wintypes.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: wintypes.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: wintypes.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: wintypes.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: twinapi.appcore.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: coremessaging.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: twinapi.appcore.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: languageoverlayutil.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: bcp47mrm.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: windows.ui.xaml.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: bcp47langs.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: iertutil.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: windows.ui.immersive.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: profapi.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: urlmon.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: srvcli.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: netutils.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: resourcepolicyclient.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: d3d11.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: dwrite.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: d3d10warp.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: windows.globalization.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: dxcore.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: d2d1.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: textshaping.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: windows.ui.blockedshutdown.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: directmanipulation.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: windows.ui.xaml.controls.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: windowscodecs.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: windows.applicationmodel.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: windows.graphics.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: windows.storage.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: wldp.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: wuceffects.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: threadpoolwinrt.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: windows.applicationmodel.lockscreen.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: lockcontroller.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: credprovdatamodel.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: networkicon.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: iphlpapi.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: networkuxbroker.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: credprovhost.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: sspicli.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: samcli.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: ethernetmediamanager.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: winhttp.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: netprofm.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: credprovs.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: credprovslegacy.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: facecredentialprovider.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: smartcardcredentialprovider.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: biocredprov.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: ngckeyenum.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: ncrypt.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: ntasn1.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: npmproxy.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: cxcredprov.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: ngccredprov.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: windows.devices.enumeration.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: structuredquery.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: wlidcredprov.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: icu.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: mswb7.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: rasplap.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: rtutils.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: windows.fileexplorer.common.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: credprov2fahelper.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: credprovhelper.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: shacct.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: samlib.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: apphelp.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: ntshrui.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: cscapi.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: idstore.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: policymanager.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: winbio.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: wkscli.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: photometadatahandler.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: devdispitemprovider.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: windows.media.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: winlangdb.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: globinputhost.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: inputswitch.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: wininet.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: fontglyphanimator.dll
    Source: C:\Windows\System32\LogonUI.exeSection loaded: msftedit.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: wincorlib.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: policymanager.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: msvcp110_win.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: windows.ui.xaml.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: coremessaging.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: bcp47langs.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: iertutil.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: dcomp.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: twinapi.appcore.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: wintypes.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: windows.staterepositorycore.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: urlmon.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: srvcli.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: netutils.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: dxgi.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: resourcepolicyclient.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: windows.applicationmodel.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: mrmcorer.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: windows.staterepositoryclient.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: d3d11.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: d3d10warp.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: profapi.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: dxcore.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: windows.ui.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: windowmanagementapi.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: textinputframework.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: inputhost.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: coreuicomponents.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: propsys.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: coreuicomponents.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: ntmarta.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: d2d1.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: languageoverlayutil.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: bcp47mrm.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: dwrite.dll
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeSection loaded: windows.globalization.dll
    Source: classification engineClassification label: mal48.evad.win@38/402@1/1
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_004023FC GetLastError,FormatMessageA,5_2_004023FC
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C5F1B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,6_2_00C5F1B0
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_00405D91 GetModuleHandleA,GetProcAddress,lstrcpyA,lstrcatA,GetDiskFreeSpaceExA,GetLastError,GetDiskFreeSpaceA,5_2_00405D91
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C7EC5E CoInitialize,CoCreateInstance,6_2_00C7EC5E
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_00405853 GetModuleHandleA,FindResourceA,LoadResource,SizeofResource,LockResource,5_2_00405853
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeFile created: C:\Program Files (x86)\MSECache\AceRedistJump to behavior
    Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\Desktop\cmdline.outJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:380:120:WilError_03
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeMutant created: \Sessions\1\BaseNamedObjects\InstallManager.exe
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\plf1537.tmpJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeFile read: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.iniJump to behavior
    Source: C:\Windows\SysWOW64\wget.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://download.brother.com/welcome/dlfp100270/cltw10100a.exe" > cmdline.out 2>&1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://download.brother.com/welcome/dlfp100270/cltw10100a.exe"
    Source: unknownProcess created: C:\Users\user\Desktop\download\cltw10100a.exe "C:\Users\user\Desktop\download\cltw10100a.exe"
    Source: C:\Users\user\Desktop\download\cltw10100a.exeProcess created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exe "C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exe" /L:MULT /Model:CableLabelTool
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeProcess created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exe C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exe /quiet /passive
    Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding EB11130A8E2D63B3F747D23242553FAB
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding A62CD37A4C11E58DF0BCDEEDF1919238 E Global\MSI0000
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeProcess created: C:\Windows\SysWOW64\msiexec.exe msiexec.exe /i "C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\CableLabel.msi" USERNAME="hardz" COMPANYNAME="" INSTPATH="C:\Program Files (x86)\Brother" NOCOMPANYNAME=0 SCDESKTOP=1 SCQUICK=1 GGANA=0 /norestart /qn
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 83F27F5FB60DD41C7AB11B9672B294FA
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3AFEB423-0B54-4B5C-AF4D-A716F5EC019D}
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\{88126FF3-5FB8-4112-8A6E-8CC3757E4773}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{88126FF3-5FB8-4112-8A6E-8CC3757E4773}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8B431535-90AA-40F3-9655-445ADAB437CB}
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\{4D3AAFCB-F4A5-4635-B876-40288960575F}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{4D3AAFCB-F4A5-4635-B876-40288960575F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{6BC22D34-1C49-421D-9176-A3AFA0E55D33}
    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSICA89.tmp "C:\Windows\Installer\MSICA89.tmp" /Commit
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding D4A9004CD4BE2ECB65C741789AB02FDC E Global\MSI0000
    Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{BEB42744-6340-45B8-9F53-1E39881815F3}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{BEB42744-6340-45B8-9F53-1E39881815F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{96E3FD8A-3439-49F5-85BF-4761FA9EF6C3}
    Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{C94AACC5-E97F-46C2-A601-8B973B2BC7F5}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{C94AACC5-E97F-46C2-A601-8B973B2BC7F5}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{34B640B0-E1C5-4E02-93D5-01A751615909}
    Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{17CEC823-4AB4-40C3-B585-B72FBC1A1527}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{17CEC823-4AB4-40C3-B585-B72FBC1A1527}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{AE513F01-59BA-4495-8488-BB8EA735A7AC}
    Source: unknownProcess created: C:\Windows\System32\LogonUI.exe "LogonUI.exe" /flags:0x4 /state0:0xa3f98855 /state1:0x41c64e6d
    Source: unknownProcess created: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exe "C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exe" -ServerName:WindowsDefaultLockScreen.AppX7y4nbzq37zn4ks9k7amqjywdat7d3j2z.mca
    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService -p -s BthAvctpSvc
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://download.brother.com/welcome/dlfp100270/cltw10100a.exe" Jump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeProcess created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exe "C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exe" /L:MULT /Model:CableLabelToolJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeProcess created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exe C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exe /quiet /passiveJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeProcess created: C:\Windows\SysWOW64\msiexec.exe msiexec.exe /i "C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\CableLabel.msi" USERNAME="hardz" COMPANYNAME="" INSTPATH="C:\Program Files (x86)\Brother" NOCOMPANYNAME=0 SCDESKTOP=1 SCQUICK=1 GGANA=0 /norestart /qnJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding EB11130A8E2D63B3F747D23242553FABJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding A62CD37A4C11E58DF0BCDEEDF1919238 E Global\MSI0000Jump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 83F27F5FB60DD41C7AB11B9672B294FAJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSICA89.tmp "C:\Windows\Installer\MSICA89.tmp" /CommitJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding D4A9004CD4BE2ECB65C741789AB02FDC E Global\MSI0000Jump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3AFEB423-0B54-4B5C-AF4D-A716F5EC019D}Jump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{88126FF3-5FB8-4112-8A6E-8CC3757E4773}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{88126FF3-5FB8-4112-8A6E-8CC3757E4773}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8B431535-90AA-40F3-9655-445ADAB437CB}Jump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{4D3AAFCB-F4A5-4635-B876-40288960575F}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{4D3AAFCB-F4A5-4635-B876-40288960575F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{6BC22D34-1C49-421D-9176-A3AFA0E55D33}Jump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{BEB42744-6340-45B8-9F53-1E39881815F3}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{BEB42744-6340-45B8-9F53-1E39881815F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{96E3FD8A-3439-49F5-85BF-4761FA9EF6C3}
    Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{C94AACC5-E97F-46C2-A601-8B973B2BC7F5}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{C94AACC5-E97F-46C2-A601-8B973B2BC7F5}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{34B640B0-E1C5-4E02-93D5-01A751615909}
    Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Users\user\AppData\Local\Temp\{17CEC823-4AB4-40C3-B585-B72FBC1A1527}\ISBEW64.exe C:\Users\user\AppData\Local\Temp\{17CEC823-4AB4-40C3-B585-B72FBC1A1527}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{AE513F01-59BA-4495-8488-BB8EA735A7AC}
    Source: C:\Windows\SysWOW64\wget.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile written: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\IsConfig.iniJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeAutomated click: Agree
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeAutomated click: OK
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeAutomated click: Install
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeAutomated click: OK
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeAutomated click: OK
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeAutomated click: OK
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeAutomated click: OK
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeAutomated click: OK
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeAutomated click: OK
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeAutomated click: OK
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeAutomated click: OK
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeAutomated click: OK
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeAutomated click: OK
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeAutomated click: OK
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeAutomated click: OK
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeAutomated click: OK
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile opened: C:\Windows\SysWOW64\RICHED32.DLLJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeWindow detected: -------------------------------------Brother Cable Label Tool-------------------------------------End-User License Agreement for Brother Software IMPORTANT- PLEASE READ CAREFULLY:This End-User License Agreement ("EULA") is a legal agreement between you and Brother Industries Ltd. ("Brother") which governs your use of the Brother software (including associated user manuals and electronic documents such as "help and read me files)(collectively "SOFTWARE") that will be installed if you press a button or check a box on this Dialog Box which indicates your intention of consent (such as a button or checkbox displayed as Accept Agree or Yes). By pressing the button or checking a box which indicates your intention of consent you agree to be legally bound by the terms of this EULA. If you do not agree to the terms of this EULA you obtain no license to the SOFTWARE. In such case you may not use the SOFTWARE.Terms and Conditions.1. Ownership.All right title and interest in and to the SOFTWARE (including but not limited to any programs incorporated in the SOFTWARE and/or any contents contained in the SOFTWARE such as documents images pictures movies) are owned by Brother or its suppliers. You acknowledge and agree that all copyrights and intellectual property rights in and to the SOFTWARE is licensed and not sold transferred or otherwise assigned to you in its whole or parts.2. Grant of License.2.1 Brother grants you a non-exclusive license to install and use the copy of the SOFTWARE on your computer or hardware such as storage device to the extent necessary for intended use of Brother's products for which such SOFTWARE will be used ("Products").2.2 Brother further grants you a license to make one copy only of the SOFTWARE solely for archival and back-up purposes. Any such copy shall also reproduce all copyright and intellectual property right notices from the original.2.3 Other than as expressly permitted by Sections 2.1 and 2.2 above or where you have a right at law to do so (and such right cannot lawfully be excluded) you may not: (i) make any copies of the SOFTWARE (ii) modify or alter the SOFTWARE in whole or part; or (iii) reverse engineer disassemble decompile or use the SOFTWARE to create any derivative work.2.4 With respect to your use of the SOFTWARE you agree and undertake: (i) to keep all copies of the SOFTWARE secure and to maintain accurate and up-to-date records of the number and locations of all copies of the SOFTWARE; (ii) where you are a business entity to supervise and control use of the SOFTWARE and ensure that the SOFTWARE is used by your employees and representatives in accordance with the terms of this EULA; (iii) to comply with the Section 21 2.2 and 2.3 above when you provide or otherwise make available the SOFTWARE in any form in whole or in part (including but not limited to contents programs object code and source code and their program listings) to any person; and (iv) in no event shall Brother be liable for your al
    Source: C:\Windows\System32\msiexec.exeFile opened: C:\Windows\WinSxS\InstallTemp\20240325143928017.0\msvcr90.dllJump to behavior
    Source: Binary string: t:\ses\x86\ship\0\opatchinst.pdbhip\0\opatchinst.exe\bbtopt\opatchinstO.pdb@ source: AccessDatabaseEngine.exe.5.dr
    Source: Binary string: hip\0\opatchinst.exe\bbtopt\opatchinstO.pdb source: AccessDatabaseEngine.exe, AccessDatabaseEngine.exe, 00000008.00000002.2433851957.000000002DE81000.00000020.00000001.01000000.00000008.sdmp, AccessDatabaseEngine.exe, 00000008.00000000.2284491906.000000002DE81000.00000020.00000001.01000000.00000008.sdmp, AccessDatabaseEngine.exe.5.dr
    Source: Binary string: t:\ses\x86\ship\0\opatchinst.pdb source: AccessDatabaseEngine.exe, AccessDatabaseEngine.exe, 00000008.00000002.2433851957.000000002DE81000.00000020.00000001.01000000.00000008.sdmp, AccessDatabaseEngine.exe, 00000008.00000000.2284491906.000000002DE81000.00000020.00000001.01000000.00000008.sdmp, AccessDatabaseEngine.exe.5.dr
    Source: Binary string: C:\CodeBases\isdev\Redist\Language Independent\x64\ISBEW64.pdb source: ISBEW64.exe, 0000000E.00000000.2451122772.0000000140010000.00000002.00000001.01000000.0000000D.sdmp, ISBEW64.exe, 0000000E.00000002.2454711694.0000000140010000.00000002.00000001.01000000.0000000D.sdmp, ISBEW64.exe, 0000000F.00000000.2458075879.0000000140010000.00000002.00000001.01000000.0000000E.sdmp, ISBEW64.exe, 0000000F.00000002.2461094512.0000000140010000.00000002.00000001.01000000.0000000E.sdmp, ISBEW64.exe, 00000010.00000000.2463209450.0000000140010000.00000002.00000001.01000000.0000000F.sdmp, ISBEW64.exe, 00000010.00000002.2468255547.0000000140010000.00000002.00000001.01000000.0000000F.sdmp, ISBEW64.exe, 00000016.00000002.2604177716.0000000140010000.00000002.00000001.01000000.00000013.sdmp, ISBEW64.exe, 00000016.00000000.2599760147.0000000140010000.00000002.00000001.01000000.00000013.sdmp, ISBEW64.exe, 00000017.00000002.2612946518.0000000140010000.00000002.00000001.01000000.00000014.sdmp, ISBEW64.exe, 00000017.00000000.2607137586.0000000140010000.00000002.00000001.01000000.00000014.sdmp, ISBEW64.exe, 00000018.00000000.2614679127.0000000140010000.00000002.00000001.01000000.00000015.sdmp, ISBEW64.exe, 00000018.00000002.2617318108.0000000140010000.00000002.00000001.01000000.00000015.sdmp
    Source: Binary string: t:\ses\x86\ship\0\opatchinst.pdbhip\0\opatchinst.exe\bbtopt\opatchinstO.pdb source: AccessDatabaseEngine.exe, 00000008.00000002.2433851957.000000002DE81000.00000020.00000001.01000000.00000008.sdmp, AccessDatabaseEngine.exe, 00000008.00000000.2284491906.000000002DE81000.00000020.00000001.01000000.00000008.sdmp
    Source: Binary string: E:\Projects\ptedit51\bpac31\MergeModule\CustomEvent\Release\BIRegSet.pdb source: MSICA89.tmp, 00000014.00000000.2590849338.000000000053F000.00000002.00000001.01000000.00000012.sdmp, MSICA89.tmp, 00000014.00000002.2591823770.000000000053F000.00000002.00000001.01000000.00000012.sdmp
    Source: Binary string: C:\work\GitHub\InstallManager\Release\InstallManager.pdb source: InstallManager.exe, 00000006.00000000.2173483326.0000000000D92000.00000002.00000001.01000000.00000006.sdmp, InstallManager.exe, 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmp
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_00405F1E LoadLibraryA,GetProcAddress,lstrlenA,lstrlenA,lstrlenA,5_2_00405F1E
    Source: dotNetFx40_Full_setup.exe.5.drStatic PE information: section name: .boxld01
    Source: vccorlib110.dll.9.drStatic PE information: section name: minATL
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_00408AD8 push eax; ret 5_2_00408AF6
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_00408360 push eax; ret 5_2_0040838E
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00D6A865 push ecx; ret 6_2_00D6A878
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00D69AF4 push ecx; ret 6_2_00D69B07
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeCode function: 8_2_2DEB152E push ecx; ret 8_2_2DEB1541
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeCode function: 8_2_2DEAE66D push ecx; ret 8_2_2DEAE680
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_0051A225 push ecx; ret 20_2_0051A238
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_00517D61 push ecx; ret 20_2_00517D74
    Source: msvcr110.dll.9.drStatic PE information: section name: .text entropy: 6.9113720938783825
    Source: CableLabel.exe.9.drStatic PE information: section name: .text entropy: 7.42889303939604

    Persistence and Installation Behavior

    barindex
    Source: C:\Windows\System32\msiexec.exeExecutable created and started: C:\Windows\Installer\MSICA89.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\TrCnv4930.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\bPACInterface.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\PrnEvntNetMon.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\vccorlib110.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\BroSNMP.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\ptmdanet.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Microsoft Office\Office14\STSLIST.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEXBE.DLLJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{BEB42744-6340-45B8-9F53-1E39881815F3}\ISRT.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\msvcr110.dllJump to dropped file
    Source: C:\Windows\SysWOW64\wget.exeFile created: C:\Users\user\Desktop\download\cltw10100a.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEOLEDB.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\VBAJET32.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\DataBaseInterface.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\Brpsnet.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_OLEPRO32_f0.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\BECdata.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI91F0.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\TrCnv5130.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEEXCL.DLLJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISRT.dllJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{17CEC823-4AB4-40C3-B585-B72FBC1A1527}\ISBEW64.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\BroSNMP.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\Cultures\OFFICE.ODFJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\ACEWSTR.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI97BF.tmpJump to dropped file
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\dotNetFx40_Full_setup.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\EXPSRV.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\PtImgImp.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEODEXL.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\EXP_XPS.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACERCLR.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\TrCnv5030.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\zip32.dllJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{4D3AAFCB-F4A5-4635-B876-40288960575F}\_isres_0x0409.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\bpacRes.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\ptmdamm.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5FF1.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\System.Xaml.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\TransferCnv.dllJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{BEB42744-6340-45B8-9F53-1E39881815F3}\_isres_0x0409.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI953D.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEEXCH.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\TrCnv6130.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\WinSxS\InstallTemp\20240325143928017.0\msvcm90.dllJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{17CEC823-4AB4-40C3-B585-B72FBC1A1527}\ISRT.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\ptfilontm.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_OLEAUT32_f2.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\bpaccable.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\TrCnv5530.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}\NewShortcut1_E9BE88FB21B24B1191C0B79BB4908EC1.exeJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{C94AACC5-E97F-46C2-A601-8B973B2BC7F5}\ISRT.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Brother\P-touch\brptmif.dllJump to dropped file
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACER3X.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_OLEAUT32_f3.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5E4A.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSID1EE.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEODTXT.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Brother\P-touch\QRmakerAd.ocxJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\TrCnv6230.dllJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{17CEC823-4AB4-40C3-B585-B72FBC1A1527}\_isres_0x0409.dllJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{4D3AAFCB-F4A5-4635-B876-40288960575F}\ISRT.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEREP.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEWSS.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\ACERECR.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXEJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\TrCnv4C30.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5DCC.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\Microsoft.Expression.Drawing.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEDAO.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\ACEINTL.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}\ARPPRODUCTICON.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\MSOINTL.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\WinSxS\InstallTemp\20240325143928017.0\msvcr90.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACETXT.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSORES.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\System.Dynamic.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICA89.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEERR.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEODDBS.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\ptfilot.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5D3E.tmpJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{C94AACC5-E97F-46C2-A601-8B973B2BC7F5}\_isres_0x0409.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\CableLabel.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\TrCnv3430.dllJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{BEB42744-6340-45B8-9F53-1E39881815F3}\ISBEW64.exeJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\_isres_0x0409.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEODBC.DLLJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{88126FF3-5FB8-4112-8A6E-8CC3757E4773}\ISRT.dllJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{88126FF3-5FB8-4112-8A6E-8CC3757E4773}\ISBEW64.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI786C.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Microsoft Office\Office14\1033\STSLISTI.DLLJump to dropped file
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\TrCnv.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACECORE.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\TrCnv6330.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_STDOLE_f1.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\ACEODBCI.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\EXP_PDF.DLLJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{C94AACC5-E97F-46C2-A601-8B973B2BC7F5}\ISBEW64.exeJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{88126FF3-5FB8-4112-8A6E-8CC3757E4773}\_isres_0x0409.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\Microsoft.CSharp.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\TrCnv5830.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5C91.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\pttmnet.dllJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{4D3AAFCB-F4A5-4635-B876-40288960575F}\ISBEW64.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\TRDRV.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\MSOINTL.REST.IDX_DLLJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\Ptbcd.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEWDAT.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEES.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICFAB.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\MSOINTL.DLL.IDX_DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICBA3.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Brother\CableLabel\TrCnv4D30.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\WinSxS\InstallTemp\20240325143928017.0\msvcp90.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\unzip32.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSO.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\vccorlib110.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI786C.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\msvcr110.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5DCC.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5FF1.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_STDOLE_f1.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_OLEPRO32_f0.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI91F0.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI953D.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\WinSxS\InstallTemp\20240325143928017.0\msvcm90.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}\ARPPRODUCTICON.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5C91.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\WinSxS\InstallTemp\20240325143928017.0\msvcr90.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_OLEAUT32_f2.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}\NewShortcut1_E9BE88FB21B24B1191C0B79BB4908EC1.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICA89.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5D3E.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_OLEAUT32_f3.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI5E4A.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSID1EE.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI97BF.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICFAB.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSICBA3.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\WinSxS\InstallTemp\20240325143928017.0\msvcp90.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_OLEPRO32_f0.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_STDOLE_f1.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_OLEAUT32_f2.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_OLEAUT32_f3.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\Cultures\OFFICE.ODFJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C64A60 GetPrivateProfileStringW,6_2_00C64A60
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\ARE\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\ARE\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\BGR\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\BGR\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\CHS\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\CHS\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\CHT\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\CHT\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\CRO\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\CRO\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\CZE\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\CZE\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\DAN\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\DAN\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\DUT\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\DUT\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\ENA\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\ENA\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\FIN\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\FIN\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\FRA\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\FRA\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\GER\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\GER\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\HEB\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\HEB\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\HUN\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\HUN\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\ITA\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\ITA\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\JPN\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\JPN\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\KOR\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\KOR\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\NOR\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\NOR\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\POL\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\POL\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\POR\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\POR\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\PTB\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\PTB\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\ROM\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\ROM\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\RUS\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\RUS\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\SPA\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\SPA\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\SVK\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\SVK\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\SVN\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\SVN\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\SWE\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\SWE\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\THA\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\THA\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\TRK\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\TRK\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\UK\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\UK\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\US\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\US\LICENSE_U.txtJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\VIT\LICENSE.TXTJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\EULA\VIT\LICENSE_U.txtJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Brother P-touchJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Brother P-touch\Cable Label Tool 1.0.lnkJump to behavior

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\System32\LogonUI.exeFile created: C:\$RECYCLE.BIN\S-1-5-18
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C5FC80 IsIconic,SendMessageW,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,6_2_00C5FC80
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00CE092B GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,6_2_00CE092B
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00CE092B GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,6_2_00CE092B
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00CE092B GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetWindowRect,IsIconic,GetSystemMetrics,OffsetRect,GetSystemMetrics,IsIconic,GetSystemMetrics,GetSystemMetrics,6_2_00CE092B
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C88CFF SetRectEmpty,RedrawWindow,ReleaseCapture,SetCapture,ReleaseCapture,SetCapture,SendMessageW,UpdateWindow,SendMessageW,IsWindow,IsIconic,IsZoomed,IsWindow,UpdateWindow,6_2_00C88CFF
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00CE0C2B IsWindowVisible,ScreenToClient,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsIconic,GetSystemMetrics,PtInRect,GetSystemMetrics,PtInRect,GetSystemMetrics,PtInRect,6_2_00CE0C2B
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00CE11B6 IsWindow,IsWindowVisible,GetWindowRect,PtInRect,GetAsyncKeyState,ScreenToClient,IsWindow,IsWindow,IsWindow,GetWindowRect,PtInRect,SendMessageW,PtInRect,SendMessageW,ScreenToClient,PtInRect,GetParent,SendMessageW,GetFocus,WindowFromPoint,SendMessageW,GetSystemMenu,IsMenu,EnableMenuItem,EnableMenuItem,EnableMenuItem,IsZoomed,IsIconic,EnableMenuItem,TrackPopupMenu,SendMessageW,6_2_00CE11B6
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00CB9712 GetClientRect,IsRectEmpty,IsIconic,BeginDeferWindowPos,GetClientRect,IsRectEmpty,IsRectEmpty,EqualRect,GetWindowRect,GetParent,EndDeferWindowPos,6_2_00CB9712
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00CA39B2 IsIconic,6_2_00CA39B2
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00CA390E SetForegroundWindow,IsIconic,6_2_00CA390E
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00CEDC71 IsWindowVisible,IsIconic,6_2_00CEDC71
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00CE1D7B IsIconic,PostMessageW,6_2_00CE1D7B
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00CDFE9C IsWindow,GetFocus,IsChild,SendMessageW,IsChild,SendMessageW,IsIconic,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,IsWindowVisible,6_2_00CDFE9C
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_0044A700 IsWindowVisible,IsIconic,20_2_0044A700
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_0045ABC9 SetRectEmpty,RedrawWindow,ReleaseCapture,SetCapture,ReleaseCapture,SetCapture,SendMessageW,UpdateWindow,SendMessageW,IsWindow,IsIconic,IsZoomed,IsWindow,UpdateWindow,20_2_0045ABC9
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C7FCAB __EH_prolog3_GS,GetDeviceCaps,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DeleteObject,_memset,GetTextCharsetInfo,lstrcpyW,lstrcpyW,EnumFontFamiliesW,EnumFontFamiliesW,lstrcpyW,EnumFontFamiliesW,lstrcpyW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,CreateFontIndirectW,GetSystemMetrics,lstrcpyW,CreateFontIndirectW,GetStockObject,GetStockObject,GetObjectW,GetObjectW,lstrcpyW,CreateFontIndirectW,CreateFontIndirectW,GetStockObject,GetObjectW,CreateFontIndirectW,CreateFontIndirectW,__EH_prolog3_GS,GetVersionExW,GetSystemMetrics,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,6_2_00C7FCAB
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Installer\MSICA89.tmpProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
    Source: C:\Windows\System32\LogonUI.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\LogonUI.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\LogonUI.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\LogonUI.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeWindow / User API: threadDelayed 422Jump to behavior
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\TrCnv4930.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\bPACInterface.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\PrnEvntNetMon.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\vccorlib110.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\ptmdanet.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\BroSNMP.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Microsoft Office\Office14\STSLIST.DLLJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{BEB42744-6340-45B8-9F53-1E39881815F3}\ISRT.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEXBE.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\msvcr110.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEOLEDB.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\VBAJET32.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\DataBaseInterface.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\Brpsnet.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_OLEPRO32_f0.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\BECdata.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI91F0.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\TrCnv5130.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEEXCL.DLLJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISRT.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\BroSNMP.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\Cultures\OFFICE.ODFJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\ACEWSTR.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI97BF.tmpJump to dropped file
    Source: C:\Users\user\Desktop\download\cltw10100a.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\dotNetFx40_Full_setup.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\EXPSRV.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\PtImgImp.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEODEXL.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\EXP_XPS.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACERCLR.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\TrCnv5030.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\zip32.dllJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{4D3AAFCB-F4A5-4635-B876-40288960575F}\_isres_0x0409.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\ptmdamm.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI5FF1.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\TransferCnv.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\System.Xaml.dllJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{BEB42744-6340-45B8-9F53-1E39881815F3}\_isres_0x0409.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI953D.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEEXCH.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\TrCnv6130.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\WinSxS\InstallTemp\20240325143928017.0\msvcm90.dllJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{17CEC823-4AB4-40C3-B585-B72FBC1A1527}\ISRT.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_OLEAUT32_f2.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\ptfilontm.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\bpaccable.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\TrCnv5530.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}\NewShortcut1_E9BE88FB21B24B1191C0B79BB4908EC1.exeJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{C94AACC5-E97F-46C2-A601-8B973B2BC7F5}\ISRT.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Brother\P-touch\brptmif.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACER3X.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_OLEAUT32_f3.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSID1EE.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI5E4A.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEODTXT.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Brother\P-touch\QRmakerAd.ocxJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\TrCnv6230.dllJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{17CEC823-4AB4-40C3-B585-B72FBC1A1527}\_isres_0x0409.dllJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{4D3AAFCB-F4A5-4635-B876-40288960575F}\ISRT.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEREP.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEWSS.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\ACERECR.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXEJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\TrCnv4C30.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI5DCC.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEDAO.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\Microsoft.Expression.Drawing.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\ACEINTL.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\MSOINTL.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\{7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}\ARPPRODUCTICON.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\WinSxS\InstallTemp\20240325143928017.0\msvcr90.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACETXT.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\System.Dynamic.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEERR.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEODDBS.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI5D3E.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\ptfilot.dllJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{C94AACC5-E97F-46C2-A601-8B973B2BC7F5}\_isres_0x0409.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\CableLabel.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\TrCnv3430.dllJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\_isres_0x0409.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEODBC.DLLJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{88126FF3-5FB8-4112-8A6E-8CC3757E4773}\ISRT.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI786C.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Microsoft Office\Office14\1033\STSLISTI.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\TrCnv.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACECORE.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\TrCnv6330.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\$PatchCache$\Managed\81E326F7F3D59DF48B3BE4275393A92F\1.0.1001\Global_System_STDOLE_f1.8C0C59A0_7DC8_11D2_B95D_006097C4DE24Jump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\ACEODBCI.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\EXP_PDF.DLLJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{88126FF3-5FB8-4112-8A6E-8CC3757E4773}\_isres_0x0409.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\Microsoft.CSharp.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\TrCnv5830.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI5C91.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\pttmnet.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\MSOINTL.REST.IDX_DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\TRDRV.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEWDAT.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\Ptbcd.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\MSOINTL.DLL.IDX_DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSICFAB.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSICBA3.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\WinSxS\InstallTemp\20240325143928017.0\msvcp90.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Brother\CableLabel\TrCnv4D30.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\unzip32.dllJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSO.DLLJump to dropped file
    Source: C:\Windows\Installer\MSICA89.tmpEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
    Source: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeAPI coverage: 8.4 %
    Source: C:\Windows\Installer\MSICA89.tmpAPI coverage: 3.6 %
    Source: C:\Windows\System32\svchost.exe TID: 5856Thread sleep time: -30000s >= -30000s
    Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\download\cltw10100a.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\LogonUI.exeFile Volume queried: C:\ FullSizeInformation
    Source: C:\Windows\System32\LogonUI.exeFile Volume queried: C:\ FullSizeInformation
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_004015DC wsprintfA,FindFirstFileA,FindClose,5_2_004015DC
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_004051E0 lstrcpyA,lstrcpyA,lstrcatA,lstrcatA,DeleteFileA,FindFirstFileA,lstrcpyA,lstrcatA,lstrcatA,lstrcpyA,lstrcatA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,lstrcpyA,lstrlenA,RemoveDirectoryA,5_2_004051E0
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C7711D __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,lstrlenW,6_2_00C7711D
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C6A366 GetModuleHandleW,GetProcAddress,FindFirstFileW,6_2_00C6A366
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C6A75A lstrlenW,SetLastError,FindFirstFileW,GetLastError,__wfullpath,__wsplitpath_s,__wmakepath_s,6_2_00C6A75A
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C55B20 FindFirstFileW,FindClose,SHCreateDirectoryExW,CopyFileExW,FindFirstFileW,FindClose,CopyFileExW,SetFileAttributesW,6_2_00C55B20
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_0041430A __EH_prolog3_GS,GetFullPathNameW,PathIsUNCW,GetVolumeInformationW,CharUpperW,FindFirstFileW,FindClose,20_2_0041430A
    Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\userJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppDataJump to behavior
    Source: svchost.exe, 00000012.00000002.3350552239.000001AE4A443000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWPeCJ
    Source: svchost.exe, 00000012.00000002.3348213220.000001AE44C2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3350634379.000001AE4A455000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: LogonUI.exe, 00000019.00000002.3351729005.0000029FE17F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMWare
    Source: AccessDatabaseEngine.exe.5.drBinary or memory string: cThgfs
    Source: wget.exe, 00000002.00000002.2106255213.0000000000BC8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeAPI call chain: ExitProcess graph end nodegraph_6-59120
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeAPI call chain: ExitProcess graph end nodegraph_6-56569
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exeAPI call chain: ExitProcess graph end node
    Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Windows\System32\LogonUI.exeProcess queried: DebugPort
    Source: C:\Windows\System32\LogonUI.exeProcess queried: DebugPort
    Source: C:\Windows\System32\LogonUI.exeProcess queried: DebugPort
    Source: C:\Windows\System32\LogonUI.exeProcess queried: DebugPort
    Source: C:\Windows\System32\LogonUI.exeProcess queried: DebugPort
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00D683FC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00D683FC
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_005298D8 EncodePointer,EncodePointer,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,20_2_005298D8
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_00405F1E LoadLibraryA,GetProcAddress,lstrlenA,lstrlenA,lstrlenA,5_2_00405F1E
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_00406320 GetProcessHeap,HeapAlloc,5_2_00406320
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_0040D682 SetUnhandledExceptionFilter,5_2_0040D682
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_0040D694 SetUnhandledExceptionFilter,5_2_0040D694
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00D683FC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00D683FC
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00D704E8 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00D704E8
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeCode function: 8_2_2DEAE587 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_2DEAE587
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeCode function: 8_2_2DEB5CD3 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_2DEB5CD3
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeCode function: 8_2_2DEAE053 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_2DEAE053
    Source: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exeCode function: 14_2_000000014000946C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,14_2_000000014000946C
    Source: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exeCode function: 14_2_0000000140009CA8 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_0000000140009CA8
    Source: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exeCode function: 14_2_0000000140007200 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,14_2_0000000140007200
    Source: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exeCode function: 14_2_0000000140009E28 SetUnhandledExceptionFilter,14_2_0000000140009E28
    Source: C:\Windows\Installer\MSICA89.tmpCode function: 20_2_0051E560 SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_0051E560
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeProcess created: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exe C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exe /quiet /passiveJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeProcess created: C:\Windows\SysWOW64\msiexec.exe msiexec.exe /i "C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\CableLabel.msi" USERNAME="hardz" COMPANYNAME="" INSTPATH="C:\Program Files (x86)\Brother" NOCOMPANYNAME=0 SCDESKTOP=1 SCQUICK=1 GGANA=0 /norestart /qnJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSICA89.tmp "C:\Windows\Installer\MSICA89.tmp" /CommitJump to behavior
    Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe c:\windows\system32\cmd.exe /c wget -t 2 -v -t 60 -p "c:\users\user\desktop\download" --no-check-certificate --content-disposition --user-agent="mozilla/5.0 (windows nt 6.1; wow64; trident/7.0; as; rv:11.0) like gecko" "https://download.brother.com/welcome/dlfp100270/cltw10100a.exe" > cmdline.out 2>&1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -t 60 -p "c:\users\user\desktop\download" --no-check-certificate --content-disposition --user-agent="mozilla/5.0 (windows nt 6.1; wow64; trident/7.0; as; rv:11.0) like gecko" "https://download.brother.com/welcome/dlfp100270/cltw10100a.exe"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wget.exe wget -t 2 -v -t 60 -p "c:\users\user\desktop\download" --no-check-certificate --content-disposition --user-agent="mozilla/5.0 (windows nt 6.1; wow64; trident/7.0; as; rv:11.0) like gecko" "https://download.brother.com/welcome/dlfp100270/cltw10100a.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00C65100 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,6_2_00C65100
    Source: MSI97BF.tmp.9.dr, MSICBA3.tmp.9.drBinary or memory string: ?OPTYPE_PROGMAN_FIELDSWWW
    Source: InstallManager.exeBinary or memory string: Program Manager
    Source: InstallManager.exeBinary or memory string: Progman
    Source: AccessDatabaseEngine.exe, 00000008.00000003.2295394782.0000000000AD1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Creating Program Manager items
    Source: AccessDatabaseEngine.exe, 00000008.00000003.2295394782.0000000000AD1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Removing Program Manager items
    Source: InstallManager.exe, 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: %dProgram ManagerProgmanSHELLDLL_DefView\*.*Ptedit501LisencePathUsagePathUserRegCommonIDS_USERREG0IDS_SHORTCUTSETIDS_DISKTOPIDS_QUICKAddinDefaultIDS_ADDINIDS_WORDIDS_EXCELIDS_OUTLOOKPtedit51ADEFilePathADECmdOp\US\AccessDatabaseEngine.exePtedit52SOFTWARE\Brother Industries, Ltd.\P-touch Editor\5.2dwExitCodeSoftware\Brother Industries, Ltd.\P-touch Editor\5.1\Settings\GoogleAnalyticsSoftware\Brother Industries, Ltd.\P-touch Editor\5.2\Settings\GoogleAnalyticsAgreedPtedit50LEAdBook11AdBook12AdBook13SOFTWARE\Brother Industries, Ltd.\P-touch Address Book\1.3UpSoftUpdateSoftLangIDUKLANGID=SOFTWARE\Brother Industries, Ltd.\P-touch Update SoftwareEditLLPteLiteLANManualIDS_MANUALManualCopy\InstallManager\DriverIDS_DRIVERStand_StandDriverLangPtedit42VM100bPAC30JpnFontsIDS_JFONTPrintSetToolSOFTWARE\Brother Industries, Ltd.\LabelMobile Printer\Printer Setting ToolBRAdminLSCEditModelUnique\*msiexeregbatAppUpSoftIDS_APPUPSOFTRegKeyInstAppExeNameLastInstalledPrinterIDIDS_TITLE_BARIDS_UPDATEMSG%UPLANGID%%UPMODELID%AppAdView%LNG%CableLabelToolDotNETFilePathDotNETCmdOpSOFTWARE\Brother Industries, Ltd.\CableLabelSoftware\Microsoft\NET Framework SetUp\NDP\v4Software\Brother Industries, Ltd.\CableLabel\Settings\GoogleAnalyticsMAXPtedit51MAXPtedit52SOFTWARE\MAX\P-touch Editor\5.2MAXPrintSetToolSOFTWARE\MAX\Label Printer\Printer Setting Tool
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: GetLocaleInfoW,__snwprintf_s,LoadLibraryExW,6_2_00C78B33
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exeCode function: GetLocaleInfoA,8_2_2DEBC923
    Source: C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exeCode function: GetLocaleInfoA,14_2_000000014000E89C
    Source: C:\Windows\Installer\MSICA89.tmpCode function: GetModuleHandleW,GetProcAddress,EncodePointer,DecodePointer,GetLocaleInfoEx,GetLocaleInfoW,20_2_00407718
    Source: C:\Windows\SysWOW64\wget.exeQueries volume information: C:\Users\user\Desktop\download VolumeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\LogonUI.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
    Source: C:\Windows\System32\LogonUI.exeQueries volume information: C:\Windows\Fonts\segoeuisl.ttf VolumeInformation
    Source: C:\Windows\System32\LogonUI.exeQueries volume information: C:\Windows\Fonts\segmdl2.ttf VolumeInformation
    Source: C:\Windows\System32\LogonUI.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\LogonUI.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\LogonUI.exeQueries volume information: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\Assets\db592f99dcd09a9625238f8640951e0126844a8b0585e322a04f78e6ecf363ed VolumeInformation
    Source: C:\Windows\System32\LogonUI.exeQueries volume information: C:\Windows\Fonts\segoeuil.ttf VolumeInformation
    Source: C:\Windows\System32\LogonUI.exeQueries volume information: C:\Windows\Fonts\segmdl2.ttf VolumeInformation
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeQueries volume information: C:\Windows\Fonts\segoeuil.ttf VolumeInformation
    Source: C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exeQueries volume information: C:\Windows\Fonts\segoeuisl.ttf VolumeInformation
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00D6E36D GetSystemTimeAsFileTime,__aulldiv,6_2_00D6E36D
    Source: C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exeCode function: 6_2_00D75B67 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,SetOaNoCache,6_2_00D75B67
    Source: C:\Users\user\Desktop\download\cltw10100a.exeCode function: 5_2_00408C7E GetVersionExA,GetEnvironmentVariableA,GetModuleFileNameA,5_2_00408C7E
    Source: C:\Windows\SysWOW64\wget.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure1
    Replication Through Removable Media
    2
    Native API
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    21
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts1
    Command and Scripting Interpreter
    1
    Registry Run Keys / Startup Folder
    1
    Access Token Manipulation
    3
    Obfuscated Files or Information
    LSASS Memory11
    Peripheral Device Discovery
    Remote Desktop Protocol21
    Input Capture
    1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)12
    Process Injection
    1
    Software Packing
    Security Account Manager4
    File and Directory Discovery
    SMB/Windows Admin SharesData from Network Shared Drive1
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
    Registry Run Keys / Startup Folder
    1
    DLL Side-Loading
    NTDS36
    System Information Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    File Deletion
    LSA Secrets51
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts132
    Masquerading
    Cached Domain Credentials3
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
    Virtualization/Sandbox Evasion
    DCSync2
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    Access Token Manipulation
    Proc Filesystem11
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
    Process Injection
    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
    Hidden Files and Directories
    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1415123 URL: https://download.brother.co... Startdate: 25/03/2024 Architecture: WINDOWS Score: 48 81 download.brother.com 2->81 7 msiexec.exe 501 252 2->7         started        11 LogonUI.exe 2->11         started        13 cltw10100a.exe 184 2->13         started        15 4 other processes 2->15 process3 dnsIp4 67 C:\Windows\Installer\MSICA89.tmp, PE32 7->67 dropped 69 C:\Windows\WinSxS\InstallTemp\...\msvcr90.dll, PE32 7->69 dropped 71 C:\Windows\WinSxS\InstallTemp\...\msvcp90.dll, PE32 7->71 dropped 79 95 other files (none is malicious) 7->79 dropped 85 Drops executables to the windows directory (C:\Windows) and starts them 7->85 18 msiexec.exe 148 7->18         started        21 msiexec.exe 7->21         started        23 msiexec.exe 7->23         started        31 2 other processes 7->31 87 Creates files in the recycle bin to hide itself 11->87 73 C:\Users\user\AppData\...\InstallManager.exe, PE32 13->73 dropped 75 C:\Users\user\...\dotNetFx40_Full_setup.exe, PE32 13->75 dropped 77 C:\Users\user\...\AccessDatabaseEngine.exe, PE32 13->77 dropped 25 InstallManager.exe 13->25         started        83 127.0.0.1 unknown unknown 15->83 27 wget.exe 2 15->27         started        29 conhost.exe 15->29         started        file5 signatures6 process7 file8 49 C:\Users\user\AppData\...\_isres_0x0409.dll, PE32 18->49 dropped 51 C:\Users\user\AppData\Local\Temp\...\ISRT.dll, PE32 18->51 dropped 53 C:\Users\user\AppData\Local\...\ISBEW64.exe, PE32+ 18->53 dropped 63 6 other files (none is malicious) 18->63 dropped 33 ISBEW64.exe 18->33         started        35 ISBEW64.exe 18->35         started        37 ISBEW64.exe 18->37         started        55 C:\Users\user\AppData\...\_isres_0x0409.dll, PE32 21->55 dropped 57 C:\Users\user\AppData\Local\Temp\...\ISRT.dll, PE32 21->57 dropped 59 C:\Users\user\AppData\Local\...\ISBEW64.exe, PE32+ 21->59 dropped 65 6 other files (none is malicious) 21->65 dropped 39 ISBEW64.exe 21->39         started        41 ISBEW64.exe 21->41         started        43 ISBEW64.exe 21->43         started        45 AccessDatabaseEngine.exe 8 25->45         started        47 msiexec.exe 25->47         started        61 C:\Users\user\Desktop\...\cltw10100a.exe, PE32 27->61 dropped process9

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    https://download.brother.com/welcome/dlfp100270/cltw10100a.exe0%Avira URL Cloudsafe
    https://download.brother.com/welcome/dlfp100270/cltw10100a.exe0%VirustotalBrowse
    SourceDetectionScannerLabelLink
    C:\Program Files (x86)\Brother\CableLabel\BroSNMP.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\BroSNMP.dll0%VirustotalBrowse
    C:\Program Files (x86)\Brother\CableLabel\CableLabel.exe2%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\CableLabel.exe0%VirustotalBrowse
    C:\Program Files (x86)\Brother\CableLabel\DataBaseInterface.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\DataBaseInterface.dll0%VirustotalBrowse
    C:\Program Files (x86)\Brother\CableLabel\Microsoft.CSharp.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\Microsoft.CSharp.dll0%VirustotalBrowse
    C:\Program Files (x86)\Brother\CableLabel\Microsoft.Expression.Drawing.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\Microsoft.Expression.Drawing.dll0%VirustotalBrowse
    C:\Program Files (x86)\Brother\CableLabel\System.Dynamic.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\System.Dynamic.dll0%VirustotalBrowse
    C:\Program Files (x86)\Brother\CableLabel\System.Xaml.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\System.Xaml.dll0%VirustotalBrowse
    C:\Program Files (x86)\Brother\CableLabel\TRDRV.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\TrCnv.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\TrCnv3430.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\TrCnv4930.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\TrCnv4C30.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\TrCnv4D30.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\TrCnv5030.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\TrCnv5130.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\TrCnv5530.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\TrCnv5830.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\TrCnv6130.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\TrCnv6230.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\TrCnv6330.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\TransferCnv.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\bPACInterface.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\ptfilontm.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\ptfilot.dll0%ReversingLabs
    C:\Program Files (x86)\Brother\CableLabel\pttmnet.dll0%ReversingLabs
    C:\Program Files (x86)\Common Files\Brother\P-touch\QRmakerAd.ocx0%ReversingLabs
    C:\Program Files (x86)\Common Files\Brother\P-touch\brptmif.dll0%ReversingLabs
    C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\BECdata.dll0%ReversingLabs
    C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\BroSNMP.dll0%ReversingLabs
    C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\Brpsnet.dll0%ReversingLabs
    C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\PrnEvntNetMon.exe0%ReversingLabs
    C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\PtImgImp.dll0%ReversingLabs
    C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\Ptbcd.dll0%ReversingLabs
    C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\bpacRes.dll0%ReversingLabs
    C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\bpaccable.dll0%ReversingLabs
    C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\ptmdamm.dll0%ReversingLabs
    C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\ptmdanet.dll0%ReversingLabs
    C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\unzip32.dll0%ReversingLabs
    C:\Program Files (x86)\Common Files\Brother\b-PAC Cable\zip32.dll0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\ACEINTL.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\ACEODBCI.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\ACERECR.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\ACEWSTR.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\MSOINTL.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\MSOINTL.DLL.IDX_DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\1033\MSOINTL.REST.IDX_DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACECORE.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEDAO.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEERR.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEES.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEEXCH.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEEXCL.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEODBC.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEODDBS.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEODEXL.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEODTXT.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEOLEDB.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACER3X.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACERCLR.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEREP.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACETXT.DLL0%ReversingLabs
    C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\ACEWDAT.DLL0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://ocsp.thawte.com00%URL Reputationsafe
    http://ns.a.0/sTy0%Avira URL Cloudsafe
    http://www.brother.co.th/Support/Warranty.aspx0%Avira URL Cloudsafe
    http://ns.adobe.hotosh0%Avira URL Cloudsafe
    http://www.reg.brother-cn.net/0%Avira URL Cloudsafe
    http://.:0%Avira URL Cloudsafe
    http://www.reg.brother-cn.net/0%VirustotalBrowse
    https://myportal.brother.co.jp/0%Avira URL Cloudsafe
    http://www.brother.com.hk/en/warranty/warranty_registration.html0%Avira URL Cloudsafe
    http://crl.ver)0%Avira URL Cloudsafe
    https://myportal.brother.co.jp/0%VirustotalBrowse
    http://www.brother.com.hk/en/warranty/warranty_registration.html0%VirustotalBrowse
    http://www.brother.co.th/Support/Warranty.aspx0%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    download.brother.com
    unknown
    unknownfalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://ns.adobe.hotoshLogonUI.exe, 00000019.00000002.3353316842.0000029FE36FD000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://g.live.com/odclientsettings/Prod/C:svchost.exe, 00000012.00000003.2528055650.000001AE4A1D3000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        https://download.brother.com/welcome/dlfp100270/cltw10100a.exeiwget.exe, 00000002.00000002.2106335874.0000000001255000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://www.brother.co.th/Support/Warranty.aspxInstallManager.exe, 00000006.00000003.2174364165.0000000002680000.00000004.00000800.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://download.brother.com/welcome/dlfp100270/cltw10100a.exebwget.exe, 00000002.00000002.2106203273.0000000000AAD000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2105837767.0000000000AAB000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://crl.thawte.com/ThawteTimestampingCA.crl0wget.exe, 00000002.00000003.2091467965.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000AD6000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://ns.a.0/sTyLogonUI.exe, 00000019.00000002.3353316842.0000029FE36FD000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://www.symauth.com/rpa00wget.exe, 00000002.00000002.2106239962.0000000000AE2000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000AD6000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://ocsp.thawte.com0wget.exe, 00000002.00000003.2091467965.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000AD6000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.brother.comString1033.txt0.13.drfalse
                  high
                  http://www.reg.brother-cn.net/InstallManager.exe, 00000006.00000003.2174364165.0000000002680000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://.:InstallManager.exe, 00000006.00000000.2173483326.0000000000D92000.00000002.00000001.01000000.00000006.sdmp, InstallManager.exe, 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://crl.ver)svchost.exe, 00000012.00000002.3350470629.000001AE4A400000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.brother.com/registration/index.htmlInstallManager.exe, 00000006.00000003.2174364165.0000000002680000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://download.brother.com/welcome/dlfp100270/cltw10100a.exeywget.exe, 00000002.00000002.2106203273.0000000000AAD000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2105837767.0000000000AAB000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://g.live.com/odclientsettings/ProdV2.C:svchost.exe, 00000012.00000003.2528055650.000001AE4A160000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://download.brother.com/welcome/dlfp100270/cltw10100a.exewget.exe, 00000002.00000002.2106335874.0000000001255000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2105837767.0000000000AAB000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.brother.com.hk/en/warranty/warranty_registration.htmlInstallManager.exe, 00000006.00000003.2174364165.0000000002680000.00000004.00000800.00020000.00000000.sdmpfalse
                          • 0%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          https://download.brother.com/welcome/dlfp100270/cltw10100a.exeuser-hwget.exe, 00000002.00000002.2106335874.0000000001250000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.symauth.com/cps0(wget.exe, 00000002.00000002.2106239962.0000000000AE2000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000ADE000.00000004.00000020.00020000.00000000.sdmp, wget.exe, 00000002.00000003.2091467965.0000000000AD6000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://download.brother.com/welcome/dlfp100270/cltw10100a.exe_dwget.exe, 00000002.00000002.2106335874.0000000001250000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.google.com/analytics/learn/privacy.htmlInstallManager.exe, 00000006.00000002.3347951008.00000000029C0000.00000004.00000020.00020000.00000000.sdmp, USAGE.TXT25.5.dr, USAGE.TXT1.5.drfalse
                                  high
                                  https://myportal.brother.co.jp/InstallManager.exe, 00000006.00000003.2174364165.0000000002680000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  IP
                                  127.0.0.1
                                  Joe Sandbox version:40.0.0 Tourmaline
                                  Analysis ID:1415123
                                  Start date and time:2024-03-25 14:38:08 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 11m 10s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:urldownload.jbs
                                  Sample URL:https://download.brother.com/welcome/dlfp100270/cltw10100a.exe
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:31
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal48.evad.win@38/402@1/1
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 86%
                                  • Number of executed functions: 146
                                  • Number of non-executed functions: 258
                                  • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
                                  • Excluded IPs from analysis (whitelisted): 23.213.157.19, 23.221.242.90
                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, e16604.g.akamaiedge.net, ctldl.windowsupdate.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, download.brother.com.edgekey.net, fe3cr.delivery.mp.microsoft.com, e7715.g.akamaiedge.net
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                  • Report size getting too big, too many NtCreateKey calls found.
                                  • Report size getting too big, too many NtEnumerateKey calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Report size getting too big, too many NtSetInformationFile calls found.
                                  • Report size getting too big, too many NtSetValueKey calls found.
                                  TimeTypeDescription
                                  14:39:44API Interceptor2x Sleep call for process: svchost.exe modified
                                  14:40:58API Interceptor1x Sleep call for process: LogonUI.exe modified
                                  No context
                                  No context
                                  No context
                                  No context
                                  No context
                                  Process:C:\Windows\System32\LogonUI.exe
                                  File Type:Windows desktop.ini
                                  Category:dropped
                                  Size (bytes):129
                                  Entropy (8bit):5.323600488446077
                                  Encrypted:false
                                  SSDEEP:3:0NdQDjoqxyRVIQBU+1IVLfAPmBACaWZcy/FbBmedyn:0NwoSyzI2U8MAPVCawbBmeUn
                                  MD5:A526B9E7C716B3489D8CC062FBCE4005
                                  SHA1:2DF502A944FF721241BE20A9E449D2ACD07E0312
                                  SHA-256:E1B9CE9B57957B1A0607A72A057D6B7A9B34EA60F3F8AA8F38A3AF979BD23066
                                  SHA-512:D83D4C656C96C3D1809AD06CE78FA09A77781461C99109E4B81D1A186FC533A7E72D65A4CB7EDF689EECCDA8F687A13D3276F1111A1E72F7C3CD92A49BCE0F88
                                  Malicious:false
                                  Reputation:low
                                  Preview:[.ShellClassInfo]..CLSID={645FF040-5081-101B-9F08-00AA002F954E}..LocalizedResourceName=@%SystemRoot%\system32\shell32.dll,-8964..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):514358
                                  Entropy (8bit):4.746672220499425
                                  Encrypted:false
                                  SSDEEP:6144:cauF3D6zvOCmDoarvNj71RdVJ5QJKfE1V5pjVEMYJ0CFstNWeTgT+Y0PZ5L+mhQt:cEU
                                  MD5:499D74BB2EF80DB920C8516EC23E856A
                                  SHA1:C4465B160886302D621C1649C0E47759E31A2201
                                  SHA-256:03A7BA980EE177E38BFB88C0FD5AEC7E542F4632ED6B1DF641A4D84689D05809
                                  SHA-512:2886011323B2A314D09F95BE560B69916B4A0539A301B68CBAEAAFD3213263D8BF0C0519BA5638A6C5A9B1D6965DF1E2AFE72F134CE23C92489BD56015A779D8
                                  Malicious:false
                                  Reputation:low
                                  Preview:...@IXOS.@.....@.tyX.@.....@.....@.....@.....@.....@......&.{90140000-00D1-0409-0000-0000000FF1CE}/.Microsoft Access database engine 2010 (English)..AceRedist.msi.@.....@.....@.....@........&.{77770536-28B1-4201-9170-6888BD5ECA8B}.....@.....@.....@.....@.......@.....@.....@.......@..../.Microsoft Access database engine 2010 (English)......Rollback..Rolling back installation..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{398E906A-826B-48DD-9791-549C649CACE5}&.{90140000-00D1-0409-0000-0000000FF1CE}.@......&.{A6D1C76C-5B2F-4D54-8682-95738E88B3AC}&.{90140000-00D1-0409-0000-0000000FF1CE}.@......&.{88D5AF78-19C6-4D47-B4EC-5BAF83D02E92}&.{90140000-00D1-0409-0000-0000000FF1CE}.@......&.{1CDB09B8-58BA-46B5-B334-0F38167D3AC1}&.{90140000-00D1-0409-0000-0000000FF1CE}.@......&.{C6715366-3AA7-4E71-A4BC-A2DBC3CD387E}&.{90140000-00D1-0409-0000-0000000FF1CE}.@......&.{7266A3B3-E489-4133-A59C-9E03A0150E26}&.{90140000-00D1-0409-0000-00000
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):5766711
                                  Entropy (8bit):7.588482376446496
                                  Encrypted:false
                                  SSDEEP:98304:kc77Lhoxfl8sqfEcp74NRt4jMlCiDFo5v4qbGkQgPiDFo5v4qbGkQgZiDFo5v4qd:zxfEc0t4jMlC8FevLMgP8FevLMgZ8Feh
                                  MD5:BA07AF3111C50328CA6127949CEBEE3C
                                  SHA1:3392C92ABC7ABD084105E01A8C172A61F346C774
                                  SHA-256:56F76666C26A888E6C129A95104CDC2BC2D59DE087078B939CEF6A9B1F947F8F
                                  SHA-512:CB854ECE5869751B4CCF4EDB8F28B82F7E347F55493914BF976EDEB150FF6D56BE5F2CE5473E1890D5BE4370FA02FF4315E0615217244B29265854E555FD6F28
                                  Malicious:false
                                  Reputation:low
                                  Preview:...@IXOS.@.....@.tyX.@.....@.....@.....@.....@.....@......&.{7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}..Brother Cable Label Tool 1.0..CableLabel.msi.@.....@.....@.....@......ARPPRODUCTICON.exe..&.{359EA332-970F-4A7E-BDB3-23381B02ECBF}.....@.....@.....@.....@.......@.....@.....@.......@......Brother Cable Label Tool 1.0......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{DC04E706-5A91-4837-A0FD-88119BED0A61}&.{7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}.@......&.{96D06DDA-33B9-4D80-B7AA-2796E4C27891}&.{7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}.@......&.{E1C50958-F328-49E0-9548-C5F117FFADB6}&.{7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}.@......&.{436AA520-D40C-48AF-95BF-288F508A1310}&.{7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}.@......&.{94A5322B-4C71-4757-9844-46C68234D027}&.{7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}.@......&.{5534EDE4-0E93-4AE1-9692-FE3CC8015DBE}&.{7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}.@......&.{23070
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):176128
                                  Entropy (8bit):5.846453062376389
                                  Encrypted:false
                                  SSDEEP:3072:sy6Dn8VTOO3hEl5CZKbdZg2aZYaxDFJHH0GKVLhPEPTFpwQPgkVtFVkbM8EAKxP+:sWNPgkVtFibM8d06pe
                                  MD5:8FB74A2EB58B06ED6E13FAFDF0E15A2F
                                  SHA1:83489F4027FD89A140E8E26E3AF1BB2AA8480AD8
                                  SHA-256:6289D9AE201A761C748FC65B939ECA1EE6B5B7D83BAB8D0AB372C7A8F6A159EC
                                  SHA-512:327D927D7A65CDD1A6F1A391437311E705D6ADAA869C968107D46AE3ECD277E4097CCE367A5F0824A6785366E014209B90CA15A3D62B39F0C79DAA4C1C57A9C4
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........7...V.W.V.W.V.W.I.W.V.W.J.W.V.WEJ.W.V.W.p.W.V.WH^.W.V.WE^.W.V.W.V.W.W.W.p.W.V.W.P.W.V.W9v.W.V.WRich.V.W........PE..L......F...........!.........P............................................... .......................................................................................................................................................................text.............................. ..`.rdata..2B.......P..................@..@.data........ ...@... ..............@....rsrc................`..............@..@.reloc...0.......@...p..............@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):763568
                                  Entropy (8bit):7.407216496138663
                                  Encrypted:false
                                  SSDEEP:12288:oHsIx3V/nY3uTwuv6BxiI3JUdCU6H7kU4LVXnjtlA1GPBNy3cN:KPFniojCXlJUdCgVXnRK1GPBNysN
                                  MD5:21D5A91441177A9505E269F2577C8A64
                                  SHA1:938A2F4D8F7DB2851EC11E782858FBB9E447DAB4
                                  SHA-256:E4FA12E03ECEFD8FA4A6C1DAF835D029F160D04557E43F106CA816208390AE3F
                                  SHA-512:48E297D750D773944A6686716E43095BADC4F45E11629EC018E7AC8DA0265C0546E343D402B9ED597B3DA8EC6DCCA2C30946AD1EC4A3C7F3C9F3EC578DCCAEB1
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 2%
                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..._.)X................."...f.......@... ...`....@.. ..............................v.....@.................................`@..K....`..xc..........................(?............................................... ............... ..H............text.... ... ...".................. ..`.rsrc...xc...`...d...$..............@..@.reloc..............................@..B.................@......H.......,...................k.............................................(............s....(........m...s....(....*.0..c........~F...{}...r...p(....s....(....(z...,...(.....(...+o.....+..o.......( ...o.....o!...-....,..o"....*.......9..X.......0..........~n...9....(z.....~n...o#...3x.#......t@($....,..#......D@(%...+..(&...#......D@Y#......t@Y(%....#......D@('....((...#......D@Y#......N@Y().....(*...*~n...o#...-.~n...o+...#.....@....~n...o#....3..(,.....(*...*.(-....3..(....
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):96756
                                  Entropy (8bit):4.872051888870881
                                  Encrypted:false
                                  SSDEEP:384:GxKplH14/kPSoQu2DEkJkgSB6SqcRs2aUSQ/lQGmLu25SDIRre2Bt3T4Sa8n917q:GxXDFJXnCAK
                                  MD5:2FC3D76E0981B93B7510367F642B4440
                                  SHA1:8616F9AC4E494F5DA50DCB3668A4AA5144F857ED
                                  SHA-256:589FB974AC7DA7899835C3555F911AC3A4A2C57B5DE2EFDD62874E5E62A58EAE
                                  SHA-512:98E9EBF768D43F94FDDA2B2F0AFB7623F21A9FEC14D93F60BAB8728CC5973946963C64898B0334B1B59B502A29906B8F00FEF31A021A3D732634784858CF6334
                                  Malicious:false
                                  Reputation:low
                                  Preview:<?xml version="1.0"?>..<Brother xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema">.. <CurrentLanguage />.. <SerialNumberColor>.. <string>FF8080</string>.. <string>FFFF80</string>.. <string>80FF80</string>.. <string>80FFFF</string>.. <string>8080FF</string>.. </SerialNumberColor>.. <ConfigInfoData Language="zh-CN" Text="..(..)">.. <FontType>Microsoft YaHei UI</FontType>.. <TemplateFile>TemplateSimSun.lbx</TemplateFile>.. <CableType>.. <CableTypeInfo Name="General">.. <Title>..</Title>.. </CableTypeInfo>.. <CableTypeInfo Name="FacePlate">.. <Title>..</Title>.. </CableTypeInfo>.. <CableTypeInfo Name="PatchPanel">.. <Title>...</Title>.. </CableTypeInfo>.. <CableTypeInfo Name="PunchDownBlock">.. <Title>....</Title>.. </CableTypeInfo>.. <CableTypeInfo Name="CableWrap">.. <Title>......</Title>..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1400
                                  Entropy (8bit):4.936185519661069
                                  Encrypted:false
                                  SSDEEP:12:TMGQka8iPiOFNH/xhFaX1FqcgVXPcFl1FLLJ/qsFELj1FmXfqehF/F1FiYFvD1F9:3la8M7mfmPu/gzDmieL1FjzmS850RFb
                                  MD5:79EADEFE7A3BB03EACD26C63BD20BADA
                                  SHA1:B60473551514F59E9E96E2FD19F170A99A4459C4
                                  SHA-256:980B89843B3E01CD0E0609612897255FD4A1CEF2F16896BA72B265F632A635B0
                                  SHA-512:A1B90E69CC016772F47E1236A212BAD5C3B12B17DB6F8C3489CA6CFF3F4C5434B30081D4163A79A841E5F932C25083482BA3B99B1446E154C6C2A8BDA9A54DEB
                                  Malicious:false
                                  Reputation:low
                                  Preview:<?xml version="1.0"?>..<Brother xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema">.. <AttibuteCtrl Template="General">.. <Name>General</Name>.. <CtrlType>LabelSettings4General</CtrlType>.. </AttibuteCtrl>.. <AttibuteCtrl Template="FacePlate">.. <Name>Face Plate</Name>.. <CtrlType>LabelSettings4FacePlate</CtrlType>.. </AttibuteCtrl>.. <AttibuteCtrl Template="PatchPanel">.. <Name>Patch Panel</Name>.. <CtrlType>LabelSettings4PatchPanel</CtrlType>.. </AttibuteCtrl>.. <AttibuteCtrl Template="PunchDownBlock">.. <Name>Punch-Down Block</Name>.. <CtrlType>LabelSettings4PunchDownBlock</CtrlType>.. </AttibuteCtrl>.. <AttibuteCtrl Template="CableWrap">.. <Name>Cable Wrap</Name>.. <CtrlType>LabelSettings4CableWrap</CtrlType>.. </AttibuteCtrl>.. <AttibuteCtrl Template="CableFlag">.. <Name>Cable Flag</Name>.. <CtrlType>LabelSettings4CableFlag</CtrlType>.. </AttibuteCtrl>.. <AttibuteCtrl Template="DiecutF
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF, LF line terminators
                                  Category:dropped
                                  Size (bytes):97776
                                  Entropy (8bit):5.92551088433116
                                  Encrypted:false
                                  SSDEEP:1536:Xty7nzoiRiJ+LvT8vJillYMq1vcmwYcm4ncn8zsu+zS52RnRp8HeKdkoWuBwEt8X:Uxqm+uxQhSP+
                                  MD5:EB5DDB8EC84D8A63D16B8BBF379289D9
                                  SHA1:70BF9C8981E3F0748E0164561E1DEDF5367F9A99
                                  SHA-256:813EFEC7C96526D6E6E12B9066D6C5A73D59E0FF74CEA7A3C8EF2E9154FE77B3
                                  SHA-512:DFDFA590ED14754F4112356D5E7CA34A8699008B69C8EA692240F5CEF317168FB3495CBE90B49E468BD50DA6F37040812E52A5DAEA950C42927585837F1FEBC6
                                  Malicious:false
                                  Reputation:low
                                  Preview:<?xml version="1.0"?>..<Brother xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema">.. <ErrorMsg Language="zh-CN">.. <OpenLBXFileFailed>.......</OpenLBXFileFailed>.. <SaveLBXFileFailed>.......</SaveLBXFileFailed>.. <UsablePrinterNotFound>......PT.......PT..........</UsablePrinterNotFound>.. <PrinterNotAvailiable>.........................</PrinterNotAvailiable>.. <UsableFontFamilyNotFound>.......</UsableFontFamilyNotFound>.. <PrinterOfflineOrMediaFailed>.........../..</PrinterOfflineOrMediaFailed>.. <bPACNotInstalled>............Cable Label Tool......</bPACNotInstalled>.. <Transfer_PrinterNotSupported>................</Transfer_PrinterNotSupported>.. <Transfer_PrinterNotConnected>...
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):5032
                                  Entropy (8bit):5.403053753061884
                                  Encrypted:false
                                  SSDEEP:48:Va8df4/fUginGLZa65N0IjzZttyZhbBuG+9b:lO065NHzZuhYd
                                  MD5:20FCA380AF7D2072550D466F961C963B
                                  SHA1:424B5B3774208740D2F71653549E127F62C5ABE8
                                  SHA-256:725E7F80E9D7CA6331356582ACD9F4707A0015F8427FE7154B56ED6581E28C7D
                                  SHA-512:8BC277B3EA34316F979209AFF85AB9F36B0FE50AEBC98D09BC671FCE2ED85B62093D9842FD8E35347869B8360EFC7141244C8659213F9884014C50079FD81081
                                  Malicious:false
                                  Reputation:low
                                  Preview:<?xml version="1.0"?>..<Brother xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema">.. <NoticeMsg Language="zh-CN" Title="">.. <Transfer_Succeeded>.....</Transfer_Succeeded>.. <DataBase_SearchFinished>.....</DataBase_SearchFinished>.. </NoticeMsg>.. <NoticeMsg Language="en-US" Title="">.. <Transfer_Succeeded>File transfer completed successfully.</Transfer_Succeeded>.. <DataBase_SearchFinished>Search completed.</DataBase_SearchFinished>.. </NoticeMsg>.. <NoticeMsg Language="ja-JP" Title="">.. <Transfer_Succeeded>.........</Transfer_Succeeded>.. <DataBase_SearchFinished />.. </NoticeMsg>.. <NoticeMsg Language="ar-AE" Title="">.. <Transfer_Succeeded>..... ... ..... ......</Transfer_Succeeded>.. <DataBase_SearchFinished />.. </NoticeMsg>.. <NoticeMsg Language="zh-TW" Title="">.. <Transfer_Succeeded>.......</Transfer_Succeeded>.. <DataBa
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):14904
                                  Entropy (8bit):5.92950450672339
                                  Encrypted:false
                                  SSDEEP:384:AdH7vETsmvlFszNlhz3zN2zizi2zSvEevERwAbBs7XO7aPoM8eTmu0m:AdbvE1FszNlhz3zN2zizi2zSvEevERwv
                                  MD5:0FD7CF3C24C8F5EA739A75AE6E76F228
                                  SHA1:5823C6AFE6649FE72990722FAC53677BAC317319
                                  SHA-256:57AB6410ADA6E4F447E4BE7668BE6E8B1388593EEDAE522DF3B123D62D149DA0
                                  SHA-512:685251FB25D633345862AD664ECBC07936524FD22E95FADCBF10DBD86C7FA12AFB39CE9823ED5C8FD3338D5033D2135E2F71FE43F844B05FE2888EEF86806D5C
                                  Malicious:false
                                  Reputation:low
                                  Preview:<?xml version="1.0"?>..<Brother xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema">.. <QuestionMsg Language="zh-CN" Title="">.. <SaveLBXFile>.........</SaveLBXFile>.. <Serial_Closing>....................</Serial_Closing>.. <DataBase_Closing>...............</DataBase_Closing>.. <DataBase_Changing>...............</DataBase_Changing>.. </QuestionMsg>.. <QuestionMsg Language="en-US" Title="">.. <SaveLBXFile>Do you want to save changes to the layout?</SaveLBXFile>.. <Serial_Closing>This will cancel the serialize settings of the layout. Do you want to proceed?</Serial_Closing>.. <DataBase_Closing>This will cancel the database link with the layout. Do you want to proceed?</DataBase_Closing>.. <DataBase_Changing>This will change the database link with the layout. Do you want to proceed?</DataBase_Changin
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):3057
                                  Entropy (8bit):5.030888136493875
                                  Encrypted:false
                                  SSDEEP:48:ca8ZHdHHX1aREup5dxpwcrSp5FujeV1EzwojQp5K8Oab:2B38fHz2fEjO1EUosfeQ
                                  MD5:FC87FCFD2878D91428E653965FCF8F2B
                                  SHA1:2F1A0B1A527ED282814E08ED4A5DDA9FA6334C14
                                  SHA-256:187A7604C2049E8EE3F34AA6DE68A668DC4F4693EE73BFD0018E462F359F5B57
                                  SHA-512:0EDA3F14531FB4BC1F550C6E3CF27B83EC5A23195566D526565D0C95B812467A12EC52CE1408C6E3AA7C6928A9CBB3CBBCEF2340349A239308922AD3843D450B
                                  Malicious:false
                                  Reputation:low
                                  Preview:.<?xml version="1.0"?>..<Brother xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema">...<RegInfo RootPath="Software\Brother Industries, Ltd.\CableLabel">....<KeyGroup Name="CableLabel" KeyPath="">.....<KeyNameList>......<string>ShowNewDlg</string>......<string>CutOption</string>......<string>Language</string>......<string>ConnectionMode</string>.....</KeyNameList>....</KeyGroup>....<KeyGroup Name="CableLabeling" KeyPath="\Objects\CableLabeling">.....<KeyNameList>......<string>CableType</string>......<string>Printer</string>......<string>MediaId</string>......<string>FontName</string>......<string>Unit</string>.....</KeyNameList>....</KeyGroup>....<KeyGroup Name="Printer" KeyPath="\Printer">.....<KeyNameList>.....</KeyNameList>....</KeyGroup>....<KeyGroup Name="General" KeyPath="\Objects\CableLabeling\General">.....<KeyNameList>.. ....<string>Orientation</string>......<string>FontSize</string>......<string>Length</string>......<string>
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:XML 1.0 document, Unicode text, UTF-8 text, with very long lines (520), with CRLF, LF line terminators
                                  Category:dropped
                                  Size (bytes):314060
                                  Entropy (8bit):5.71595089133589
                                  Encrypted:false
                                  SSDEEP:3072:ieh1HOFjkTf08h4h+zS7/Hv0qn499IJ2q:hekTf0868eHv0h99IJP
                                  MD5:97803060F5368C51678E630C75F941F5
                                  SHA1:AD2710EB748C59161AB33C7847421E5E5919C5C9
                                  SHA-256:CC7C567B537D49085B2BA048B2AFC997AA32AD6B492DF06099425BAEBA1A9399
                                  SHA-512:86CE37363D5B7D20583B488B3160F914E358EC6DF556347165C563FACBFEAA44831092ECAAC469AE19E7C827ADC6A288AE0B1A793383D92715CCCF9F81F4D1F0
                                  Malicious:false
                                  Reputation:low
                                  Preview:<?xml version="1.0"?>..<Brother xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema">.. <UIStringData Language="zh-CN">.. <AppName>Cable Label Tool</AppName>.. <Yes>.</Yes>.. <NO>.</NO>.. <OK>..</OK>.. <Cancel>..</Cancel>.. <Print>..</Print>.. <Printer>...</Printer>.. <PrintOption>....</PrintOption>.. <MainMenuFile>..</MainMenuFile>.. <MainMenuFile_NewFile>..</MainMenuFile_NewFile>.. <MainMenuFile_OpenFile>..</MainMenuFile_OpenFile>.. <MainMenuFile_Save>..</MainMenuFile_Save>.. <MainMenuFile_SaveAs>....</MainMenuFile_SaveAs>.. <MainMenuFile_Print>..</MainMenuFile_Print>.. <MainMenuFile_Quit>..</MainMenuFile_Quit>.. <MainMenuFile_OpenFileDialogTitle>..</MainMenuFile_OpenFileDialogTitle>.. <MainMenuFile_SaveFileDialogTitle>...</MainMenuFile_SaveFileDialogTitle>.. <MainMenuTransfer>..</MainMenuTransfer>.. <MainM
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):17408
                                  Entropy (8bit):5.292674018964967
                                  Encrypted:false
                                  SSDEEP:384:Yjnb6FXnslXOp1UTxyUaWnZadU4kkhZpd/W+SsMHT3KG0:YjunwOpf1WkOWMHTu
                                  MD5:DDC97D9A2AF19AA21839480FD8EF2F1F
                                  SHA1:3DEEBA5FA2F8BC43C7BC517AFDA0C4327D413DEE
                                  SHA-256:2711ECC3A9147A95AE0009A111CA4E299481FAF67C4C54326583F563B23AA9C2
                                  SHA-512:5687EA22E0D8C73070B23C8B2C0DFDFC69C300CC3E40809315F8C71C2BC1573BD216D0861F148ED0B53C655E9233A7BC8D5EA1D6D454A47DA1E09F6604707B01
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...:x.X...........!.....<..........~Z... ...`....... ....................................@.................................,Z..O....`...............................X............................................... ............... ..H............text....:... ...<.................. ..`.rsrc........`.......>..............@..@.reloc...............B..............@..B................`Z......H........4..4$...........................................................0...........(......-.r...p+.r...p..-..........r...p.......rk..p.......r...p..(....*..3..........r...p.......r'..p.......r...p..(....*..3?...........r...p.....(....(........r{..p.........r...p...(....*~....*..0..W........(....o....%.,5.r...p(....-..r...p(....-..r...p(....-.+...+...+...+.r...p.(....s....z.*..0..........s......(....-.r?..p.(....s....z.(.......(......s......o.....,...@.....~...............ro
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):483280
                                  Entropy (8bit):6.153243582041234
                                  Encrypted:false
                                  SSDEEP:12288:0A7evtKx2TDGyNXQ5RoYIIv6a6666/ENtGfVHbQlP:P7eV6GDGypYRD6a6666/ENtGfVHbW
                                  MD5:AAC7E95B2FF1624E899682AF088FFD74
                                  SHA1:24374C7FAE3E5C3BA24354ECBB7CF6DEDDAF6CB7
                                  SHA-256:6AAB0B8BDED2B5481F135449DA2B15AFBC16114E5CA4DB519F9A1A2E37CDF3A9
                                  SHA-512:0FD8B203DF1F918C58AD44DA1DFD3B70F550477C37DB30807A60E3943A55B8EB558B7E5BABA69FD9BF2C8F66DC71CAED756E84BF622C24C78D1E868BFF3F2FEA
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...i\.O.........." .........d......f.... ........... ...............................:....`.....................................O........a..........."...=...`....................................................... ............... ..H............text....... ...................... ..`.rsrc....a.......b..................@..@.reloc.......`....... ..............@..B................H.......H............................G...........................................0..(........._........._..........,...`......s1...*.0..(.........._-... _-..+..+....._...........s6...*"..s:...*....0............@_...........s@...*....0.. ........ ...._..........,...`....sP...*.0..E........._........._........ ...._..........,...`..,...`..,...`.......sa...*&...sY...*"..sg...*.0.."........ ...._........._...........sn...*...0..#........ ...._........._............st...*..0............_.
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):122880
                                  Entropy (8bit):5.989043897078306
                                  Encrypted:false
                                  SSDEEP:3072:VaBPOWg2uLcdk6i/OKPA5Dgh/rM2Plf7sShhX:282ds/OyA5c3VsIh
                                  MD5:DF234383C91C6F52386FF064F6521618
                                  SHA1:AD4C43F8CF333F718ABED63A159C837148B2FCD8
                                  SHA-256:C4F7B7D98DB894D7B19D2DD25B0B1987D195778B35302152ED3D5E4F3E5901A4
                                  SHA-512:E7F922F0F22427E9D60175BD3A7458B5581C9501650ED787FF0A345BAF9C61BFB208B72041B276A0A47AADF9FF7A4A86D46BDC2ADDC3A8C81C8DDD1996C9F286
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...gu.K...........!................^.... ........@.. .......................@......%.....@.....................................S............................ ......8................................................ ............... ..H............text...d.... ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B................@.......H...........D...............Z...P .......................................;.Q.!..W...z..R.6.d..y.[58.3...M..E..^H.J.Vr..Y..Y.L.w.3...7B....L..?.!y......f...Obbt..:t......6.r.yB..OL+.B/tD..;(..H..G..{....*"..}....*F.o....r...p(....*..0..C........(......~....-....7...s.........~....(...+(...+(.....(1.....o....&*F.~....(....t....*6.~.....(....*F.~....(....t....*6.~.....(....*F.~....(.....i...*J.~......i...(....*F.~....(.........*J.~..........(....*F.~....(.........*J.~......
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):125384
                                  Entropy (8bit):6.142920508554961
                                  Encrypted:false
                                  SSDEEP:3072:9XOCqdVs55ZN9R8PGRLI2O/dVDAd36CRSyfyh3:5qdVs55ZN9RxRLJ+yK3
                                  MD5:A1BE1EE19EC9DFB15CCE66B68AD92128
                                  SHA1:32026CED4DD145621CB1494386B087372815B6E3
                                  SHA-256:12C98428037BE45F344EB95DC8DBC9EC32C87F5AA075F5FE864B79C2FA6C204F
                                  SHA-512:C76C5261F6F1109635954E97AE191039F3C7FEEC68754E05CCF5001E3F8495710A14F7C2CF11D2AB4EF363E39C218DD629D056DAF5B5AB56029ACF5065C66E12
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..._\.O.........." ................B.... .........c. .............................. .....`....................................O........................=..........t................................................ ............... ..H............text...H.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................".......H.............................t......................................."..o....*..*..(....*Z.r...p(....r...ps....*6.......( ...*N.,........+..( ...*Z.,..,........+..( ...*f.,..,..,........+..( ...*>.(!......( ...*V.,..o"......+..( ...*.0..B..............( ....o#....+..o$................( ....o%...-....,..o&....*..........$7......^.rY..p(.....o'...( ...*:.(......}....*..{....*6..{....('...*"..(....*"..(....*...o......q...((.....q...((...()...*b....q...((...(*...(....*r.(+....
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):638888
                                  Entropy (8bit):6.124909007794051
                                  Encrypted:false
                                  SSDEEP:12288:awfatqBLHM2Uh0gGXAJx0U4bwe+QyPdJS44al1I:aApPgGXAJxo8e+Q0S47DI
                                  MD5:5A02A8B378078C9DFE8C37377F03638F
                                  SHA1:8FE272530BD029FE3B67EB38765158C4792DE302
                                  SHA-256:CCCC110681C5E8B715216735329FFE591C2E551905BB5CC19DA2B4DB3540256C
                                  SHA-512:64DC3A66B5436CC1C8EBE446696250364911025D23180A95B88E2424C3779A447FBB053738273BECCBDC31C83554A57A75B59A94AE23879AEA2ED9C95125D2A0
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....y.O.........." ................r.... .........X. ....................................`.....................................O........................=........................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................S.......H........X...............+......(.........................................(U...*..*..*J......(V...(....z"..(....z.~....*....0............(W...,.rC..psX...z~.....oY.....,..~.......u....*.*.(Z.........(V...o[...u........,..o\...(]...t......-y.....(V...(W...,.s.....+_.(Q.......o^........(V...(W...,.sS....+7......(V...o_...,$......(V...o`...,...u....-...s........~....%....(a...~......,..+.~....ob.......,...(c.....*.........'........0...........-.rM..psX...z.od.......(V...o[
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):16896
                                  Entropy (8bit):5.671462542954855
                                  Encrypted:false
                                  SSDEEP:384:Rud4OhIDRVbQqFfpKjKFpcJvIR96ubP9Qlr7n:RubhIDfsEbYJvEsqVQlrT
                                  MD5:809AED33E3B45CFDC789F46F675E6B18
                                  SHA1:3C9C022159FFE3354B3E5F10F2F7C9EE41BE3977
                                  SHA-256:EB033E1CDD2D9D2B342E1FD28968FFCDF88DCC172FBE9F1CF46C8C8C73BB7276
                                  SHA-512:6DB38226E05844E22A01A0204D11A2555D08E37A16F08467C1963DA1F211A6BB5D6DE76A0D5E697F496F5DCCC578CEA59576CEEE08F126DAB44DB51EE6022F33
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........@...!v..!v..!v.(..!v.(..!v.(..!v.(..!v..Y..!v......!v..!w..!v.....!v.....!v.....!v..!..!v.....!v.Rich.!v.........PE..L...1..Q...........!.....*...........1.......@............................................@.........................@F......,B.......`..X....................p......................................hA..@............@...............................text....(.......*.................. ..`.rdata.......@......................@..@.data...x....P.......6..............@....rsrc...X....`.......8..............@..@.reloc.......p.......>..............@..B........................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                  Category:dropped
                                  Size (bytes):2064
                                  Entropy (8bit):7.742011543144992
                                  Encrypted:false
                                  SSDEEP:48:99QrHAF+OZmRA42peIjMelYVjZf3QrETC1uaRAp0USmKJe3C5JYl:u5/q4UXYVjZasCMWUSmKJl5JI
                                  MD5:15AA4AF072D00A2958469C0693493CCC
                                  SHA1:B1C89556D1C9839142050058A9A234D99C0F913E
                                  SHA-256:F1982ADFF4D4557529BCC282A8B0E86E7831A14F5735000C61DD0B1744ECD251
                                  SHA-512:4502C46F1FCBD50B17C3E09EB19519864E0D5E0B3FEE5F2A1679FE98C84F5710E43D88B4E72FD8637434AC689821282423E9E42A31A4308125A8E86B624D3C2D
                                  Malicious:false
                                  Reputation:low
                                  Preview:PK.........n:IZ.O.....@.....p.label.xmlSD[........?..Ocd`i.a``0`... fd.3YE.DP].W3....w.%3n9F&..&...f.....Fy.FF.Z!0%..c..)...0[."..N.UT......W...W...W.WQo.8..+Q.y....tE.B.......IL.cG.....ol.!..8.t:.x..{<3.|367..%.~`!.g3.4...f)...g.c..t......u...Ly`..u.f~.Tu..2-p.. .\.X....R.N..l8..h..JD...J.F.i....+.?..p.@..Yk.gMJ....1q.....'4Fm.H.....qV-.(9........C....a...3....%.z1...>.F......J.01....B.........|/#...........Z.u.J|...*Ta.8#h..._I....qU.e.L....]....ZS".......1.@.\.4...As..e..... .-E,.)..{.V<.,.Q(Q.....%.BdE.[0./8....4.F.b/.......X....%.a]....%..fY...&.J......N.Z..wg..m.O..d.......i.".'p^S$.5...Lw.c#..j._.ko."....`t6.L.U..k)..,.v......2..-.. ......u.S5...2.......p.'.......|g.Dqz..o...{.W..\X.o.7..h.rjK.XZ....&..1.II.$g..0.d.....A...p.|..N.,.~......T#D.pv;.W.V.y..K.N........C.S`".H.....7,r.CC...wa......[.].z..T.^..;.t....B.A.B........p.>.#...If...-...;D..L8.Z.(DI..f, ..^s1u..E...m.$z.h.A}<...$-_....l..fFl.O..Ao.4.u:v....,..R..<.e.K.d&D#<.AB..._V.A
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                  Category:dropped
                                  Size (bytes):2068
                                  Entropy (8bit):7.733189541716649
                                  Encrypted:false
                                  SSDEEP:48:9jNRAF+OZPRA42peIjMelYVjZyQp7/PUT4+cMuVqC5J:PGq4UXYVjZV/PUT4+8b5J
                                  MD5:622C6786AEDCEB8E51F851CB34809E26
                                  SHA1:6035A7E7CF66462EAFA290491F159AA45F8E9DEA
                                  SHA-256:254D15541BC0B5A8719ED77163DF658324C69BC32D9FC4753648A38CED195069
                                  SHA-512:3BD2F6B8E8AE403BB2F933DD1065941294C47D86BC1FBBA2D6E0F539B76C5E2E33AFE004156CAB42BAD11D7EEFE864876A53EA6491FA4A80C4DBDA99F2D7C866
                                  Malicious:false
                                  Reputation:low
                                  Preview:PK.........-:I0..g....@.....p.label.xmlSD[.........y.cd`i.a``0`... fd.3YE...[.{.....S_2.cdb``b.``.K.0.g.g`d....S..1&....P..U .x...UT......W...W...W.WQo.8..+Q.y....tE.B.......IL.cG.....ol.!..8.t:.x..{<3.|367..%.~`!.g3.4...f)...g.c..t......u...Ly`..u.f~.Tu..2-p.. .\.X....R.N..l8..h..JD...J.F.i....+.?..p.@..Yk.gMJ....1q.....'4Fm.H.....qV-.(9........C....a...3....%.z1...>.F......J.01....B.........|/#......G....Z.u.J|...*Ta.8#h..._I....qU.e.L....]....ZS".......1.@.\.4...As..e..... .-E,.)..{.V<.,.Q(Q.....%.BdE.[0./8....4.F.b/.......X....%.a]....%..fY...&.J......N.Z..wg..m.O..d.......i.".'p^S$.5...Lw.c#..j._.ko."....`t6.L.U..k)..,.v......2..-.. ......u.S5...2.......p.'.......|g.Dqz..o...{.W..\X.o.7..h.rjK.XZ....&..1.II.$g..0.d.....A...p.|..N.,.~......T#D.pv;.W.V.y..K.N........C.S`".H.....7,r.CC...wa......[.].z..T.^..;.t....B.A.B........p.>.#...If...-...;D..L8.Z.(DI..f, ..^s1u..E...m.$z.h.A}<...$-_....l..fFl.O..Ao.4.u:v....,..R..<.e.K.d&D#<.AB..._V.A
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                  Category:dropped
                                  Size (bytes):2073
                                  Entropy (8bit):7.707793724037307
                                  Encrypted:false
                                  SSDEEP:48:9PQrszg3R+9wtQFmccH4MsxHgs2j8ys3Qrp1CDogZ1mzb5R:Qog3GbFxcOAse8yhyDp1A5R
                                  MD5:4663C01001986FF46B6B52A0280E75A2
                                  SHA1:C0A599B56819232CEE15C3FDDA9B10F2697890B2
                                  SHA-256:C5FC5F3DB21D070807FFAB03542F2E118E288F31D94698521FDB89FB056B6FC0
                                  SHA-512:62EA0BDC1A0BE9E3A069933F874B38341F3D12A59A175D8192D5A1BB3D3B08935E365B2F2D32E960C338E00DAF20C76450C4589347A349AFED17C2DA602AFBE9
                                  Malicious:false
                                  Reputation:low
                                  Preview:PK........sn:I..."....>.....p.label.xmlSD[........?..Ocd`i.a``0`... fd.3YE.DP].W3....w.%3n9F&..&...f.....Fy.FF.Z!0%..c..)...0[."..N.UT...Y..WY..WY..W.WQo.8..+V.y..@KU..l..e)*..}4.I|u..v.t....$$....;......3..7cs.y.3..HE..z.^.C..".<.z........W...p.....BO.L....U.....V....|'.B.2...~..g..c..V.7FN3.&..&......:...4kcQ[...'.nMj.-...'TFM.X.-V'.R[5(..U.&.}|.}..[t.y(%.H...zs..B.%.EB0.|...}..D.*.2q+.7..R..7.!......J.$........Rv.....k...D9I(.z@.W..l./..LFh......aol49.).!...A......A.PY.4.Bk.7....v.2...C(...!.B..4.."............\0.......K.....x..(......k..../..%O"......r.._`..dt.hV..[W_..>...~..7...K.RN.$i....o2.IB.t.k\.Y.h. .V.U.`0..k0..i+K.m..Y=.a.Y&6.R......LW.....6..`5:&.#.}.4....n.-q..[.6.S.o.:...IQ|.3a~.~^.+..O.+..qf6G..0XD.%.E.... ..6...S....+..|>.T9Z..'.......Z..v./..$A..G.V....2..C&b`!PH..h..W"S.A3...g.A..7...[A..u..S)..@...e4n........U..t^.U.0.M_.*....a...So....[..F..3.7"0.H....'...I%M.BQ...AP.4..z..GF..[.`c.%..aC..z.t.H.........@.Sm..$.D.';.*....*...r..Z.
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                  Category:dropped
                                  Size (bytes):2069
                                  Entropy (8bit):7.729702780787585
                                  Encrypted:false
                                  SSDEEP:48:9j+Qr2yYye3ke+h99s/OnzQVEE+bK9qdM3QrYCDog/AHiZ0G5Ut:ph5592IMD941DoHiF5c
                                  MD5:1B5D5D71CE753F29F394DCEB315A88FA
                                  SHA1:F83FD010D9DBC226E729BA5B13F053B6D4EFF5F9
                                  SHA-256:D609F9CA05F276C95E06EC748B0A755A846C07B9953A82F1FF4D3A507F207454
                                  SHA-512:3A308C62DE299BDAC285B3C1456FDEE5B7EC63EED993A0DC4A32EFC3C51F805D7132FBE25BED381ADDF9B0B1D887C174E709A18748D148DD6A1CEED070559671
                                  Malicious:false
                                  Reputation:low
                                  Preview:PK.........p:I........L.....p.label.xmlSD[........?..Ocd`i.a``0`... fd.3YE.DP].W3....w.%3n9F&..&...f.....Fy.FF.Z!0%..c..)...0[."..N.UT...t..Wt..Wt..W.WQo.8..+Q.y...-U.a.]...j.G.1...........V......f<......\.....N......`.{.c.R....x....ts].T. \{...U.g~.uy....@j.H.s"...DPjQ.<8..?.,.....}.~e.4w...k.?1..h.S.^N.6..7-Pvb...O..tO.vjO.4J.:q..E.%.V..4..t...;t..p"..r./....0/..y...h8..Q....[&&"}.p%%.q...\._...R*..v.(..{K.+e.9*...Y+QI.W..........g.....f9.8.<..&FS .Q.......(A.\.4...As+..Ek&$.. .-C<U.R.=Ti....,..@S..p.EA>SU2..,......~[.O.\.gP......B...N....& $.?gRT<..z.....k...6...g.fm.u..6...b......$q.#.'IV1$.......$!V:.._lho.".Z.U.`4:...0..)...n......R..... .....u.S.F.....ds.c`.&.?.O...R.q..`.8...h...{R._.\X.m.6..h.3.J.8.q|...e.x2Z....{.....X.o..Z8.|..N.SZ..;..... D-p..K`+I=..#F.w...r...#....4...j......q..m.E.m|..Z..|..fW...;.j...-B.A.B.....p...#...>..)..._....!f.g"X..T#Fq+....\.[.d..&.L.t#.53...J...|..d...`.....Kf... .,.:.9..9..=...0.....T.....'+((.c.
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                  Category:dropped
                                  Size (bytes):2112
                                  Entropy (8bit):7.7476230537547135
                                  Encrypted:false
                                  SSDEEP:48:9JYQrBtqZB6hgAQf5X+Vc5Z9v4h1isDRYRrZl73Qr7wHfYexY5ol:X/BtqZQ2xfx7ZZinRNqYx54
                                  MD5:923FD3A95BC2C5ED034B1B89A8BE2A25
                                  SHA1:FEAAB0868124572B5BD7550FF4FB2ACBA00BDAB1
                                  SHA-256:F07C55E289C7E99756B8557E4F706004010689E97C83FD1EB37C8824D55E202D
                                  SHA-512:27AEC14D78229E64EA46490073C17E46DF38B79CD570844E5F5AF995639A5B018697B103E6C989A0E013A6B12C42008C7B8C4B80E2C037FDB4B9D5A6BA7F21C8
                                  Malicious:false
                                  Reputation:low
                                  Preview:PK........2o:I_.............p.label.xmlSD[........?..Ocd`i.a``0`... fd.3YE.DP].W3....w.%3n9F&..&...f.....Fy.FF.Z!0%..c..)...0[."..N.UT......W...W...W.W.n.6...B=.e;....,...0.u.X.&GZ.%6.)P...c.{..h.^.7...B..$.I......{.3..7C...6e.3.9.|.tZm......x.\..7C...I..#..).....35v...c....8o..P..-.7..(....o]..)..)}su..a...Wd{`t.QyG....=*o.....K....=p..>.Vx...7..j....*...?<.?........N$VB...^G>^...!..>.:.6.Dy$ns.0q-.;..R..W.!...:...$.2.........f...l...gD..D.....-.T2v...(...'..;<..Z.b.S......@n.w...s.9.J..6......a..!.. \(....,.,@....D....y..].`r.....af>.r.o@.6.....\....).i.@X..&...Q..#....\..{.y;.wk..wf...o.o.?~r...P>..I....i.q....I..v.:....mkD.J...tz.V.Y.AOKkY......yd./r".XA...|..J.....Gg..F.pM...>.'.........hD;2..I.}4saz..^z.....-..a..........<.I&#..M@L...}#\......hT...CX.1.i.....m.l%.. Xb4z... .f.82....F..@]E>.....B7.?9.|......e.*..B.+.7+.".....B..~...gkf~.(...w1.uo..0O.??=....~}......._....[a..cg....k..Z..3..".H....F...%..".z"hRA...P.....G...;.3=...+..T.ao.
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                  Category:dropped
                                  Size (bytes):2074
                                  Entropy (8bit):7.729015645892738
                                  Encrypted:false
                                  SSDEEP:48:9SQQrwFqG2qmbg9uDPGgigjyEg1LzWFsVuELTJInRl3QrKmX2YV/lrVvKa15a:KwFqPqqAKGgE4FsYELmm92OtZJ5a
                                  MD5:95E857A1A78F431A61BCE1E2E3C48FC4
                                  SHA1:BD4AA43926219E460A34232F90BE353603A16736
                                  SHA-256:70ED01315641C8DF40A49F38B6C37B4B49FD004DBD99B7D39D93068499170B55
                                  SHA-512:032090FC925D1E004E046642C49C08D3210CFAEA542A495D9DCF8413C286510110453A3A4B2AFB524910312A492D17CE7FDCA1E70B73BBDEBF909A48FAFC2DBC
                                  Malicious:false
                                  Reputation:low
                                  Preview:PK.........n:I..8....N.....p.label.xmlSD[........?..Ocd`i.a``0`... fd.3YE.DP].W3....w.%3n9F&..&...f.....Fy.FF.Z!0%..c..)...0[."..N.UT...\..W\..W\..W.WQo.8..+V.y...BU..lX.K)*..}t......l.....I.....;.....g..7cs.yW0..HE..z.^.C.'".<.z......|s].T$UA.F...U..^.uy..*.I.U/.B.D.(....Jr....Y...L.W.*...i....dwbt..x.....m<.oZ....K..c..C...k.cu.&.W.".O..ui.........2..Z.77.(.1a(..!.co..o...Uy...H.PRI.l.......x(..$.n.F.`o.s..:....6k%..D.I).z@.W..|.].K.LNh.C...p.0....l.v..D.ro..<.{..Z.....N.]...T%...p.EHxf...M!.Hr)....f..>.....~j...o?..'...@[!.l..!..K&E....G..KI.../`s99?k5+.../ZG...y?...7H&..)'H..bX.+..7'.JB...5....h.".V.U.`0....*\....J..7CV.aXk...RD........*8P.FI.Y.....F.rM.........|g.fq..:...!).;;.....u.......`...8._..".<.-...dJ...b.?..[...'..'............ D-p..J`+I......pw..........4...jrGdF"h....6...&:^.+IS...fW._6.;.j...-B..a....jf..(_.U.0.Mo..0.;8CH.[./`i.m13.3.,m..1.I+....\.{....MB...Z(jf........d2..7.q.c.%.cbC..f....:.9..9..=...0....i*.ROvH.........
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                  Category:dropped
                                  Size (bytes):2072
                                  Entropy (8bit):7.742721906121116
                                  Encrypted:false
                                  SSDEEP:48:9I/bQrDyx9FvdWiRDnQiDMvRAr6PGFwdm7g3QridH0ZbOGNjwuZ/VJlgb5J:eeux1Wi1QuMUfZiUbpNhVG5J
                                  MD5:1586DCC2B97E57725E0A322CD690A624
                                  SHA1:A8A8C36F15A18DB2ABF469CFA1DEC2ED44132BF5
                                  SHA-256:1AD406007A101CFCE4A31DC0CD13547AF53CDBFE9AE0D7B24BE60044640E578D
                                  SHA-512:8EB405747A4E530EB2F68A4A25A6E02EBC5EA32FB69FE72B3CC231C337D20BC1CF985EFD6F99A39BEA3E31F718631DE99AEABD282B365ECDF1EAF432C93995A2
                                  Malicious:false
                                  Reputation:low
                                  Preview:PK.........n:IP.sV....A.....p.label.xmlSD[........?..Ocd`i.a``0`... fd.3YE.DP].W3....w.%3n9F&..&...f.....Fy.FF.Z!0%..c..)...0[."..N.UT.....W..W..W.WQo.8..+V.y.....tE.B.......IL.cG.....wl'!i.[...iy...x..|36W...C.TT.7..=Dx"R..w..>L.O.W..LER..k..\].z..Z.......X.b)tN...K-.$...>..~.).j_._.9..4...N.n<..T....G.M.....ui.c,...w....`.c.N..jQ..U....r....;t..PF8.X.9..f..8&.EB0.|...C..T<+.21...J*)........B#..T.D......-q..]. G.f..%.. ).s...LS......f9.8......)..(...h..H. ..G.].y....E..I...e.0OU..x.WZ..g&.-+....$.. ..*.~i.l.K..x...V.......!p........&...1N.2)*.FP=b._J.5........V......m.!.^..?.y~.dR.r.$.*..8Cs.$.JG[......-"/5\u.F.g.Q.....bY.|.f..>.k.:..W..-.0.....=Um..5..l^..[.../......u..,.,N?@'..xH.......6...x.\I0Orc..n.`.......l2%.Hu....j...X../..Y}J._...Ec63.Q..3'...JR.@p......@.. pd".&..4)...|%2#.4.i.pq...z..^.)IS..B.+.O;.J5VF..!I._.^.\..O..K.......^.fG.].[.`a..13.3.,m..1.I+....L.[.d...&.L.t+.5.......25..49..@<z.Y.........QRG6.q6gc..v ..TW@8M%Q....Zx...B?....
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                  Category:dropped
                                  Size (bytes):2065
                                  Entropy (8bit):7.751260939684588
                                  Encrypted:false
                                  SSDEEP:48:99QrdMY0mBcgrBso6nJOn8T3LU2XsFgrJ3QrFdH0ZbOGNPueyEC5t:KeY0mBcgraosIuQ9FgcFUbpNhw5t
                                  MD5:1CF57843BDD26A29A90ACA954B977A04
                                  SHA1:AB2DE821CFAA0CAD68CD9733C02FCED5C5EB8FD8
                                  SHA-256:489DF20FF67E49DEB80C94F14927F9CB9AA7F2E06BAEA6D019D26D13F385E665
                                  SHA-512:BC783FA107878F3A3E9162857F3CBE9B28BD8B3484E7E8A79E4CD65426D731A4C5A256CD2E4BC20DE0C5B3C6703C7DBF4309C1868D1EC5266979914C511574A1
                                  Malicious:false
                                  Reputation:low
                                  Preview:PK.........n:I-C<.....@.....p.label.xmlSD[........?..Ocd`i.a``0`... fd.3YE.DP].W3....w.%3n9F&..&...f.....Fy.FF.Z!0%..c..)...0[."..N.UT......W...W...W.WQo.8..+Q.y.PJKU..lX..RTRm..8&..#.....7.....8.t:.x...x..|36....~....s.4....X..gs.!^}..?.\..*..*...8puU.k]^...9)..$R....{..ZT8....E..CP ...W.WFNs....&......;...4o..x..e'.n]...I@...j...H....7i.Z.Qrj..K.O...C.s...'.i!...{.J..b!..|...C.;.xQ.eb".W.WR..w9!....|/..`m7..{...Rv....m....Dz.I)..@....|.O/K.LNh.C....d05........E.....=..[..(Z3!)...l.....J....d.e..Bp.s).....f.......~j.?.jh?..N.r...B..5.!A.9...i..#....\........[..w...m.O...0....4H.JG..O..bH.+.34'.KB.t.5.....E....h..tb.DV*...y..Z.Nm.."r.4...n.6aOU............4...lR7........wb...IQ~.3ay.}.....+..87...6.W1`.hY..R....6.c....j.x..r6..h...[,f3....9sr(..$........{..e...L``!PH..h..7"3.C3.....a..w....4..-4.R.....Tce4n........U..tQ....~.....ab....._....#f&g"X..T#Fq+....L.{.t..&.L.t+.5.o(...F...&...gV<..I........AR.6.q6..C;..c.+x(M%Q...Zx...R?....^
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):19456
                                  Entropy (8bit):5.4859899335133315
                                  Encrypted:false
                                  SSDEEP:384:X7W3fnlxM/nXc96cnjpTJHJBlJvv/1nZvWJ/v:X74nlxYnAnJHJTJvv/pZo
                                  MD5:21A19F5758FB59C8C2A70955BD7ABB7F
                                  SHA1:36BDFC4FA89B3171A6F4DDE0C016B540F4013E4F
                                  SHA-256:5DFDBFFAC561107085FA5C27F9ADF5D2EEA4D2A677C7BFD9EFE777E31B37346B
                                  SHA-512:8A9153508F59D76463A2ED3C39706FFCFBB848B6990B53F95156A2ACAAF905FA0DDD5A82A5906090325E311E6E6B69244483B1D5782DB379E9EAF8AC815CCFFF
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......46..pW..pW..pW..y/y.vW...'.qW...$.}W...%.xW..pW...W...!.wW....9.sW.... .qW....#.qW..pW}.qW....&.qW..RichpW..........PE..L...x..R...........!..... ..........W$.......0............................................@..........................A.......;..x....`.......................p..l....................................5..@............0...............................text...Y........ .................. ..`.rdata.......0.......$..............@..@.data........P.......8..............@....rsrc........`.......:..............@..@.reloc.......p.......@..............@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):73728
                                  Entropy (8bit):5.337747415240259
                                  Encrypted:false
                                  SSDEEP:1536:gKZUTPUaVTqoyldm2InZdCeQ++fvaeBxPBYpN57:je2oybT8dVP6JxpYpN57
                                  MD5:DB2247B16C5B551050D023F838E9496F
                                  SHA1:6A772AB0F2945BB567F0B4861F5BEBD9B046E942
                                  SHA-256:10D7639421AFCAFF1FB50241C03EC0325495903914F02DC45EC47AD4F19D494F
                                  SHA-512:E11C02AB80FEB9E9636A06CF79325C8E01178F3E7BF36E4019233AD507D3533F79706AB1BECA8FA24765466FFD922B4E566D11A51C2442EB2E8C90C48A4A99CA
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<...xd.xd.xd..{.~d..{.yd..x.{d..{.|d..{.zd..E.{d..E.{d.xd..d.~G.cd..b.yd..D.yd.Richxd.........PE..L......?...........!........................................................P..................................................x....0.......................@.......................................................................................text.............................. ..`.rdata..o".......0..................@..@.data....2..........................@....rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):69632
                                  Entropy (8bit):5.093060140991724
                                  Encrypted:false
                                  SSDEEP:1536:/2UIgTbgsyM9ViMX9oEfyKzhShRpzIbzv9:TIgTbg4iMXOEfrhe2zv9
                                  MD5:75A72D146E9BE1D09D216698461D6510
                                  SHA1:B9E90AB24DDDC2003CAC9C2CB702AF8E17C9274C
                                  SHA-256:40446AEE2848A71784800C1EEEB319E1CB05BA7465501EA181F5A58CCE7E512C
                                  SHA-512:5F5FB50306C8C44969A881922FC0A0AF52C5C5869AD23A8D8DC6F8E25795822161A1ACD72B376D4BDD1138E5A62AC3FA2AF2DE524C578DAFA10EBB9744D37D11
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........x............................r...........>...r.......".......r.......Rich............PE..L....0.>...........!........................................................@......................................p.......x...x.... .......................0..h....................................................................................text............................... ..`.rdata..? .......0..................@..@.data....1..........................@....rsrc........ ......................@..@.reloc..*....0......................@..B................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):81920
                                  Entropy (8bit):5.3667972205441945
                                  Encrypted:false
                                  SSDEEP:1536:4u3yFTLJcxIDRf7RAazA/WEtgBPeC9KR+9OAREeao:EJcxI1V9UOl52R+9OAREeao
                                  MD5:72DFE9B6053429ED581B1D3AD9918438
                                  SHA1:8A1127AE424806C68C7ADC20769527A4D596CDBC
                                  SHA-256:E7A158BAAA7EC91D53417FE5E328CA88D0CFC433AFBD5FD961B01EC5F4B40483
                                  SHA-512:39A2603A6A7A281105595BE9A13B5BA0D88D3DDB63ABF31340C611DA03CBD9C49A557920FA93B86A2600BC66FF7C70955BB8891F571E85690600CDADB021E997
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......I..].........o.....b............b......b......;...........;.................Rich...................PE..L...T.jG...........!.........................................................p......................................`...........x....@..0....................P..l....................................................................................text............................... ..`.rdata../+.......0..................@..@.data....1..........................@....rsrc...0....@......................@..@.reloc..z....P... ... ..............@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):73728
                                  Entropy (8bit):5.314836037030258
                                  Encrypted:false
                                  SSDEEP:1536:7XYBKHPJs0EGkvyig4ADgQMqytFcaZrxT9Wc9rLxKMOFp:sutEcDDgQMpnlx39rLxp+p
                                  MD5:1BA050679003E7755FD37E7E5D6FC742
                                  SHA1:FB9C82D095CF52C336656FECFCA0DA0948861323
                                  SHA-256:30459DA4D0D08097C8173687ED3BD394A71855DF3783EEFDB4C105BB44A9C5B6
                                  SHA-512:7D0FF39112DF47F9BB7FC2787451A0CE82EB3271AB5945F3BBCEC364C57176BBA33E91F321F0C9253C0CE01468AD43961571C6D4F82F87091308256C223E199B
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......=...yd.yd.yd..{..d..{.xd..x.zd..{.}d..{.{d..E.zd..E.zd.yd..d..G.bd..b.xd..D.xd.Richyd.........PE..L......?...........!........................................................P..................................................x....0..0....................@.......................................................................................text............................... ..`.rdata..o".......0..................@..@.data....1..........................@....rsrc...0....0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):110592
                                  Entropy (8bit):5.347938624076603
                                  Encrypted:false
                                  SSDEEP:1536:mBZti7/wDVCWfuWDAxzCVJxYRRH9ajYBxEWzhaEWzYn0BC25:m3tirwDgWDUCIfOKEmgEmYn0B55
                                  MD5:2ED6DFFCE7E9F4A9B7EE83FF8BE993A4
                                  SHA1:1B21D5130A9BA8CE93D5BA2C266F9F321718CC53
                                  SHA-256:B6A802D1E65E0E578013466BE4E1B923CB87C15A292BBB892B147DB758C47712
                                  SHA-512:0AC1AB4290CDA38F093DB4D00AFF5335636C45EE0C561BEDC6C2F229480413CCAF51E8BD1DD3198EE459A672DA4F90CE591B6E716EF9B502B6F3C70444294993
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......k.X./.6./.6./.6.M.%.'.6.@.=...6...8.,.6.@.<.+.6.@.2.-.6...2.,.6./.7...6...=...6...0...6...2...6.Rich/.6.........PE..L......K...........!................................................................................................p@......X:..................................D....................................................................................text............................... ..`.rdata..i1.......@..................@..@.data....Y...P...0...P..............@....rsrc...............................@..@.reloc........... ..................@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):81920
                                  Entropy (8bit):4.8617348734377135
                                  Encrypted:false
                                  SSDEEP:1536:5UQWMQ0lVPsB5+u31HPzIg2+DmO+sP46SzU:5UQWoXi5+u31vzIv+DmO+sPRF
                                  MD5:90C334C4E3F4609F830C02B84133BD60
                                  SHA1:6D34EB4EEAFC0B7A938C885058F358A01BBEF47A
                                  SHA-256:F96714101C293BC3F2ACF06BF52F66FA48CE96FAC0EABB92D8EA687DAE26BBC3
                                  SHA-512:BE4524C68FE9AD66B111299735FD8571E1347E48DC0E4930082E0725158CD2D3F5679FC9E17E494180613743FA4376C755EB2E5F7EF62946532D7BA681523870
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......a.X.%.6.%.6.%.6.G.%.-.6.J.=.$.6...8.&.6.J.<.!.6.J.2.'.6.\.=.&.6.\.2.&.6.%.7...6.#.=.<.6..0.$.6..2.$.6.Rich%.6.................PE..L....1.J...........!................J........................................`..............................................`........0.......................@..........................................................h............................text............................... ..`.rdata...!.......0..................@..@.data....M.......0..................@....rsrc........0......................@..@.reloc..~....@... ... ..............@..B........................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):86016
                                  Entropy (8bit):5.146867123915146
                                  Encrypted:false
                                  SSDEEP:1536:ZB8NkEaYJHxoeqPhnfO8b8GyzrnZaB3gEPLz11QKM2:beVqPhm8YXZMPLz11QKM2
                                  MD5:EB51E8503EE4D920F7BB665CEF3B793C
                                  SHA1:7110DDF00BC10AEF05FEDFD560427206B0B4FF50
                                  SHA-256:8C305322F95684E7A69ECAAC44B0AC146EB78556F80D516B2E176469B2C525D9
                                  SHA-512:FAF3F9816D092D31478FB0AE1F64C1228725D4F818A2024A2B4330BB83F75EE8CD306AAB759850DCC59136FD57DFBA454E694E99D07786BABF176879DC145E1B
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................................................... .......W.....o.....Rich............................PE..L.....sC...........!........................................................................................................X...x....P.......................`.......................................................................................text............................... ..`.rdata...".......0..................@..@.data....4..........................@....rsrc........P....... ..............@..@.reloc.......`... ...0..............@..B................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):81920
                                  Entropy (8bit):5.458823792484583
                                  Encrypted:false
                                  SSDEEP:1536:s+zZZ6bGu6CTxG4mYNS23k8J6lpHG9iz+dhi2gnDJQ5RwZrYU:86C1GnrkXMprz+dfgnDJQ5Rc
                                  MD5:2CA13333BCC0659583192E7DC080B3B8
                                  SHA1:A8A8279C55E6C982DED1A27C9AF2434B4BCA051D
                                  SHA-256:6AE0500C14A36740ACB77209DADFCB7C9C873B32477C0F597BB6D58538FC6726
                                  SHA-512:7F8DC90466C0C16955A9ACFC45241F55D1D950051AF83EF858781E0B2B85C042C91B052EE670589D98A562637013C489F4CB822B2AEB684D886E8F6557BD0B12
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......P..].........v.....{............{......{......"...........".................Rich...................PE..L...AR.L...........!.........................................................p......................................@.......p...x....@.......................P.......................................................................................text...V........................... ..`.rdata...-.......0..................@..@.data....1..........................@....rsrc........@......................@..@.reloc.......P... ... ..............@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):118784
                                  Entropy (8bit):5.422800216911058
                                  Encrypted:false
                                  SSDEEP:3072:4zgYQ6e1BlzC/Xagt/2brdgiYmUZ+ir4Fa:4zgYQJm/Xagt/GdxO+
                                  MD5:D395AEE1644F237CCFE2BBE6EE9A6E44
                                  SHA1:5203E0A5DF02B43B91A5AD7FE050609C87CD696D
                                  SHA-256:FC9A4FB804FFFC8AEFD6880A01FF3F04019E76E635783AAF01A83D15D7F07D7D
                                  SHA-512:FBEE78F95D6AAB4707A4046A30AF29560E2CA8475541ACA983339E35928A9EDA24267CCAD14987EE9CDF21BF2A01C751865B3F1878BE417AC2198276A14AD219
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........m.............................|...............................................8...............Rich............PE..L.....dM...........!..... ..........Z........0......................................................................`e..%...H_..x....................................................................................0...............................text............ .................. ..`.rdata...6...0...@...0..............@..@.data...|?...p... ...p..............@....rsrc...............................@..@.reloc.." .......0..................@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):118784
                                  Entropy (8bit):5.423408442315156
                                  Encrypted:false
                                  SSDEEP:3072:hzBhaXDgJxulZfXFgmd2YrthIKmZCulJs:hzBhaXtXfXFgmd/tusu
                                  MD5:27E9E382D89F0CE5CB9D4C17C561F25F
                                  SHA1:1A54002CEFB4C6A55B1BDFFFFFFF5CCE262D6AD2
                                  SHA-256:954B996F2E70DD6AAC104D0824F67B1349689CD0A31ABFEFD393698D206945A2
                                  SHA-512:E285509B56BF1973C145830845B613C6BBEE145B516BA0C19B093EE6A2D0535BEDF8825CF6CCE7B2372661866C10E73CB706004CA308080BD5D804A83DE42FBA
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........m.............................|...............................................8...............Rich............PE..L.....dM...........!..... ..........J........0......................................................................`e..%...H_..x....................................................................................0...............................text............ .................. ..`.rdata...6...0...@...0..............@..@.data...|?...p... ...p..............@....rsrc...............................@..@.reloc.." .......0..................@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):86016
                                  Entropy (8bit):5.135562345355176
                                  Encrypted:false
                                  SSDEEP:1536:s+grRqFUp7LrnmmwIr9hwucy2Me3ik/1Z/APKUc8HluO:KQF8XJlr9hwbVZIPKU/HluO
                                  MD5:3B23437BFA4E9DA14C7FEE8E61F932A7
                                  SHA1:93BE64452C772CA5A01FC3C899A678133BF89FC1
                                  SHA-256:B4786C5B28787A52089F0323FA1D9C7D6CDEAB191BD39E67F9ECFCFBD180C49F
                                  SHA-512:CE8BF3DD4A64B5EB25FD99F9F721EF05397EDC58B6E8FE0DDDFE12ECEDFA38393FAB46B5C13B7342FB49C617206BA27DFE0811AA71CA00A7B4C52BEECD0D0CC9
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........................................................................+...........\.......d.......Rich....................PE..L.....DL...........!................A.......................................................................................X...x....P.......................`.......................................................................................text...v........................... ..`.rdata...".......0..................@..@.data....3..........................@....rsrc........P....... ..............@..@.reloc.......`... ...0..............@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):20992
                                  Entropy (8bit):5.431361042281413
                                  Encrypted:false
                                  SSDEEP:384:iWTtaZOeiWV2TVUN1auh4ZYsLjpRR/gxifl1:iWTtTeihiN1hV4l1
                                  MD5:B9C4BF721B3FCC27F05D119DD4B9EA12
                                  SHA1:2FF240E5103A80EDBFA78A1C1ABE0806F4F0132F
                                  SHA-256:0F08D013297527E14BD34A3BBA1AB8980DAD9FF3B5A918F8505C81D67D28C0A8
                                  SHA-512:4BFE752E977E6585D032E97CB00D37F861BC6B7D1C4E3FBD2CEABA2E65122AB38D8729A22EF29C189BDCF0D0D2C50386354C650C10171F102C2C9B95AF0EAC3C
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Y.)X...........!.....J..........ni... ........... ....................................@..................................i..O....................................g............................................... ............... ..H............text...tI... ...J.................. ..`.rsrc................L..............@..@.reloc...............P..............@..B................Pi......H........2...5...........................................................0..8...........r...p(....("...-.r...ps....z..T. ......(>......&...*........13.......0............~................................(....&..,..r7..p..r;..p(........(......r...p(....("...-.r...ps....z..9......(...... ..........!.............s....(,........8......(0...,i......(....,\..(....,S......(....,F ........3,. ....3$.B....3... ...._.....3....c.......+......,.....-.+. ....(.......X.... ....?r..... ....
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):51712
                                  Entropy (8bit):5.6384119869822875
                                  Encrypted:false
                                  SSDEEP:768:OcyYeRydy9o10KVGjsyfAD/YaLVXZjp1jinZ3:OVYegMi+jxO/YQpVq3
                                  MD5:E2C21C8E8E37B9AE91B607A95FBFC531
                                  SHA1:0F1C9525BFE6CE5C49184913EE5D88AEEF22EDCA
                                  SHA-256:B6BA533C2A24694485B7FC62B9B74E67C830B4CCAD9F2F4BD0DD90556286BA6D
                                  SHA-512:3BC59C1137415452A469DFCE5CDF6409E629FD03E65C9F9BFA1908082E9F77B72A5F1754DCBBA16CCE4CD1E28E372BD79DCB79643C6026DDCBB1CB8B22C3FEEA
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...U.)X...........!..................... ........... .......................@............@.....................................W............................ ......l................................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................H........u..Xj............................................................(....*.0..9...........}.....r...ps....(....(....t....}.....{....,.....&...*...........24.......0.. ........{....-..*...{.....o.......&...*.................0.. ........{....-..*...{.....o.......&...*.................0..$........{....-..*...{.........o.......&...*.................0..u...........r...ps....(....(....t......,A..o....,6.o.....o ....o.....o ...o$...o%.....o......o....&.,.......&.,..o....&.....
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):15360
                                  Entropy (8bit):5.366677293719
                                  Encrypted:false
                                  SSDEEP:384:YEPlqP64fMxCHPadZq3cAUseKG0pw5nYHoZ:YEES4rHPuZm7reKG0pw51Z
                                  MD5:4FBFD0F36365D230DA8B5AE1400F45F4
                                  SHA1:28B51B8040B83A58FB66BCC7BE113875B62AA92A
                                  SHA-256:0AB64C4661AD820C0DEFBB4CA4C2CA66F785D5DDBD1065A7A734D5E6B911F8A2
                                  SHA-512:0CD45EB34FB93E6792FAEF31A1FB2AAE4538CE1E0B8544F3943897693F928BED32D46EE94C27014F4F5516776628186AFE31EE1F4B2EEB440B0BA26DFEDC70D8
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........:~u.[.&.[.&.[.&T..&.[.&T..&.[.&T..&.[.&T..&.[.&.#.&.[.&.[.&.[.&..&.[.&..&.[.&..&.[.&.[.&.[.&..&.[.&Rich.[.&................PE..L...)..U...........!......... ......y$.......0...............................p............@..........................:.......5..P....P.......................`..d....................................2..@............0...............................text............................... ..`.rdata..k....0....... ..............@..@.data........@.......,..............@....rsrc........P......................@..@.reloc.......`.......4..............@..B........................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):73728
                                  Entropy (8bit):5.657494819587854
                                  Encrypted:false
                                  SSDEEP:1536:JhLodvrBzPgNfRzFN/iqeiBnysVhFBPttmwd:JhcfKpJphJtmO
                                  MD5:B6079BAD0049397C3906A4342467B7EE
                                  SHA1:E05EA86DE34C613ADF8D71534609700C21DEDF45
                                  SHA-256:479C9C13F45059271A5BF926A60A4AA4C4890C1083730FF13B4D9570E773A060
                                  SHA-512:528B928DBD06FB52612CCF684213897C3C73FA0B08B7270B4365B1C06055E8F41D76C47A1DD25D802211BAF3BFF3652D39D4837F44E208BDCE5E0C762CD362B4
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................0......0.....[.............0......0......0......0.....Rich...................PE..L...x.jP...........!.........p......2M.......................................0......tH......................................T...x.......(.......................t...................................h...@............................................text...T........................... ..`.rdata..u".......0..................@..@.data...$...........................@....rsrc...(...........................@..@.reloc..N........ ..................@..B................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):14848
                                  Entropy (8bit):5.246037611483676
                                  Encrypted:false
                                  SSDEEP:192:AlWquprZr2V3g9v2h45VCkevuTDBZFZ0ZvJt/VVhYYwE3X6pypzTThBNlw:AOp1Og9v645VCkddZXqJYYZKcB
                                  MD5:E9435E01378625E4B5CF2B768A053B14
                                  SHA1:CBD119A852006FDD39C854EEE96B7B29B34AB9DB
                                  SHA-256:AC24459E70591D6E9B8817D61B0FB60F0B5FAF57BD4A60AC46DA8EA9FDC4540A
                                  SHA-512:CE929B9920D29D029FB271A5CDF54AC83A9A0BB48731CD4432724B8CDECD97C6EA5CFF186E3D5B850F5CDF22A09F05EC3D2102234BF9708179FA3F8985C7FB4B
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........i.z:.z:.z:6o.:.z:6o.:.z:6o.:.z:6o.:.z:...:.z:.{:..z:.E.:.z:.E.:.z:.E.:.z:..:.z:.E.:.z:Rich.z:........................PE..L......Q...........!.........".......!.......0...............................p............@.........................p:.......5..d....P..8....................`......................................02..@............0...............................text............................... ..`.rdata..t....0......................@..@.data...\....@.......*..............@....rsrc...8....P.......,..............@..@.reloc.......`.......2..............@..B................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2172448
                                  Entropy (8bit):6.574313291164832
                                  Encrypted:false
                                  SSDEEP:49152:Til2E7QsEh4PtKOiRS00oTcPb7vJPEhzebVWOXAcLWtKQf0nKLx016BlTbe7u:TiIsEAtBiRSboTcPbFPEhzeZWOXAcLWh
                                  MD5:1BB9B930D360B99829A82F192F5FF895
                                  SHA1:1F158289869A08A7E28D1BB7132EF030211F71F6
                                  SHA-256:BD5F5A81A991033E359AF792CB50A270716059B2CBB11FD941C0F7A2BE5A9EF7
                                  SHA-512:33885B976B7E5F4F4002150B9377F5F7DAF3F96DA9C1CD273F05A3CECD4CD6FFCB8130A7CFAC16E47F83F3E47B676A6061F7572303E20371BC8CCE100A502B2F
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........XF..F..F..O...G..)...w..).5....O...H..O...a..F.._..).4....)...G..)...G..)...G..RichF..........PE..L....u.Q...........!..... ...........I.......0................................1.....`"".............................p|......dF..h.... ...|............!. ..............................................@............0...............................text............ .................. ..`.rdata...M...0...N...$..............@..@.data............>...r..............@....rsrc....|... ...~..................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):65536
                                  Entropy (8bit):4.438968163745509
                                  Encrypted:false
                                  SSDEEP:768:3cAF1raNmnTDn5+goV8uiNxvqLOiB9vnJstm8Tno4DccccEf:3PF1TnTDBocKVmtzon
                                  MD5:5659597A4FCE982A71F2658999D62E4B
                                  SHA1:AA2F662C576F8D12166B3E7A3ECFD16764F97364
                                  SHA-256:4AD54F8BC1D20E18B1E40B576640C362D088C2C4219B868DF312CD7A6FDFC83D
                                  SHA-512:0664FD2BF054A394425743D8B25A2023702AA547738A1BE34E5FB3DC5292EF36E0EE71EA99E6778F74AB2D1A69C8D1CABA883F572A178BE94998748CA6B8FC14
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........v...%...%...%.%...%...%...%...%...%...%..%.%...%...%..%...%...%W..%...%o..%...%Rich...%................PE..L.....$I...........!.....p........... ..............................................................................P...S.......<....................................................................................................................text....g.......p.................. ..`.rdata..............................@..@.data....K.......P..................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):551424
                                  Entropy (8bit):6.940677140178234
                                  Encrypted:false
                                  SSDEEP:12288:bI3Qukw/yI17kyWxX/rj5DHdD7Hyl/I5u+blFsO2TvlnMoVLv1MRwJ9C5kUsZg:OQhwv17kyWxX/rj5DHdD7Hyl/I5u+ble
                                  MD5:69E366689E907BA380BDB6993FE72D25
                                  SHA1:24F2BA4CF1D5371973DA63C4DE08871B29D70118
                                  SHA-256:78385A7CD50494C4243AF2F2848BC1B658DFB0D80434440148B61E5FE19AFE55
                                  SHA-512:766F641592E73666DCC7A9A52C253E349037F53B40E67458731C5BBA7CC19EE114ECBF6F376697E80C1DA792B82EE5BBA34C3327BE57151D4C4303F98EA545A3
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........q.vj".vj".vj"R..".vj"R..".vj"R..".vj"R..".vj"...".vj".vk".vj".vj".vj"a..".vj"a..".vj"a..".vj".v.".vj"a..".vj"Rich.vj"........................PE..L.....dR...........!......................................................................@.....................................P..............................\................................... ...@............................................text...2........................... ..`.rdata..i...........................@..@.data...8...........................@....rsrc..............................@..@.reloc...............`..............@..B........................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1997 Brother Industries,Ltd.BR-OCRBRegularBrother : BR-OCRB Regular : 1997BR-OCRBVe
                                  Category:dropped
                                  Size (bytes):25140
                                  Entropy (8bit):6.483203056212599
                                  Encrypted:false
                                  SSDEEP:384:PevKyY9zLDZrzfJrCyjXgyzwAbLbb0bmttEkThKFdod0NcVuAA7lA6E:mvKhL9/FCkJw/m4GhbOc3iA1
                                  MD5:3E69DA4F92687B19F2D8D89D119E32D1
                                  SHA1:B42AA143154A4CABE6BBB1BEE02C898AB7D37CEC
                                  SHA-256:22282ADA7A6FB767D8CB96E978F44F631C8D8B11956028B0843F2384B936BF9B
                                  SHA-512:B2B496B18DD2C3322F02DDAE9F355C343971F6C7474CB798B31A9F450B51EF6873072F118AF7487BC6E841AF0DFA84412C5AEFB065EABF1EB0648E54642B3114
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2X..".......Vcmap`......t....cvt .O ........dfpgm[:....|...xglyffN........I.head.>....S....6hhea.J....S....$hmtx).....T ...xloca.....W.....maxp.5....YX... name..Q...Yx....post.g.M..]....hprep....a....<..........................................................................................................................BRTH.@. .......l.#.\................................................................................................. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a....................................def.hi...........uv.................................................................................". .....~............................... ..............................................................."........................................................................................... .!.".#.$.%.&.'.(.).*.+.,.-.../.0.1.2.3.4.5.6.7.8.9.:.;.<.=.>.?.@.A.B.C.D.E.F.G.H.I.J.K.L.M.N.O.P.Q.R.S.T.U.V.W.X.Y.Z.[.\.].^._.`.a...d
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):176128
                                  Entropy (8bit):5.846453062376389
                                  Encrypted:false
                                  SSDEEP:3072:sy6Dn8VTOO3hEl5CZKbdZg2aZYaxDFJHH0GKVLhPEPTFpwQPgkVtFVkbM8EAKxP+:sWNPgkVtFibM8d06pe
                                  MD5:8FB74A2EB58B06ED6E13FAFDF0E15A2F
                                  SHA1:83489F4027FD89A140E8E26E3AF1BB2AA8480AD8
                                  SHA-256:6289D9AE201A761C748FC65B939ECA1EE6B5B7D83BAB8D0AB372C7A8F6A159EC
                                  SHA-512:327D927D7A65CDD1A6F1A391437311E705D6ADAA869C968107D46AE3ECD277E4097CCE367A5F0824A6785366E014209B90CA15A3D62B39F0C79DAA4C1C57A9C4
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........7...V.W.V.W.V.W.I.W.V.W.J.W.V.WEJ.W.V.W.p.W.V.WH^.W.V.WE^.W.V.W.V.W.W.W.p.W.V.W.P.W.V.W9v.W.V.WRich.V.W........PE..L......F...........!.........P............................................... .......................................................................................................................................................................text.............................. ..`.rdata..2B.......P..................@..@.data........ ...@... ..............@....rsrc................`..............@..@.reloc...0.......@...p..............@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):49152
                                  Entropy (8bit):4.218381615338442
                                  Encrypted:false
                                  SSDEEP:768:turah7VkTVEOeQOVpHp39breIVMLic/8op1ddK:DVkTVEnQcJrerW7oZY
                                  MD5:A5F4AF3B5B39B4DF9CB6DC94EB786B89
                                  SHA1:D519B39481585C1E758F332F240F13EA09FCAB01
                                  SHA-256:CD250CE8CC62B0E15EFCA8A95BA2C585873DE3C3D8540CEAC8CF1B2396DBE59D
                                  SHA-512:040D0449DA568C5073AB5F0868AF38C7A69D05C543E42FFDC3C808A17C3C573C4D291E082807C3A78CCCACE9DD8CE385BD771429045DF329EACD056900581DFE
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......p...4.4.4..... ......V...=.4.o....2...5....5.Rich4.........PE..L....q.F...........!.....P...p...............`......................................................................`l..W...xf..d...............................|....................................................`..@............................text...:J.......P.................. ..`.rdata.......`.......`..............@..@.data....2...p...0...p..............@....rsrc...............................@..@.reloc..v...........................@..B................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):229376
                                  Entropy (8bit):6.1912554357270055
                                  Encrypted:false
                                  SSDEEP:3072:dU1NUN648//EgxPksHKx+U08bc7YHMI9P3OpM8Xwr73OZr/rQtwy0gFTrl:d+iN648XEsczq8bDs83O9By0gz
                                  MD5:7635E16A86B8CE2276906618BD654EC7
                                  SHA1:F4EC5D1E32BE59D5561F844E39153D27DE5E8E53
                                  SHA-256:828936A75B344EB46297F54DF5536218EBF07BB9032C8F310783732BEA8B987E
                                  SHA-512:1BD576F4C1BDF024F911445EE811884310DABB0F07F26437E54F88E06C0430B533D93B75901156AF02D27F31B22B99F4BE5900D72A64B76B50A161F4556890AE
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......F..................%.....%......%...|..............%.....%.....%.....Rich...........PE..L......O.................0...@...............@....@.........................................................................0........ ...............................................................z..@............@..........@....................text...%,.......0.................. ..`.rdata...w...@.......@..............@..@.data...8_.......0..................@....rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):1790464
                                  Entropy (8bit):6.5341997434965755
                                  Encrypted:false
                                  SSDEEP:49152:RaB6eqpANLXy5lYWmFcVHbxGHACT1b1MoINKvV2qFUe:cB6eqp4ry5lYcV7x76beoINKN
                                  MD5:8687576848F3277921EB453C26CD659E
                                  SHA1:F8E933AFEE0D2E7CA164468A42DB281B68F0EA0E
                                  SHA-256:968C3AACED6EBEBE3723FC2ED0D337E0AEC4A5BCB4B0AEFA269182979F93FED7
                                  SHA-512:ED3CF3EBD596776961E49FF89828C1D8B63F55E7249D05B6492D57E2CD99F660B91036A091A88650BBD35D38DF7E13D4A9748111729B6208F7DEF596BE8916AC
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........]...3C..3C..3C...C..3C...C..3C...C..3C..2C{.3Cu..C..3Cu..C+.3Cu..C..3C..3C..3CFU.C..3CFU.C..3CFU.C..3C...C..3CFU.C..3CRich..3C................PE..L......R...........!......................................................................@..........................e..}...l4..@....`.......................p..........................................@............................................text...4........................... ..`.rdata..=v.......x..................@..@.data........p...n...T..............@....rsrc........`......................@..@.reloc..~....p......................@..B........................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):69632
                                  Entropy (8bit):5.741709370454067
                                  Encrypted:false
                                  SSDEEP:768:BLKZLe+yjHCCObMjegeBJq+Vv/se/sUTh1e8P0tgumypK6:dKZLJ4CCObMjheBBGe/sIKtguppV
                                  MD5:B1E1286032B2A3D7F2DC107CF214D27B
                                  SHA1:6FB2418C2045FE374DCD36C96CD98DFDB861337E
                                  SHA-256:8E6ADE429191E237A8EA386215E0D9578864CE15329CB42617428034EDFAEF57
                                  SHA-512:22C6248851E04AB8B991584779080438ACBE86B9908A84AD153CCAE28B085462E7C8EE0269AF41F6364155B6A8308A24CB697B2460A920F1BA656A4E59220FBF
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r...6a..6a..6a......'a......,a...n..5a..6a..za.......a......7a......7a......7a..Rich6a..........PE..L.../e.G...........!.........`.......F...............................................Y..........................................(...............................,................................... ...@............................................text............................... ..`.rdata........... ..................@..@.data............ ..................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):115712
                                  Entropy (8bit):4.559201419564341
                                  Encrypted:false
                                  SSDEEP:1536:seLsRmMOKGRbwgsJsDbM9rMRsdHUZCL2mUkmLR3Wuy7u:FgRnOVm+mMR8UZc2mUkmLR3vy
                                  MD5:37AD9A14273191DBCBE97DE65B2B98EF
                                  SHA1:1DEFC241C60BC827868ECEE039CBA6475100DDCA
                                  SHA-256:33D5920AAA5DEE299996632C0F094662D245E19BCE68E4E1451CC6D5DB6CAA62
                                  SHA-512:EB7E27B4EB8D39FA5E7F4A1AFE54C6B9D15E28A344108C13F502B1780207D0C23FB053ECF5A5C4E852F7947EB4A83AFFCF7629FC952AC668EC6EC0AF41043D8E
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........w.AW...W...W.......T.......V.......\.......U...^n..U...W...O...t...V...1...V...W...V...1...V...RichW...........................PE..L......W...........!................X........ ............................................@.................................\!..<....@..H.......................$.................................... ..@............ ..h............................text............................... ..`.rdata....... ......................@..@.data...\....0......................@....rsrc...H....@......................@..@.reloc..2...........................@..B........................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):3929600
                                  Entropy (8bit):6.318584704901635
                                  Encrypted:false
                                  SSDEEP:98304:fJd6tRYn9jqV5skNvdLXSqoVvb8BeIL9w:hd6tRNlzSj8BeIL
                                  MD5:99576185FEFEF0ED1DE5FF7319B7247F
                                  SHA1:1BA87AF14D7D4CA312DA17797C0E388E68238CA2
                                  SHA-256:A5A0C86D4D690ECB2BFB7DF275608DD1D1FC777FF40BA1E050CF8EEE776C34BD
                                  SHA-512:0EC6EF329919C9ED8EB989243099C1C7109BA57EC79E1A0E37C4A221D2282306C293BF7EE36CBA290A7EBABE5BEBD7A4CFA4B5B3A98D2E60EADB347D9C90BE77
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.r........................9.............~..$.g.........................(........|.. ..._...e.......e...............e.......Rich............PE..L....y X...........!......*.........9.%......0*...............................A...........@...........................2......~2......p9.......................:..................................... s/.@............0*..............................text.....*.......*................. ..`.rdata..1....0*.......*.............@..@.data...x.....2.......2.............@....rsrc........p9.......3.............@..@.reloc...C....:..D....4.............@..B........................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):151552
                                  Entropy (8bit):6.1917981571054135
                                  Encrypted:false
                                  SSDEEP:1536:0UawVXhTLynbj4pBduZKCY76EoE8vPylSREzV8mk4Z57bt2OobnwRn0b+BXtBxx8:f+bjhfkg+HVZ5d2OonwR0bItBxxnuz
                                  MD5:3EE7DED80C8295E01A84C5EED218F587
                                  SHA1:D4C09C643300585C46D4454D8C8F7FFCFC9F5164
                                  SHA-256:A312D5D1C38DC64F95565EA79011C36BA3595DA6E4878B85600BA6290BA275FD
                                  SHA-512:5CBD7BB78B4A150424B7EAE7A37DCAFA7DB7158AC8E3CFF0FDE11B342739E375E169995D34E92199A8927A1EDD90DAD0FE8F51EDAE1F999D8507FA1992CCB00F
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........v...%...%...%.].%..%.].%...%;..%...%...%s..%.].%..%.].%...%.].%...%.].%...%Rich...%................PE..L...m`.Q...........!................B........................................p..........................................w...d........0.......................@......................................h...@............... ............................text...%........................... ..`.rdata...B.......P..................@..@.data....5....... ..................@....rsrc........0......................@..@.reloc..F ...@...0... ..............@..B................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):69632
                                  Entropy (8bit):5.7045022062372315
                                  Encrypted:false
                                  SSDEEP:1536:lBeyzBG5UCajxAveUQmLbFkqvdkojvt/R:TeWvsvdkozt/
                                  MD5:DA655AC65532D31D55BA4760292D7F37
                                  SHA1:1A43B3DC9C3407DA006E5C3CB9B787E1A80FD15C
                                  SHA-256:ACBC96946A87B77465E08CD74AF442441656E34126DFBDD8166CE5E037750743
                                  SHA-512:133326B5E7E2C5F2E8D844C61CE3B64C3BC35F1D5D4F771E28D9DE2EB147D646352DCBC070A4EA7D4B7C7ECBABE9775EF611A771D7A769F1ED10E11CE0F28599
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............ri@.ri@.ri@...@.ri@...@.ri@{}4@.ri@.rh@.ri@...@.ri@...@.ri@...@.ri@...@.ri@Rich.ri@................PE..L...8..O...........!.........`......M".......................................0......Yj..................................~.......P....... .................... ......................................(...@...............P............................text............................... ..`.rdata... .......0..................@..@.data....+..........................@....rsrc... ...........................@..@.reloc..(.... ......................@..B................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):102400
                                  Entropy (8bit):6.203740569493535
                                  Encrypted:false
                                  SSDEEP:1536:rlxw+ceTBi+n2wikcHfwx8knjTTzAYkqYBNt4:rbHTBig2BkcYSk3AxqYp4
                                  MD5:DA235A5119731706F2A72D1951B35169
                                  SHA1:789EDCE8790490F64750E857E8201FA5ABC0FDBE
                                  SHA-256:69B91F077D49FC17F94BB840F7DC7E65D72093F9259B3CBED13D19A1F569FCBD
                                  SHA-512:BA7008EDCA6789077546394574FF075CA299AD0C4AA259618BF6F4A45B145A824C42897EC1AABDC7FFA079C6E25CCBBA6A59BA718C136A8FB5B047D0FEDA6D86
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........u......................F......................................:......Rich...........................PE..L.....#B...........!.........p............... .......................................................................]..5....T..d....p..P............................................................................ ...............................text... ........................... ..`.rdata...?... ...@... ..............@..@.data........`.......`..............@....rsrc...P....p.......p..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):151552
                                  Entropy (8bit):6.226511754591384
                                  Encrypted:false
                                  SSDEEP:3072:06kJxFhDm1Ll/y0JQREnrOAr1q/4j9oQT8O1bRGC:0fTFwD/y0JYscI
                                  MD5:33655CE45908CD37A1B71B44AF97ED41
                                  SHA1:E3189D1F7E8CC37D622E8E1E627D65E94015C89B
                                  SHA-256:BDC999B84A2F80910F8D3D14FAF63270776FD6F8BCD7A374F0A5454019DAE18E
                                  SHA-512:B5401BD6EF88FB7B2C6B06E3EA6CFD37030DC2A2FC90DC690504B19B8CFAEC218C56F3AA6C84F4FC07C41927170FC26683EA9E19A9204C4BB883F52F0A4A8539
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........Z............................K...................................h...7.......Rich............PE..L.....D...........!.........................................................P......................................p.......8...P............................ .......................................................................................text...H........................... ..`.rdata........... ..................@..@.data....A.......P..................@....rsrc...............................@..@.reloc..|#... ...0... ..............@..B........................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):196520
                                  Entropy (8bit):3.753723863615446
                                  Encrypted:false
                                  SSDEEP:3072:MRZnGkviXjj80ggbjD1UECecjgQd999oW:awNKg01
                                  MD5:57AEA755AF17E7FEEC88CC9C6DF34A86
                                  SHA1:9C87A768E9C808444AC1F3F70B1994704844B00B
                                  SHA-256:0C1A2237AEC785322AE37A7C4BABA8AC57277AA5EC5AA9FBF6869B4BC337553E
                                  SHA-512:85ED5F9AFD163E2D944CE2ECBD5E56EC0EA95EB88D7EF82DD96F659EF7C21467C217820AD24C9441255FD505A6363C3BC1DF3F1E9032B3265709A96A6377F4DA
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......=\.y=..y=..y=..^...{=..pE..z=..y=..^=..pE..x=..pE..{=..pE..u=..pE..x=..pE..x=..pE..x=..Richy=..........PE..L...3..K...........!......................... .....;......................... ............@.............................N.......<....@..<.......................0.......8...............................@............................................text...f........................... ..`.data...T....0......................@....rsrc...<....@......................@..@.reloc..0...........................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):51632
                                  Entropy (8bit):4.466389822271565
                                  Encrypted:false
                                  SSDEEP:768:HVSFg9T1uDGTpRNz/5sJ+YL35YYXrabS2DuRPnMi2jpvW:1SEsyhziJTL35linyM95W
                                  MD5:6B228FAB530430AE7152500D238C20FE
                                  SHA1:28063BDD02282D2909FBD93A3BA04EE77AA88A39
                                  SHA-256:1CA7B6B024F64E43DD1E14DC667E76D3E48B649C4119777E30112B5E54DB7B8D
                                  SHA-512:4F4560BEB337ADA91F41D801A0E99C77D9F729AA8FD0E30419F14E5B297BBE2473618D488999E39500DA9A2A8CA62D827A757CAAEDF28B8D485B897540B7A2D7
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......=\b.y=..y=..y=..^.w.{=..pE..z=..y=..[=..pE..x=..pE..{=..pE..x=..pE..x=..pE..u=..pE..x=..Richy=..................PE..L...K:.K...........!.........................0....q;......................................@.........................<.......l"..<....@..T.......................$....%..8...............................@............................................text...t........................... ..`.data...X....0......................@....rsrc...T....@......................@..@.reloc..$...........................@..B................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):20432
                                  Entropy (8bit):5.1271470036934925
                                  Encrypted:false
                                  SSDEEP:384:Dz6KD4mw5Q8S8dGCVxqR9cGCXEWW6MlWKLXci2jXHUoJd:f6KD4mw5Q8PdhxqR649Mi2jXHUE
                                  MD5:86EFA17A232685397C9A8F8D42DC5ED3
                                  SHA1:56E57D92EBE6ED42938EEBCD517DF0A0C70EAA0A
                                  SHA-256:FF5015328F1D632585B38A7096DF0DC710B32B744227A14570C0ED0C4CAFA1CF
                                  SHA-512:BFCA427F2D1F960F1750E244759B33677B40B2689B2BD7CD0C044926D8342B9E972BA484C5F79858659E6D6E08E032B8A792227542D2D9653BFAF39AB7DA010D
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........e..W...W...W...^|R.V...^|T.V...^|Q.V...RichW...........PE..L....6.K...........!.........6...............................................`......}.....@......................... ...4............ ..$2...........8...............................................................................................rdata..............................@..@.rsrc...$2... ...4..................@..@.....6.K........W...T...T............6.K....H...........................ACERECR.DLL.RSDS..o....J.`.....>....D:\office\Target\ACE\X86\ship\1033.pre\acerecr.PDB.acerecr.pdb..............................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):854416
                                  Entropy (8bit):4.947959857691983
                                  Encrypted:false
                                  SSDEEP:12288:VhSpnmLWu06UEPCaZ5z39jjyaoehjlhu9kHY5jtdKMy9rM:Vh+nm7UExIaoeH49kH+td2M
                                  MD5:D931943C17BED5C0E39891F1E7D42D99
                                  SHA1:319222C6B17E98BF295CFB9FCFFA1F5FAD85D1B0
                                  SHA-256:B982E83FC09FD968F409DD5C763C236955E0ACB5A43AD4D2BB523A69C066C6D2
                                  SHA-512:CC33EDC20DEF5667507DB02A7F0A4B5EA5EAB47D3086279364D740E4E14A5816E5E89779BB0B4EA30873E212C8DA4C9C6C7E6CC907A48322C6122BAB890C3BB6
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........&..u..u..u...u..u...u..u..u..u...u..u...u..u...u..u...u..u...u..u...u..uRich..u................PE..L...9..K...........!.....j.........................:......................... .......|....@.........................(-..P....r..<...............................H... x..8............................K..@............................................text....h.......j.................. ..`.data....r.......p...n..............@....rsrc...............................@..@.reloc..H...........................@..B................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2497920
                                  Entropy (8bit):6.042831402962355
                                  Encrypted:false
                                  SSDEEP:24576:tkLHgZpJkiYJ/KQ/X3rJGalr3nmc/9yU8n89nlbFyKfilKxOqZom:tkLHkJkNR9yI9lbFzflZo
                                  MD5:98768790682215B6D6B4EB4937396E70
                                  SHA1:E87C4FEF45CD91837866CA470B0EC8856649C465
                                  SHA-256:1EA76681E4A5117A13BFC0163ABA3CC85C1339D3312B8D62B2EB71C4C0F292B7
                                  SHA-512:DE49910C3C32E94636E107A53995E4572B262382C4232CEB018968C11D0B169412BBFDA96EEBF089E6D47AA66C907DDD5630E9064A0F772E962B4DF31F919112
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........e..W..W..W..^||.V..^|z.V..W.y.V..^|..V..RichW..................PE..L...'1.K...........!..........&....................9......................... &......0&...@.......................................... ....%...........&.................8............................................................................text...............................@..@.rsrc.....%.. ....&.................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):55680
                                  Entropy (8bit):4.869093237347097
                                  Encrypted:false
                                  SSDEEP:1536:DyeRlCBm+j9POROulFnU/kvEnshMV9dj4w95D:Dm+KkvEshMV9Z4w95D
                                  MD5:8E81A111FC922524F7A3FF9679A2626C
                                  SHA1:D01D7C61D537848DEB177D2382471C04D7BBC1F4
                                  SHA-256:77EC6E1DDE0D20F8A02C9A2D20B4F2BF806BB382FFE2977A000987F99E483BD4
                                  SHA-512:DD4418973B9184FFB6D5873E4AC2570332AC29F2A235CBF79FC09A21721E685474CF3739DA5ABB9B7DA50F4C5AACD2C1FCDE51FB40AC927C4EB0BCB8F80ACCE1
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........e..W...W...W...^|R.V...^|T.V...^|Q.V...RichW...........PE..L....VIK...........!.................................................................V....@.......................................... ..................................8............................................................................text...............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):1388416
                                  Entropy (8bit):5.051999983508193
                                  Encrypted:false
                                  SSDEEP:12288:lcji8e43+V30ZGtlSb7XoTonuEZT8FRCas+DuTTCM1rX2Uu:yjoPVqwgMEXoFsasiETu
                                  MD5:656DCD78613F7716BA4EAA5A5F3DA4FD
                                  SHA1:A6D32A5F0148E251298C145DA5B16DF6F4C6C089
                                  SHA-256:BBE053F7FA668F5177002DF53A0C43A18DEBE7A4F15A2E2B62968E114022EBE9
                                  SHA-512:6EA71CF15AB4CDBE458EBA035EE63196B03FAA306676E50AE2A54B01760E174C5EC631D78558BF9519E17A8DD33B05E4A6E9FFED89CEA62333CD76280C528D16
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........e..W...W...W...^|R.V...^|T.V...^|Q.V...RichW...........PE..L....VIK...........!.........................................................@......G&....@.......................................... ..................................8............................................................................text...............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2193800
                                  Entropy (8bit):6.106097105587752
                                  Encrypted:false
                                  SSDEEP:24576:8u70WSlAvT96rdm8hEj28pG9Sxb65HlpI9FdokM4BynV3U3XK/inT+y7KHslIpOD:8u7XSlAvZ8dm8hEd0p4Lwb+T+y7wsVQy
                                  MD5:80907D13729267709DD483A85BB2AF7F
                                  SHA1:69253AE4C3924AACA42E6FBBF2430DD5D01A3325
                                  SHA-256:CB9FBF1F9C223467F7AC74F6F9AFD12629827F5CD58DD021193D1A5FD7B4C880
                                  SHA-512:74AE32A831C3543925495B649F31F38EC2DA9D9720B52BC8D6E4D8D3140F55201B3E487F96664A8EBEF8DC85B54DA61B66E856948C027BC91BF41110D3F62B16
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........O......................VM.....raH......VK................F/...|Z......VZ......V].Y....VL......VJ......VO.....Rich............................PE..L......K...........!...............................4..........................!.....wz!...@.........................,................. ..............b!....... .0...(...8...........................H'..@............................................text............................... ..`.data...............................@....rsrc......... ......t .............@..@.reloc..0..... ......~ .............@..B................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):548792
                                  Entropy (8bit):6.381145745591954
                                  Encrypted:false
                                  SSDEEP:6144:VfMthd+AX1xE/wuGZcbDt0o7uMdkfSXzXK8U9ikdf6lfxn+eiJNAhO5/Vais8OH:dMXXowurbDt0o7uMd06vHw81H
                                  MD5:E045BCC73EBE6CC7F618D82B4210A33F
                                  SHA1:F233421145EE487E2AAF24CEAB612273EB7035D2
                                  SHA-256:15C6646FF06BBFF3D7C0893955C4B65D50E583E422D1F7FAC3B2942C485C57E9
                                  SHA-512:57241BDD78B7945E778BA25FC226A6A4130B24E2639485055EC33ABBA8E2D45D4D70DF5EFF61DF893B0347F0D45B88BFAE55D433DA7844D104B57CBC4DE0F7FB
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&..Gj..Gj..Gj......Gj..?...Gj.<....Gj..?...Gj....Gj......Gj..Gk.FGj..?.Gj..?.Gj..?...Gj..?...Gj..?...Gj.Rich.Gj.........................PE..L......K...........!.........p.......:.......0....I;......................................@.........................\...q...P........ ..h............H....... ..._..d...8...........................`...@...............L.......@....................text............................... ..`.rdata..............................@..@.data.... ..........................@....rsrc...h.... ......................@..@.reloc..._... ...`..................@..B........................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):37776
                                  Entropy (8bit):5.781668054817038
                                  Encrypted:false
                                  SSDEEP:768:pM4suhMhbm3aj5Qqp9QecUMDgQZusWWzjZK5+rPtKOOH/+GrKPuMi2jXHUB:6omhiqd99QecLgQZusWWg5+RKOOH/hrb
                                  MD5:B9185C7774FDD22955C908596EDF85ED
                                  SHA1:E8EC29936E9DAA49A5A05C7911BCAE2A87A1FCB5
                                  SHA-256:69D8E91DEEF2D4D82A12CB06AD553A916591B2EF33DCF6371CCB62BBD393DD9A
                                  SHA-512:9AEA57579AE0039B0943E8DBA4A439A160271D9FC5D284B5712C20C32E54A8CAC7551589EC02A74EC33942248CED6B3BAB75791E54CD5595511A21FD124229AA
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......nC..*"..*"..*"..#Z*.)"...m/.+"..#Z,.+".....""..*"..n"..#Z=.,"..4p=.+"..#Z:.:"..#Z+.+"..#Z-.+"..#Z(.+"..Rich*"..................PE..L......K...........!.....d.........................;......................................@..........................S.......m..d....................|..........,... s..8............................^..@...................|m..@....................text....c.......d.................. ..`.data................h..............@....rsrc................n..............@..@.reloc..,............x..............@..B................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):686504
                                  Entropy (8bit):6.326325500362964
                                  Encrypted:false
                                  SSDEEP:12288:0W0FkwO/lFJKw9Z7ZjPLl2NE4XWjLzJw9MN0N5UImJOWhkpQt3hbqQoCwd4+:0W0eH9Z5jZW3N5UIEPtRWrCwK+
                                  MD5:0C84365CE19B97C419F87A720227FBE9
                                  SHA1:FD89EDFB465C5BB7F9B729D9CA8B66F20061FF44
                                  SHA-256:7F5906E705B824B697D96F4209EEA5C4CD6EE2BF7988A8C6435026633A0E83F3
                                  SHA-512:4FFC74B756B6C533D993AC550CCBE049C9C1063E91985BC3C383C787605BC450C1A01BFB8BDEF3A8D9D58BD6FE9A5E8F24BC563D521197ADA3E103BED2C6A1DA
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7..s...s...s...T...u...zf!.w....Q$.r...zf'.t...T...~...s...]...zf1.c...mL6.v...zf6.....zf .r...zf&.r...zf#.r...Richs...................PE..L......K...........!.....(...:......x..............:.................................P....@.........................@.......X%....... ...............b.......0..Dj...5..8...............................@...............x...t$..@....................text...W&.......(.................. ..`.data........@.......,..............@....rtext..L...........................@....rsrc........ ......................@..@.reloc..Dj...0...l..................@..B................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):334752
                                  Entropy (8bit):6.141507707743459
                                  Encrypted:false
                                  SSDEEP:6144:o1CO/s9kTuM+tgmZTsa2BKhOPGQUxgrevjqBob6orK6g89D/teh:o1CO/s9c+D+BDGQVevjqBob6SgOMh
                                  MD5:5B944624E1835F6DA7F1685514BABF8A
                                  SHA1:BFFCF20F199F185468BA20C9DCDA919A88A645C7
                                  SHA-256:FCED789693F42FB66D759A4B07DE1A2655D76ED6616CC965F4AA2405742A1EB8
                                  SHA-512:05F5037D2268A4E005F3645768274AF5C320702C08BB3D9D471ACF10851543A0AFB63E91D8D324B6FB6353E4678C660324D1F14AF3A39645A4ACB229D6B39161
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........U...4.4.4.<{~..4.L}..4.L{..4...4.4.B4.fl..4.Lk..4.Ll..4.Lz..4.L|..4.Ly..4.Rich.4.................PE..L......K...........!.........t.....................;.........................P......r.....@.........................l...`.................................... ...#..x...8...........................P)..@.......................`....................text............................... ..`CURSORS............................. ..`BASE.....C...p...D...V.............. ..`.data....D.......<..................@....rsrc...............................@..@.reloc...#... ...$..................@..B................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):643992
                                  Entropy (8bit):6.395188231191237
                                  Encrypted:false
                                  SSDEEP:12288:xPB6UWubZ58nHh2sTkcHPAIHdVtqN1uCfcDSyvcx8zFdhrYZRj46/ylLCJVE:VlWub2AI9PszEDF3scubE
                                  MD5:7013D26A59FD6CF267678D6CC3AA2691
                                  SHA1:200D41F0C677B0EBE435A7E3A8E228529C63B1CB
                                  SHA-256:FBFF6DE2E73BD6E50BD6B4A7BE5C1A03E663C5FDCB85FCCA07C9570A43D6A6F4
                                  SHA-512:5FAC0C04A131E2ABA81BF4193D1DABE788D977A57D73CA4D7458FF738E9CD7B0802F959F82703663F39DFAACA7BAF69EABF455AFC37A55318F15A54DAE70221B
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........D.p.%.#.%.#.%.#..#.%.#.]n#.%.#kjk#.%.#.]h#.%.#..#.%.#.%.#.$.#.wy#.%.#.]~#.%.#.]y#.%.#.]o#.%.#.]i#.%.#.]l#.%.#Rich.%.#........................PE..L......K...........!.........6....... .......p....y;.........................0.......U....@.............................X...h........p..LO.......................b..,...8...........................8...@...............@...t........................text............................... ..`.data...`........:..................@....rsrc...LO...p...P..................@..@.reloc...b.......d...X..............@..B................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):278448
                                  Entropy (8bit):6.1772934160564645
                                  Encrypted:false
                                  SSDEEP:6144:r4DYc+NP/bsZYtvqk91TjoHYMR9iB6ulOLk1S:rKEjsZoqmuCS
                                  MD5:BDBF69862A56A4375EE37CD271E160A5
                                  SHA1:4376555A28F8512BFA4459A61E500F12550C7354
                                  SHA-256:E604E7898036FF2E77610E086D29927E609E3B6977F672BB013D2C75C7D8005A
                                  SHA-512:166F7B37CF57F661069CDC67812FED82E280FE55408770592B9C4CF4BBC0C03A77311E77E16BB0E6EDC767A87F52FE5D90A0EC076C725E987522E97DD4F7344C
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......!.Gue.)&e.)&e.)&BOR&k.)&{.&d.)&BOG&d.)&BOD&g.)&l.&f.)&e.(&u.)&..&d.)&l.&l.)&l.&m.)&l.&d.)&l.&d.)&l.&T.)&l.&d.)&Riche.)&........PE..L...%:.K...........!.....&...................p....j;.........................P.......N....@..................................$.......................(.......0..<....4..8............................B..@...................H#.......................text....%.......&.................. ..`.data....^...@...Z...*..............@....rsrc...............................@..@.reloc..<....0......................@..B........................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):14776
                                  Entropy (8bit):6.284521600957244
                                  Encrypted:false
                                  SSDEEP:384:jM7bQBc9a2UPNm5W4io5WbFLXci2jpv7qi:IIOazFsyMi2jpv+i
                                  MD5:A4E707489842E44D60EE0A8D88E7C5CA
                                  SHA1:75AB59085F26030AB911701442AB7B80FBFE43D9
                                  SHA-256:9524E0071EF4C59E7412AD5C5F610D3091C20FB567246E40164DB9A138FD7BE7
                                  SHA-512:7916DFCDE5CF21A6233B3D245AE32D0D272B813687248EAC7BA75D3A147C1174708755675FAA23B82D75723DF00730FF84D70D5500A45259B7512BD3AABA8792
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........o.AY.|.Y.|.Y.|.~...[.|.Pv..\.|.Y.}.|.|.Pv..X.|.Pv..[.|.Pv..X.|.Pv..X.|.Pv..T.|.Pv..X.|.RichY.|.........................PE..L.../:.K...........!.........................0...............................`......a.....@.............................N.......P....@...............".......P..0.......8...............................@............................................text...I........................... ..`.data...T....0......................@....rsrc........@......................@..@.reloc..0....P....... ..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):14776
                                  Entropy (8bit):6.283308797971359
                                  Encrypted:false
                                  SSDEEP:192:bwkbQBTE3XGt+wCXdW9uW4Ao5WOojIQKPnEtObMacxc8hjeyveCHwq:b7bQBQ2UPNWwW4Ao5WbILXci2jpvSq
                                  MD5:041BFBF0A7099FAFDD4D774E3FE8694A
                                  SHA1:D60BBEFDB638E356349AD2055EB5CCF83B970558
                                  SHA-256:0D62A495EDCC3D7CA573A57721182FA92149448F6DF8877EF128F79167598749
                                  SHA-512:FA9C797F2F2DCCA206DB80196DF203DB1F7B8CF687FFB1C039A8EF4560C550734FD20B6B776E682FEB1F35A8F9663BFB3E3992FD9A9E358115C74C860490BC4E
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........o.AY.|.Y.|.Y.|.~...[.|.Pv..\.|.Y.}.|.|.Pv..X.|.Pv..[.|.Pv..X.|.Pv..X.|.Pv..T.|.Pv..X.|.RichY.|.........................PE..L...2:.K...........!.........................0...............................`......" ....@.............................N.......P....@...............".......P..0.......8...............................@............................................text...I........................... ..`.data...T....0......................@....rsrc........@......................@..@.reloc..0....P....... ..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):14776
                                  Entropy (8bit):6.285586833557023
                                  Encrypted:false
                                  SSDEEP:192:BwkbQBTc3XGt+wCXd/WBuo5WOojX5QKPnEtObMacxc8hjXHUz1Trmpd9fJ:B7bQB42UPN/WBuo5WbX5LXci2jXHUKB
                                  MD5:D1E0D7A45E212F8E13023CE99CB7F2D3
                                  SHA1:12D4214E9D5E4AEBE572C6E5B945AFB6DB8B9233
                                  SHA-256:5D41B1854E7593BC22E0F1436C780101BE37B6AE7E35EBAD457986C8F47D54E2
                                  SHA-512:612D8A9996B029E5F4B9AE60441547C7657927483F27ECC0D8E78265C26E7887DEC814EF98E51E24FD4904E404AED1A10117C30F589D81C08206C4AD79FBB5E7
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........o.AY.|.Y.|.Y.|.~...[.|.Pv..\.|.Y.}.|.|.Pv..X.|.Pv..[.|.Pv..X.|.Pv..X.|.Pv..T.|.Pv..X.|.RichY.|.........................PE..L...9:.K...........!.........................0...............................`.......}....@.............................N.......P....@...............".......P..0.......8...............................@............................................text...I........................... ..`.data...T....0......................@....rsrc........@......................@..@.reloc..0....P....... ..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):383904
                                  Entropy (8bit):6.319906044465849
                                  Encrypted:false
                                  SSDEEP:6144:wtBWzsQ5TJDCrGmYEoXLFIjYyaCficKeW+bLhOaHVA:YBWzsADCr8xAaCacBA
                                  MD5:17A9205D14E613F1811B4268C75A3C61
                                  SHA1:2E1BF114CF51E09C71D370C5DC633DD6905DF17A
                                  SHA-256:CED86A0FB1FCE188C9BB911370DCA2EACD7F2610F0B32E03800079F0173108D2
                                  SHA-512:60ED2FD2B68067DA1B731DDAAA3E61A87F5FCC84224514BED994F2AEC30DB894F78438FD5F705643CD1136083FB4AD03477DAA8C0FE26559EB7D566558CF1023
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........]..<...<...<.....<...D...<...D...<.......<...<..L<...s...<...n...<...D...<...D...<...D...<...D...<...D...<..Rich.<..........PE..L......K...........!.....(...........%.......P....b;......................................@..................................`...................................?..t6..8...........................8)..@............@.......].......................text....'.......(.................. ..`.rdata..,)...@...*...,..............@..@.data...`$...p..."...V..............@....rsrc................x..............@..@.reloc...?.......@..................@..B........................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):329624
                                  Entropy (8bit):6.521362066447523
                                  Encrypted:false
                                  SSDEEP:6144:TssjG/UXuDqudQV1S0cGxJgyrjfp/ht4BAcV0UamDtt6frcyRLv4XyC5GhODhYaa:QMPuDqAQVstOnthiBAItByRLwyfR5
                                  MD5:2155C4FF52DF49B28E4B5047AED81AAD
                                  SHA1:1E83909ADB426A182A1E65136E1E054F692A1712
                                  SHA-256:B034581570C1E2ADF0B182BF2C833C7D746989211E7092ED4924BCC9AABF49C8
                                  SHA-512:44DC33A577B984209835D1FCA439D9E201E00DC3BA20AD2EA2DD3CF52A4212EE13F8EFA27EF326493104253C7BCD4B5F283980E3947EA06B84383EC5B45BECFE
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........b...........{]....(LX.....{[...................5...QJ.....{J.....{M.....{\.....{Z.....{_....Rich...................PE..L...<:.K...........!.........F.......V............s;......................... ............@.........................L...7.......x................................(......8........................... k..@.......................@....................text...%........................... ..`.data...8...........................@....rsrc...............................@..@.reloc...(.......*..................@..B........................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):44480
                                  Entropy (8bit):6.406222878274499
                                  Encrypted:false
                                  SSDEEP:768:A5GkCbM2wFMZo7M1HbViTsMq4p666hY7DAXQ/5QagCAOStO2pHgvg6hOplh+eBUE:BkCbM2wFYo2HbEnB466hY70X4KaL2pHR
                                  MD5:1E62D484BCE21497F9DF28C8B841A2EE
                                  SHA1:499158D39E6DB33A85BB607054EFAED83CF466A4
                                  SHA-256:65868800630C97ABB633FC82D128F2C0B66B33EA288FAC4D3644DD21626BA784
                                  SHA-512:A5A7708D526F98DA8501C0391FFCF7AD94A8ECDE42647A48005FD3243F12AB4F1A50AD632D7B6E169CE58257C68EC74ADAEE2E4B161A26E5CC4961573B45A1C5
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:.I.~.'.~.'.~.'.YtJ.|.'.w..z.'.......'.w..|.'.Yt\.s.'.~.&..'.`...'.w..k.'.w..n.'.w....'.w....'.w....'.Rich~.'.................PE..L...E:.K...........!.....z..........?t...................................................@.........................\}..r...(...................................0...X...8...........................H...@....................}.......................text....y.......z.................. ..`.data................~..............@....rsrc...............................@..@.reloc..0...........................@..B........................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):27
                                  Entropy (8bit):3.8245387807277744
                                  Encrypted:false
                                  SSDEEP:3:PI6qNSv:gTSv
                                  MD5:06604F6AD34FA0BA04E2F785E32367F5
                                  SHA1:ACBEC35E882A65F00A8BB920BB4B00DE5476CE85
                                  SHA-256:FEC7F297B0B41C1F85A4E0294BFF35E8794676187F596A330EDCB1D4C3D1F26D
                                  SHA-512:65EA5C139EB13102B6D180DDE5B7AD9E9DEF494C053036CDA4EB6CB6D43FD24B6E9433BA7F4162470A50BFB286EEDD71E2A5B8EEBAE7BC83E62983D1A2E2D2D2
                                  Malicious:false
                                  Reputation:low
                                  Preview:AccessDatabaseEngine.exe ..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):527776
                                  Entropy (8bit):6.3700526054399935
                                  Encrypted:false
                                  SSDEEP:12288:vbiNvsAwcj40ymOuFc7RxCyCErU8k67St:jiNvsAwcj40bOuFW/CyVr467St
                                  MD5:7794DE592823C94D3F041653F1DCF5CD
                                  SHA1:C0688FF700D7B8E8D431636085BD9F590FF1BD53
                                  SHA-256:0D624B9A92CA089D5ED66BA29C8214836A206C10B2D9BD8F0855BE1BCCE0037E
                                  SHA-512:DDCF3C1630443EF3BA750F8CCB9A2513F646C2901FB26F11779F37AC449A91EF8BD10474CBDE4B60B2661CE85E7A0766F655277A6250692C90DDC12EDD946A37
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............nk..nk..nk......nk.I!...nk......nk.....nk.....nk..nj..nk..<...nk......nk......nk......nk......nk......nk.Rich.nk.........................PE..L......K...........!................H}............X;.........................@......#.....@.............................[...<...x................................Y......8............................i..@...............H............................text...M........................... ..`.data...L+..........................@....rsrc...............................@..@.reloc...Y.......Z..................@..B................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):220560
                                  Entropy (8bit):6.319365907530846
                                  Encrypted:false
                                  SSDEEP:6144:wytcXGBwrKACjXxO4+qxAoGAAdtHDaGt12jpAD8gDGcZQFAXHzK0WOt1oEqA:wLCdJGAAdtHDHtodAD8gDGcZzXHzKBEx
                                  MD5:03E380F4D9405B4BC57A08EBBA141B2D
                                  SHA1:226DBF90533738A8CBA6AB7D0C44F7FA48C1EF84
                                  SHA-256:9E95693F9FED4389D36326B24B4D6DBA3B1B55546ACA669CA0B5DE62486C5103
                                  SHA-512:6120CCA93F183D725CE55096BBD9B83066FB6E8630996A8B5D119D80B04365163888A71B34BCD950852BDE59BAB848CD5290AB0BA5621672522D3866E4C65212
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4...p...p...p...Wa..q.....9.q...y.:.y...y.<.w...Wa..z...p.......n.+.q...y.,.@...y.+.}...y.=.q...y.;.q...y.>.q...Richp...........PE..L......K...........!.........................P.....;................................>.....@.........................8...7...(........................F..........x...`...8...........................@T..@...................p...`....................text............................... ..`.data... y..........................@....rsrc................"..............@..@.reloc..x............,..............@..B................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):3049376
                                  Entropy (8bit):6.470395257546101
                                  Encrypted:false
                                  SSDEEP:49152:yQN5vwiZx58ASCJJWS97gYQc4gyNTLyTv+hFBrGk9GOva2+GmfKmfHIkPy+TK:xN5oiv58ASSWTYQceNXyTGhF1v9xvEGZ
                                  MD5:6241BCC05F42078E322F9B2969047074
                                  SHA1:F662159D6BED51AA0D74B3A58D038198A17596E7
                                  SHA-256:14863C41A8B07EFE7F13520D8705CB5C9DF6500964FE1AFAAF9507F01CC83E37
                                  SHA-512:581D80D40FE530921A3F4BA0DD96B4F22DF3101125C14FCEC5276CEA146080F2C562282036BE52B5D863431FAFE4AF5434FC54F5B9745A78576597826A61E626
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........W......................[...............].......L.......K.......Z.......\.......Y.....Rich............PE..L...$..K...........!.........R.......#.......0.....;.....................................@.........................\(..8....(..<....................p..........<...L,..8...............................@............................................text............................... ..`.data...4E...0...B..."..............@....rsrc................d..............@..@.reloc..<............l..............@..B........................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):247200
                                  Entropy (8bit):6.662712520415507
                                  Encrypted:false
                                  SSDEEP:6144:7CTBJQ5wLR8FXIe81XRIyBg6Vmr3OguBgckDSHaOew3VJJd:7CTrQZEXRJBPesZR3Jd
                                  MD5:46E1287E6AEB1B91858C9C9E279C90A0
                                  SHA1:A852EA4C315700C7DCE8A61B3788783943DF0F7B
                                  SHA-256:0EFC91F0291F94DD140A59A79B81184BF9577BEB009851C9EC101A49CE89590A
                                  SHA-512:96D2637BBCEC11609703119D9C8E8F2E046644948D251E121B96037BFA2EA4F78D1C9E36F44105FDB2C3B7A230D01C5577C36CE3E6C7BF763729B40C10226D22
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........V...7..7..7.....7..e..7..O..7..7..c7...x..7..O..7.....7..O..7..O..7..O..7..O..7..O..7..Rich.7..................PE..L.....K...........!.....z...F...............0.....4......................................@.........................(|..7...`|..........|.......................@.......8...........................X~..@...............4............................text....x.......z.................. ..`.data....!...........~..............@....rsrc...|...........................@..@.reloc..@...........................@..B........................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):362904
                                  Entropy (8bit):6.380350814509846
                                  Encrypted:false
                                  SSDEEP:6144:PkAY13bP3zY67b1V1ZwPhSQUjwqh2XV+TA7UyJCMLON7fD9v0lcjN:LAXYCV1mZUjwG2XV+M7UyNgDacjN
                                  MD5:635ED91A94BFBB715E138946B236400A
                                  SHA1:114F7E955005964C5DFD1D1974AB6C61B83E0B67
                                  SHA-256:0F024C13CC0257129F8E9B538A01071B45ECB50F9523C8DF32C66683F3F58803
                                  SHA-512:C9875BFE65B7456BE586A5567AC649F63D860FFDEBF13F5D8888646895CCD2C8A4DE5E0931B5310F8A79023A1B5CC4A3F34BA8C2124C017B15E57A32BE00EF30
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......f%.?"D.l"D.l"D.l+<$l'D.l..!l#D.l+<"l*D.l...l(D.l"D.l.D.l<.3l#D.l+<4l.D.l+<3l)D.l+<%l#D.l+<#l#D.l+<&l#D.lRich"D.l........................PE..L...*..K...........!.........................`.....;......................................@.........................8...7...L........................r..........X*......8............................4..@...................p...`....................text...%........................... ..`.data........ ...4..................@....rsrc................<..............@..@.reloc..X*.......,...F..............@..B........................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):4254560
                                  Entropy (8bit):4.681304618865433
                                  Encrypted:false
                                  SSDEEP:49152:xdm9zMLNP6+AU5wL4MB2ltn54E/SbqjP4C:HNP6+AU5Ca
                                  MD5:74624AEE2D3814E91F60619827DAD662
                                  SHA1:A8BB5F482752002E4C0A097B4D0FDF91F407E0AB
                                  SHA-256:B869E98960B4EE8C420DCDA26C949D35E3CC9F4F947372F4611F14201E5CC31B
                                  SHA-512:E9A5BFFEEEC2C0F40F6077A9C73C801B2A91C5D5F94180CB5A04A55874A30D2AB87414501CA497B0B4E8F00F8E21E53485337A8E3C5914A7326AD650086DD8FA
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........e..W...W...W...^|R.V...^|T.V...^|Q.V...RichW...........PE..L.....cK...........!..........@...............................................@.......A...@.......................................... ....@...........@.`...............8............................................................................text...............................@..@.rsrc.....@.. ....@.................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):452936
                                  Entropy (8bit):6.646903441905637
                                  Encrypted:false
                                  SSDEEP:6144:4pQJzmsVl1VGf1ICuZ5Bu0fJQ8Q4+pqu/ZBNAOWOnRMpFv2He1:4qm6l1VG9ICuZ5zfvIx7xnn+1
                                  MD5:C9978EDA975F98F26AF49E5D2B1286C1
                                  SHA1:0896B3B0F3BC0692ABFDD32FFF1718DAE2A01DAF
                                  SHA-256:25D2519CC710878592A15E43EE692F66E5241365AE2E1149D275D87E7785359F
                                  SHA-512:A3A061C4BC843A7121BFF5782AE288875EA934A4A16C37F360EA12C52123163909FB6DE0DBD3244906DD0FA83B3CCDA0D83DCC093BC15D9A87E9560D3C52EFC6
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........,q..B"..B"..B".'/"..B".'9"..B"..C"..B"..."g.B"..."..B"..."r.B".."..B"..."..B"..."..B"Rich..B"........PE..L.....{K...........!.........`.......x..............................................................................P....N..|w..x.......................H........<...................................................................................text...v........................... ..`ENGINE.............................. ..`.rdata...7.......8..................@..@.data..../..........................@....rsrc...............................@..@.reloc...K.......L..................@..B........................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):104824
                                  Entropy (8bit):6.714416733465766
                                  Encrypted:false
                                  SSDEEP:3072:PjCmRVPOSliw3KZCNbHwg4iZFrq6yyXdYjsNoKMC95:7C69OLwQYVh6QNv
                                  MD5:8FE56174F2696B09EDC0EBAC42119D84
                                  SHA1:B289F62F326CC609F2B4EEF90EED996EFD45E124
                                  SHA-256:FDFD2ACDF0957841D00DA76395FA34E5F9675FB6E2EB6A3F0E9A1E6D53FDFA37
                                  SHA-512:AA17B3C19FB2C1D5E9D7FBC26993FAF27CA02983ED3F34FDF535233950377054A13D99E46093509CAE361D01610D20F8D13CD33EBC12E3478252E2B3C5D7051A
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........4...g...g...g.?.g...g.?.g...g..Cg...g...g...g..Eg...g..Sg...g..Dg...g..Tg...g..Bg...g..Ag...gRich...g........................PE..L...c..K...........!.....h..........p........p....nE.................................V....@.........................<...U....m..........................x...........tv..8...............................@...............8............................text....g.......h.................. ..`.data................l..............@....rsrc................n..............@..@.reloc...............v..............@..B................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):58232
                                  Entropy (8bit):6.427128021987606
                                  Encrypted:false
                                  SSDEEP:768:jYTpk8SLH4KAtoSnH1n3BXBCmFuZ/0F1loLiUoLCvzf9oWwJRFrabbMi2jpv:kNk9kXtNnH93BxZ1lqoev5N2R2I95
                                  MD5:74EB52F0A349765DC757749DC9A0A16E
                                  SHA1:D2C4EA801FFAB27A47BE4B33083F3B9A92992AFF
                                  SHA-256:9383486C1D0FEF0C72CF9B339FCA4EED828401DD538DA409809BE0BA0BF4C248
                                  SHA-512:39BBC251883231F79CDB60853566AE590A800B3E0C35B1B62D6A689996B73F886DA9FB80E993AFCDFDAF6881B1A4B027893A99BCA79253EF1A2F6B13F3F6C847
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(...I.G.I.G.I.G...G.I.G...G.I.G.1TG.I.G.I.G.I.G.1RG.I.G.1DG.I.G.1SG.I.G.1CG.I.G.1UG.I.G.1VG.I.GRich.I.G........PE..L....5.K...........!..............................pE......................................@.........................|...U......x.......................x...........x...8............................<..@............... ............................text............................... ..`.data...`...........................@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):18743168
                                  Entropy (8bit):6.550142355841463
                                  Encrypted:false
                                  SSDEEP:393216:oGYahbkBjUkkSg8TPUXu9e/ds5UXwigrIm5N/na:VJbkBjFkQ9yYUuZ
                                  MD5:05EAB393E0331875EC800E0620FA18B4
                                  SHA1:7A2A195FFA11227B6BD9B9323E9E64F87BD1EB6D
                                  SHA-256:8DC5E4C4B5D2A738AE53610721116806B4A1A95A0D7F362CD873F59F7C7810CA
                                  SHA-512:833F500685440FD46204EBE1104F82FB3ABD78E24CEDE375244521A06C1816C253E5ECEEF0971CBD1634041FC0ADCD55190417B77C56F08B68C77038A1EFF658
                                  Malicious:false
                                  Yara Hits:
                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSO.DLL, Author: Joe Security
                                  Reputation:low
                                  Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.......6...r.Br.Br.BU..Bs.B{. Bp.B.%Bs.B{.&Bb.B...Bv.B...Bs.B.v.B{.B.v.Bv.B...BU.BU..B}.Br.B..Bl.7Bv.BU..BR.B{.0B..B{.7B7.B{.'Bs.B{.!Bs.B{."Bs.BRichr.B........PE..L...0..K...........!.........$......<.`......`.....9............CS P......................@.........................4v>....0_.......0...]......................8o..@...8...........................`)..@...............T............................text.............................. ..`.data....U.......V..................@....rsrc....]...0...^..................@..@.reloc..8o.......p...x..............@..H................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):72521600
                                  Entropy (8bit):5.149650530183626
                                  Encrypted:false
                                  SSDEEP:1572864:ldbWo7aLKb7YF+w6chhnOS6seHKOeJjM:ldb26chhnOS6seHKOeJj
                                  MD5:ADB5B569D47BB9766BCDD9234296D227
                                  SHA1:E8B2A0B57C0072379CF3656B106D643A2DFFC685
                                  SHA-256:4FDAABB819E3FB72706271EA698CA4B53BC8CB9FD74DF0201469F14F025431D4
                                  SHA-512:091995B239E4CBA37E27C4AE553B68930C680E906FA505DB91FEABC17F641F41214DDC232B36ECADDBB8ACA3E916EC0AFC3DB5DCF61A839B2E03524C68A72B5B
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........e..W...W...W...^|R.V...^|T.V...^|Q.V...RichW...........PE..L...)1.K...........!.........|R...............................................R.....`/S...@.......................................... ..(yR...........R.................8............................................................................text...{...........................@..@.rsrc...(yR.. ...zR.................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):49488
                                  Entropy (8bit):6.418355575473911
                                  Encrypted:false
                                  SSDEEP:768:KG01HZ4WXyhgUX9zXXLWM5hwgMeMstUMRcwBAegMi2jpv+:KHSawZXLWM5h/MevRjBAeH95+
                                  MD5:E6C17655925007E9A945E445EA4DF754
                                  SHA1:0F2F07F2DA2F3608B7BD64503783706811BCE43A
                                  SHA-256:8AC2B1E3302674AF17BE490C2E5AB501B5D6F2BECF881A3859D41F4455816D89
                                  SHA-512:CA898C4A2D3CD97AD8F6B9BE89493B15977D6581C9C62E71B9B8AE917881CDC980BD931A587EBB438A554784196EFF9B92505D3DF5FA3D6D367A75D2E8A26EE1
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ko.i/..:/..:/..:...:,..:/..:d..:&v.:?..:&v.:f..:&v.:5..:&v.:...:1\.:...:&v.:...:Rich/..:................PE..L.....{K...........!................c(.............................................."e..................................f.......(.......................P...........0...............................0#..@............................................text............................... ..`.data...............................@....rsrc...............................@..@.reloc..h...........................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):149352
                                  Entropy (8bit):6.5641450191049735
                                  Encrypted:false
                                  SSDEEP:1536:vC4QOL26NOd32mM6X/pGzd4t/qcarbwNfQ8WfQJ+ItkbKR2zy2IoN7Zo86eAI0UV:K4QgNOd3z44Kw6JrokFyF5Zat/Vq09oi
                                  MD5:9D10F99A6712E28F8ACD5641E3A7EA6B
                                  SHA1:835E982347DB919A681BA12F3891F62152E50F0D
                                  SHA-256:70964A0ED9011EA94044E15FA77EDD9CF535CC79ED8E03A3721FF007E69595CC
                                  SHA-512:2141EE5C07AA3E038360013E3F40969E248BED05022D161B992DF61F21934C5574ED9D3094FFD5245F5AFD84815B24F80BDA30055CF4D374F9C6254E842F6BD5
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........C.P."..."..."......"......"..."..."...Zv.."...Z`.."...Zw.."...Zg.."...Zr.."..Rich."..................PE..L....TIK.....................N......r?.......0...............................p............@..........................................@..0............0..h....P......`...8............................>..@............................................text............................... ..`.data...............................@....rsrc...0....@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exe
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Microsoft Access database engine 2010 (English), Author: Microsoft Corporation, Keywords: Installer, MSI, Database, Release, Comments: This Installer database contains the logic and data required to install Microsoft Access database engine 2010 (English)., Template: Intel;1033, Revision Number: {77770536-28B1-4201-9170-6888BD5ECA8B}, Create Time/Date: Tue Mar 30 18:57:52 2010, Last Saved Time/Date: Tue Mar 30 18:57:52 2010, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.0.5419.0), Security: 2
                                  Category:dropped
                                  Size (bytes):26955264
                                  Entropy (8bit):7.98061375564031
                                  Encrypted:false
                                  SSDEEP:393216:U7eMGC/bhyNg7yvMGspeO0+5DropJhgubzgdwg+y/2QwU1tOPFd+v7NWBee:gIEZ4/wuQdwQ2/U1AP3sUV
                                  MD5:0B1097F4B29B3D3C81616438ABCA91CB
                                  SHA1:20732ECDACCDE9B15555BBE931F23A8D16139214
                                  SHA-256:AA107293DAA835BEE98AB540B06536104D761E796E1AF24F0B94E7050AD9A1AF
                                  SHA-512:6ED7C2FF0AD6818DA7AD9ADB4F4B696F640265AA89B5D77573279F87AB511DB4C130E9B6AC9661D1524B2106B00F5C5CDCEAC553CD7F6485D3B3CAA5F6FB8357
                                  Malicious:false
                                  Reputation:low
                                  Preview:......................>............................................6....................................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5...6..........y................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                  Process:C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):3285039
                                  Entropy (8bit):4.950126710366839
                                  Encrypted:false
                                  SSDEEP:24576:Az77fddddddddddddddddddddddddddddddddddddddG/vo+jj/tStgpD/Q9UFay:Hyy
                                  MD5:B3B0875CF142EC8C99004DDEBA51BDC3
                                  SHA1:CC8D2664BA41D3464CA8D46D8AFB702023512E9E
                                  SHA-256:FE00548C88D5663111B7FCCB639CEABA9580A66B969D2D244B7CFA8CEA31C64D
                                  SHA-512:9CCAC750C27DCBC484D3DDD809C6F1ECCEA2AD1590551FCF573BCB31FB58107FDE063B7C06B148587D8A239663FDD191B32AACB7348F5CA56C7CF36351575BE8
                                  Malicious:false
                                  Reputation:low
                                  Preview:0.2 *..*.H........2 .0.2 ....1.0...+......0.2.?..+.....7....2./0.2.*0...+.....7.....j.5...:L....o.....100330173845Z0...+.....7.....0.2..0....R0.0.1.7.8.9.5.0.6.7.F.2.A.A.4.4.C.3.9.3.1.5.6.9.5.8.7.C.A.C.F.4.2.A.F.6.A.1.8.E...1..0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........Pg.D..iX|..*...0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R0.0.2.6.E.3.7.4.9.6.6.8.0.E.1.1.9.1.5.0.C.2.4.3.3.C.0.1.D.C.A.7.A.F.0.8.C.7.A.3...1..0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........&.t.h...P.C<.....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R0.0.2.6.E.3.7.4.9.6.6.8.0.E.1.1.9.1.5.0.C.2.4.3.3.C.0.1.D.C.A.7.A.F.0.8.C.7.A.3...1..0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........&.t.h...P.C<.....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:MS Windows HtmlHelp Data
                                  Category:dropped
                                  Size (bytes):433434
                                  Entropy (8bit):7.960697988910112
                                  Encrypted:false
                                  SSDEEP:12288:HSzxpydHm8dwmsYDI+NuZydfUzmtH+dKL:HSzcbdwvYDI+YZydfUCtOKL
                                  MD5:89920DC13154BE087439A2935B0C78FD
                                  SHA1:3FF745F432C62D95E492F502BA40E2A9D0DE182A
                                  SHA-256:16D7794BC0D43F8C8CAD61F6FD431B168026BD4B369E06ED8125C5D1A6B5FE88
                                  SHA-512:5416B87CCEE34A044D8054410073B8DC2FC145587872E22CDF0B8B92EDCBC79DAE2E94A420CD8CD7B94B5ECC4F4D5763FD580A100C52EE82D7FAC1B24E721DB4
                                  Malicious:false
                                  Reputation:low
                                  Preview:ITSF....`........c........|.{.......".....|.{......."..`...............x.......TP.......P..............................ITSP....T...........................................j..].!......."..T...............PMGL4................/..../#IDXHDR....../#ITBITS..../#IVB...`.l./#STRINGS.....N./#SYSTEM..F.4./#TOPICS.....0./#URLSTR....}./#URLTBL...9.d./#WINDOWS.....L./$FIftiMain......v./$OBJINST...T.?./$WWAssociativeLinks/..../$WWAssociativeLinks/Property...P../$WWKeywordLinks/..../$WWKeywordLinks/Property...L../html/..../html/About_HP10355287.htm...h.w./html/AbtAData_HP10355320.htm..._.../html/AbtConst_HP10355217.htm...h.0./html/Abtdocl_HP10355230.htm......./html/aChrtXl_HP10355274.htm...*.! /html/AddMVChoice_HA10355234.htm...K.. /html/AddMVLookup_HA10355235.htm...a.`./html/AddRC_HP10355236.htm...A.../html/AdEdCC_HP10355237.htm...P.../html/AEDdata_HP10355238.htm...[.6./html/aExpAx_HP10355300.htm.....1./html/aExpDtsh_HP10355221.htm...B.../html/aExpXl_HP10355375.htm...S.:./html/AppFil_HP10355241.
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):88464
                                  Entropy (8bit):4.038953430996915
                                  Encrypted:false
                                  SSDEEP:1536:lmNeNT+YcuUhOojh+O0uHkpCnLye4sKjthM+9rHUM:cNeNEhOeFtLAsOthM+9oM
                                  MD5:528DE8FCB5FBBE1D23AD4D37270BEC2E
                                  SHA1:AB50FC129D8E8D6240E8A35971AA862E66449F57
                                  SHA-256:338DED3648ED5133370FBECECF7A3C216A58173CDB956F1A9321E11E610EBC19
                                  SHA-512:B832FACB8939D4FA9A8E2A41E59F0237BCAB891CD30CB3F03332A5679E8D310214EDAF2DA89B3E6F66DF662000FF0FCBAA2D5BF9719175819E80492A787BEE82
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........u..E...E...E...Ll..D...Ll..D...RichE...................PE..L....8.K...........!.........@...............................................P...........................................................?...........B...............................................................................................rsrc....?.......@..................@..@............................................................0.......p....................................2.......2.......2.. ....2..8....2..P....2..h....................,.......,.......-..........................................................(.......@...l...X...m...p...n...........................................................0.......H.......`.......x....................................................... .......8.......P.......h...............................................................(.......@.......X.......p...
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2831768
                                  Entropy (8bit):6.511628350930429
                                  Encrypted:false
                                  SSDEEP:49152:ymehdD0seP2PPohBqFQII8CO/9LhVTWqiJ22j/Ts+yQ7HJ:yDyO3ofqym/9LhdtiJ2ET5J
                                  MD5:3B0C4F182DF893F2C277DF598F0DA802
                                  SHA1:AE5C4B68E8E29D18988E0ED92931EEB51E24D047
                                  SHA-256:BB76A0C318201C0588564B545D18CD8440AA9BCF1AFA5B92638744F2D1631A44
                                  SHA-512:599BCCDD54445E782DB0A1715C2FA6F3C51BE6803B07A661255AE9E7CC60A5BB6A9D24EDD033EE2815DC575735B4E988A9B029D2323043D299EB7468E5410E61
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Z..4..4..4.....4.....4.X....4..qY..4..qO..4..4..4..qZ..4..5.4.....4.....4....p.4.....4.....4.....4.Rich.4.........PE..L.....K...........!......".........K.........$....>.........................P+.......+...@..........................c"......v".......$...............+......0).h....".8...........................h...@....................i"......................text...h."......."................. ..`.data...0.....".......".............@....rtext..L.....$......d$.............@....rsrc.........$......f$.............@..@.reloc..h....0).......).............@..B........................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\svchost.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):1310720
                                  Entropy (8bit):0.8307392521584398
                                  Encrypted:false
                                  SSDEEP:1536:gJhkM9gB0CnCm0CQ0CESJPB9JbJQfvcso0l1T4MfzzTi1FjIIXYvjbglQdmHDug3:gJjJGtpTq2yv1AuNZRY3diu8iBVqFp
                                  MD5:137844B059CA7CD0ACE68FDC2EF4F54D
                                  SHA1:93154A4CCFE1FE2F465387EF069D4E4B16A2BA87
                                  SHA-256:49C0C2F035CE73BE1A7C54CD32CE0E30F37D8478B6C95C8C8081B78183C999A8
                                  SHA-512:9588CB7C949FAE3EE6B5185570C045752A043813252A1462B721C0A6E9700A65F067DC3FAFE9B3DD824AF690C223885ED42D9CF0143F78528D1D899FA3569971
                                  Malicious:false
                                  Reputation:low
                                  Preview:...M........@..@.-...{5..;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................4..........E.[.rXrX.#.........`h.................h.5.......3.....X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                  Process:C:\Windows\System32\svchost.exe
                                  File Type:Extensible storage engine DataBase, version 0x620, checksum 0xa1c9a3b4, page size 16384, DirtyShutdown, Windows version 10.0
                                  Category:dropped
                                  Size (bytes):1310720
                                  Entropy (8bit):0.6585997313797483
                                  Encrypted:false
                                  SSDEEP:1536:xSB2ESB2SSjlK/rv5rO1T1B0CZSJRYkr3g16P92UPkLk+kAwI/0uzn10M1Dn/di6:xaza9v5hYe92UOHDnAPZ4PZf9h/9h
                                  MD5:B50A978554D2F5F12FC86B3B128AF74A
                                  SHA1:DDE921C008D58A71EC3CA859077F8D8DCA62BE37
                                  SHA-256:AD7A6DB18BD31F0A57E8B378242888A64379FCD11BC7834071BD80D4DD0FBA66
                                  SHA-512:9B87A76B92678999A4078AC04E1BF40A3D440DB0BB231FD656C045536934C90A324B815E85ADC34784DAE86848A1C46FCB35CDCA7A26137FD7F15FA187D88A48
                                  Malicious:false
                                  Reputation:low
                                  Preview:...... ...............X\...;...{......................0.z..........{..-'...|I.h.|.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ........-...{5..............................................................................................................................................................................................2...{..................................z...-'...|..................7.5.-'...|i..........................#......h.|.....................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\svchost.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):16384
                                  Entropy (8bit):0.08118823228543251
                                  Encrypted:false
                                  SSDEEP:3:ml/yYe/OtZVGuAJkhvekl15o3ZMt1allrekGltll/SPj:dz/Otzrxl4ZMtQJe3l
                                  MD5:876145B5BE76B48603C968A347051C85
                                  SHA1:817D2862FA71E18B762E8367F4EC2DD8656CB091
                                  SHA-256:C45B1A3D251C407ADFFE0B3A047F77DFF2D571903339A957BC2EF77BD4E4B8E1
                                  SHA-512:2211CDABF398FD9B77EEA6F687FC6AE64D837A162BC81EACB507C30A9102AC8022A6CDCDA72CBE428855103E5680E708CDEA100EB8343BE41EB8378AD7ACD4C6
                                  Malicious:false
                                  Reputation:low
                                  Preview:...t.....................................;...{..-'...|i......{...............{.......{...XL......{..................7.5.-'...|i.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Tue Nov 15 02:49:04 2016, mtime=Mon Mar 25 12:39:40 2024, atime=Tue Nov 15 02:49:04 2016, length=763568, window=hide
                                  Category:dropped
                                  Size (bytes):2182
                                  Entropy (8bit):3.9057313752936373
                                  Encrypted:false
                                  SSDEEP:48:8e3waNT9lCdOE6y4lP3RIHDdadr5tDDTNz/SVRWtDDTNzxP:8eAaNVz5tD2WtDv
                                  MD5:0C456E42623C635EA76FBFB248961E43
                                  SHA1:C13EBC10C74DCF6C8A85EA8A432BB81FABC797CF
                                  SHA-256:C2301FFE993F1D97E591D819964FA20B97C9769C15013B27FA2C02C2A359F91E
                                  SHA-512:BC992DC8E7DDCBEF43C0D83CCD2B900B9F2235C92CD0E197C3BE286AAB6EDC251F75E183690F4B07AD44EFF895D1C66AE5EDBDE21892745A726BE083A74F4F36
                                  Malicious:false
                                  Reputation:low
                                  Preview:L..................F.@.. ....xV5.>......~...xV5.>...............................P.O. .:i.....+00.../C:\.....................1.....yX.l..PROGRA~2.........O.IyX.l....................V.....g...P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....V.1.....yX.l..Brother.@......yX.lyX.l..... ....................g...B.r.o.t.h.e.r.....^.1.....yX.l..CABLEL~1..F......yX.lyX.l..... ....................y$e.C.a.b.l.e.L.a.b.e.l.....j.2.....oI". .CABLEL~1.EXE..N......oI".yX.l.....B........................C.a.b.l.e.L.a.b.e.l...e.x.e.......g...............-.......f....................C:\Program Files (x86)\Brother\CableLabel\CableLabel.exe..G.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.B.r.o.t.h.e.r.\.C.a.b.l.e.L.a.b.e.l.\.C.a.b.l.e.L.a.b.e.l...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.B.r.o.t.h.e.r.\.C.a.b.l.e.L.a.b.e.l.\.m.C.:.\.W.i.n.d.o.w.s.\.I.n.s.t.a.l.l.e.r.\.{.7.F.6.2.3.E.1.8.-.5.D.3.F.-.4.F.D.9.-.B.8.B.3.-.4.E.7.2.3.
                                  Process:C:\Windows\System32\LogonUI.exe
                                  File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
                                  Category:dropped
                                  Size (bytes):456457
                                  Entropy (8bit):7.973713960398273
                                  Encrypted:false
                                  SSDEEP:12288:7W+09J2EzVEfQWk4UuyGp20VHn1SYwi6cgVDs5cN:9Aza4Wk4UEVHi/ds54
                                  MD5:F3FBA7E870DA3183A3B80B8B065B73A5
                                  SHA1:D70F30F3FE46F6D2D1BBB4F640DB516AA11CED56
                                  SHA-256:E942E5BAF8CF2B2BFAB704A3A2DF6EA4AFB7651D07CC1B738C9129DDF9017CEA
                                  SHA-512:31CD94D1FD3C060A75D14255E5BAD9081F3D6945969D01E696D736D695C07777A6C21A315C59CD9EC225FF9BDC8A6E88569D73BC19DD60A6075A11EA98F5D867
                                  Malicious:false
                                  Reputation:low
                                  Preview:......JFIF.....`.`.....C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...i...nz...w ..j?.c.r.[.[p.J.!;..kN.#.....GsB..."...sU.V.U~1.pL...)3z...a.4...k>.Y.3.z.H..5...v........sR#c..tr..$.....^i.SL...oj.GS..B...E3an.,.....ldU.YI.3.$.j..)....4.R.{~4..j.....\.@...4...:....4..\...;.e+.zU...pE".Kz.....6(....S..kZ.G.......fG.Mz&.....5...-OG.....'....Nk...UTn...?A..u....*.?J...oC.i`...]...+...C..P.....44...+..O.X..XS..;.,?"8
                                  Process:C:\Windows\System32\LogonUI.exe
                                  File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
                                  Category:dropped
                                  Size (bytes):456457
                                  Entropy (8bit):7.973713960398273
                                  Encrypted:false
                                  SSDEEP:12288:7W+09J2EzVEfQWk4UuyGp20VHn1SYwi6cgVDs5cN:9Aza4Wk4UEVHi/ds54
                                  MD5:F3FBA7E870DA3183A3B80B8B065B73A5
                                  SHA1:D70F30F3FE46F6D2D1BBB4F640DB516AA11CED56
                                  SHA-256:E942E5BAF8CF2B2BFAB704A3A2DF6EA4AFB7651D07CC1B738C9129DDF9017CEA
                                  SHA-512:31CD94D1FD3C060A75D14255E5BAD9081F3D6945969D01E696D736D695C07777A6C21A315C59CD9EC225FF9BDC8A6E88569D73BC19DD60A6075A11EA98F5D867
                                  Malicious:false
                                  Reputation:low
                                  Preview:......JFIF.....`.`.....C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...i...nz...w ..j?.c.r.[.[p.J.!;..kN.#.....GsB..."...sU.V.U~1.pL...)3z...a.4...k>.Y.3.z.H..5...v........sR#c..tr..$.....^i.SL...oj.GS..B...E3an.,.....ldU.YI.3.$.j..)....4.R.{~4..j.....\.@...4...:....4..\...;.e+.zU...pE".Kz.....6(....S..kZ.G.......fG.Mz&.....5...-OG.....'....Nk...UTn...?A..u....*.?J...oC.i`...]...+...C..P.....44...+..O.X..XS..;.,?"8
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Tue Nov 15 02:49:04 2016, mtime=Mon Mar 25 12:39:49 2024, atime=Tue Nov 15 02:49:04 2016, length=763568, window=hide
                                  Category:dropped
                                  Size (bytes):2058
                                  Entropy (8bit):3.4024770381678136
                                  Encrypted:false
                                  SSDEEP:24:8e3qX9yECdOE40H6y4lPeAyAIHedvyxdv5dvR5vLUUwVJjJEyfm:8e3a9lCdOE6y4lP3RIHedadRdZ5oP
                                  MD5:ADFA518B4D4734376ABB62B571CF9D9A
                                  SHA1:300BB112310C2699598A1E60209A4FE7E204F10D
                                  SHA-256:75B9071153E7955F17175C07845BD3DE2000C85FD0707D738E051877826D92DC
                                  SHA-512:BCBF3BD577D0349D2A4768DC6218042A36D40F314C56CEF3BD0BD5CF7A8FA4DFF59ECDB151273AD0DA80E768F2630CEF110A0C0F954DF51B306D86298CF16215
                                  Malicious:false
                                  Reputation:low
                                  Preview:L..................F.@.. ....xV5.>.....~...xV5.>...............................P.O. .:i.....+00.../C:\.....................1.....yX.l..PROGRA~2.........O.IyX.l....................V.....g...P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....V.1.....yX.l..Brother.@......yX.lyX.l..... ....................g...B.r.o.t.h.e.r.....^.1.....yX.l..CABLEL~1..F......yX.lyX.l..... ....................y$e.C.a.b.l.e.L.a.b.e.l.....j.2.....oI". .CABLEL~1.EXE..N......oI".yX.l.....B........................C.a.b.l.e.L.a.b.e.l...e.x.e.......g...............-.......f....................C:\Program Files (x86)\Brother\CableLabel\CableLabel.exe..>.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.B.r.o.t.h.e.r.\.C.a.b.l.e.L.a.b.e.l.\.C.a.b.l.e.L.a.b.e.l...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.B.r.o.t.h.e.r.\.C.a.b.l.e.L.a.b.e.l.\.8.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.B.r.o.t.h.e.r.\.C.a.b.l.e.L.a.b.e.l.\.C.a.b.l.e.L.a.b.e.l...e.x.e.........
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):2142768
                                  Entropy (8bit):3.7577491567614665
                                  Encrypted:false
                                  SSDEEP:3072:0QLldsb1Tbjlucouv8C6iT4arT4EZkGohQK4rWKwi7W6UT811bdPqXJm35izIzIX:6j35izpj8r/W/
                                  MD5:DBEFDDF8520CCE4E6A1AC7E4139BDCFF
                                  SHA1:89AD68CE82AA7DB88DF21BEAD706F4E3DE3CDEEC
                                  SHA-256:C4A10B91F21B915B488C30552B44E73BA47CF5A0C198316E72EBBCE7A2D55F5A
                                  SHA-512:1F786EFFA7D022708690A5519FA03F0739DEA388A95D39972B6B1B6AB7EFC114A7A1C6FF9A22B61FCA426F74D3A29C04B2133594971416C990A6F6B5D73EE3D0
                                  Malicious:false
                                  Reputation:low
                                  Preview:..=.=.=. .V.e.r.b.o.s.e. .l.o.g.g.i.n.g. .s.t.a.r.t.e.d.:. .2.5./.0.3./.2.0.2.4. . .1.4.:.3.9.:.2.1. . .B.u.i.l.d. .t.y.p.e.:. .S.H.I.P. .U.N.I.C.O.D.E. .5...0.0...1.0.0.1.1...0.0. . .C.a.l.l.i.n.g. .p.r.o.c.e.s.s.:. .C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.p.f.t.1.5.B.6...t.m.p.\.C.a.b.l.e.L.a.b.e.l.T.o.o.l.\.A.D.E.\.U.S.\.A.c.c.e.s.s.D.a.t.a.b.a.s.e.E.n.g.i.n.e...e.x.e. .=.=.=.....M.S.I. .(.c.). .(.E.0.:.D.0.). .[.1.4.:.3.9.:.2.2.:.0.0.7.].:. .R.e.s.e.t.t.i.n.g. .c.a.c.h.e.d. .p.o.l.i.c.y. .v.a.l.u.e.s.....M.S.I. .(.c.). .(.E.0.:.D.0.). .[.1.4.:.3.9.:.2.2.:.0.0.7.].:. .M.a.c.h.i.n.e. .p.o.l.i.c.y. .v.a.l.u.e. .'.D.e.b.u.g.'. .i.s. .0.....M.S.I. .(.c.). .(.E.0.:.D.0.). .[.1.4.:.3.9.:.2.2.:.0.0.7.].:. .*.*.*.*.*.*.*. .R.u.n.E.n.g.i.n.e.:..... . . . . . . . . . . .*.*.*.*.*.*.*. .P.r.o.d.u.c.t.:. .C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.S.E.C.a.c.h.e.\.A.c.e.R.e.d.i.s.t.\.1.0.3.3.\.A.c.e.R.e.d.i.s.t...m.s.i..... . . . . . . . . . . .*.*.*.*.*.*.*. .
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):231
                                  Entropy (8bit):7.132795794512945
                                  Encrypted:false
                                  SSDEEP:3:cEnwTIf6hA89prR7r8DeWmXpekmxSX8Qamr4cZ7r11qPNSiilJUs1LU54Vj7E4Du:cEwTZP7MCX0kWSX8BnwtoPAiBj+3NjqB
                                  MD5:003564FA9C1FE73CB6614BC3B9E74600
                                  SHA1:057FD04C67BD9B6DFEA06727BC7E4B000212E510
                                  SHA-256:0FF0C744A42F6E5482DB8096A64B0EBCBF773ED9072DFE13034E46078D5ADB5E
                                  SHA-512:5A89E1663DE2EE62C2B332A2DF268C7AF2106EBE3BB7856D4E0F3497DC9882DD35CB24A4407C5CCF0CADAADB5E343416D4FDD3CBD4FE5DA7F4A801B4A143558A
                                  Malicious:false
                                  Reputation:low
                                  Preview:x.e..j.0......I49x.)-.HwoK.a...5.'.....[..^...........qy..g=].e.&.q.:....lg.{......&A... 5........>..d..V....]y...4,#I.9.P1"..I.V..\$..P:.i...t..Ne.q.N.H.z.l..3.......|....Lw..M....:<xT.h.5.o..]....n.........8..Y...?w.
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):172665
                                  Entropy (8bit):7.996742454214979
                                  Encrypted:true
                                  SSDEEP:3072:u7G7ZCwwihoXGn/m9DOIMur+RxHs7qTRPb4Gp5+tImtejdw7rjKjjAet7i9s4D9:mG75wcg+mOeiRxHs7kRPb4GHbjdwPktO
                                  MD5:2F64B1032E9CFBA2006039B4DC3AA426
                                  SHA1:581231CD07B65F8E4061E0058B83ADCB1082B19F
                                  SHA-256:8845ABE6F203643E8E5D21FB4F6C68AE27488ECF063AD4F28EEDC199EDE6FEDB
                                  SHA-512:010831946CFAC2D4E74CDC1019F6079BB7E840A3DBB6B16BEBDBDF37D2059F773D65AAD64443D160F2578771620B788C64281D235F383061F43FF9060787E88C
                                  Malicious:false
                                  Reputation:low
                                  Preview:x.\.q\..u?......B/6.._..\.W.4.@#U.N.R....L.:.Cf....g.a..g.q.5.XC.%.X...k.Z.h....-..............u...>..9.....{....Fd....1.i........*.^..:3...r...6.s..Q]...]]TP..VPtGYTP..GU.U.z2..8nmckG..."S...&.g..C#.]=..n...........Gr....H.......c""#.6}..+...........hgWVd#..c..Y.xd..A"i.....&..`'p<..f .*.......DEy.....7k'.....-....g........3...R*..%\..d0q..I..m...RW{.'2...7U...{..v...?.F......c..[~...X..tu.%.Ygz..L7....q8..fow{u.rozNuzz...U......gXz~.nqggv.v.Fwa..g.a...n.r.&..k............]..RaA...=S].a....M..kYD.....H .d.......e.E.....B$.......A.FHJM.$....3.KsJ...........#..B*6.J.j.=K......&.ca.|.[...D...V7.YV"..Q.......E.+.W.../.9..,..<....i...C.P.....f.E..Jz.--.bu.To..W.....xH...>!.3.M].Y.2..tj.&.g.....0b.wV%....{F.V.f6..u....$....}.r.x{..S8......+.......f......R^3.).&.}..60;[1`..0..M..\M'xpf. R-.ok............./_..#>]?.zKFlf....S..#K".M..k".\.eo..l....I...nge....x[\jB\.>...9...s..Up.........l'..?C!....#R...E".h.(...4.JJ.Y.jb.Ls.1.....o......\*.!N...K.
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):256161
                                  Entropy (8bit):7.990565238629863
                                  Encrypted:true
                                  SSDEEP:6144:oIBXRBD/TYBYIqR8qJWDW9z4+xbOSc22vts3VlP2U4tS9s1:h/GZDWG+xba22vUtTk
                                  MD5:7E3602D08B22DEBF43E6258B02696F95
                                  SHA1:8748ED67FACB6377DF485D00E10882AB6B7A6528
                                  SHA-256:A95F7068FC5F6168DABC0AB9CACC158B7E93077889B52236BC6B117D35E32157
                                  SHA-512:3CECC3934F4B62482DBB7309A0F708B29D0B80539A9311BCD325CB62FAB3A8E560079D0A4E3F23745486B41EF6AE365064D3353487BAA9F9E7630BBB156811CB
                                  Malicious:false
                                  Reputation:low
                                  Preview:x..eP....;...3.K..ww.ww...%.......;..n........s.......Su..o._...Vw..U.T...H.....z}......$...4........>E..2E.c..I....................+..+...6...6......UC}...f..../.BJQ...G....c.HE..P..B.....P.......>.+..E......>.(....w-".....S....OF..b..."..S...._...,.0.@....$....{[..ZL.......HF...........A....o..?....o.,0...)......O...? .a............0.x.S..."....j...._.............}k.d.U...C..S.{xzX...O....8.....O...;.....=.....O....F....@J2#N......j.3.9.^.|..1x...O.Qn...)..V.....*.c.....T_..N........Zl-A.X.....N.....#?H..qg...A..........MhiA...h'.i.I.O...._..m..xG..WDI....3+`f.s.W.y...[Xlr..K\......."H .'N..R.v...z...B.Y.6..)....}..*mD?....XV..*L.....F..R..9..._.\..i..r.%.D....!+.#..(...SL..,..4U..x...._.K...;.<..P..1I...@..7.......1..,.B...{...j...W..f..S..!>'X......a.#.HD..@a.........jh.{.D.g..V~....MC....A.......f....wR.k..j.^{.&%.N.K.s...0.%0..'n.}.....Q7....$.#.P......|...)w...CK....$...M...,...o8b..X..T0. .....=y.........6D@.Yj..l...}....Pa.~0..zcc.........L.|....
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):51235
                                  Entropy (8bit):7.991380565803357
                                  Encrypted:true
                                  SSDEEP:1536:orrmXs49qNUA7gwZwi4wVZ4gq0UnOsf1raUXlI:orSVqtzdGhn1f1plI
                                  MD5:D718690B4D422351AFAAD30FB5005958
                                  SHA1:F2405024C9F0C8B8EC8680D36B76F2A2FE1EFF50
                                  SHA-256:9B94B54057CC73F36F8193DF3CC5AF0D0980CF94A5E3F102A1D652D9B35EA0A4
                                  SHA-512:6C4D324C654649DF9B6B427F3FD90EB28A6121F84574A78E87DB2C8B9421DA19C84DA6A94FB0814D46F023C4D395E010BD5C6974C82C911E154E413C910C6DD3
                                  Malicious:false
                                  Reputation:low
                                  Preview:x..{|...0>..M6!.Y ....A.A..K...$.....EDA.FcTTLv..*.&-.q-.j.[....jm..*..$..p. ..*^.uA.`..y..93...m...>......9s..9.9..<...V.fA.,.i.. ........_..i.;...4..mcfV.W.ZP...w>.......U...u.C....\.>|.=...).z..r...j.......7_HW...j.\......|.]Oo....nN..)....Bs:....t..*....D....U.\0K1.:.q..dA...^.i.......I......?B.*..h.....).F!......r..7..I(...N..O....2..0...?..|.....Y........3.K../...N..P}..S......W../...K.g......./[.3R......}..^V]S]..4&06B:\...........ml.R5.'.MA.&........,9p8Kf.5.MB..v.....7.Ref}....F....,.C...Y].....p..!.J.I......s3....LY..2......<.....O.C..3....;/K......v.MP....r.g..*.R7V.es.7.l.M.Hr...^..)....k,57..m...F.S...~p..i.^....I....-PZb.F.'.*h.m...#3..!...U.B..%.!.m..o..i......e.kee..l}4Sl....L.[`.o..,.[=.9.h..f...).%.g3W...ZY.......~].+.?f..wu.G\-...%.....5\p`.O..7.O|!.6...Mr..&.EM2kS.....d..P....Jh.M.Y.3.d....9.i..,..j/.Z..!b&0.!0"...Gi..xJi}....d....Up.&$-.#}a._.L....O.O...8..C.$%TG.....,..=<+.....x...WI.&%..\.cA%.PB.n,.o\|5N.b*
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):116078
                                  Entropy (8bit):7.995244675708865
                                  Encrypted:true
                                  SSDEEP:3072:vEEw9tYANVpotzJ54OFxPmkwhaavfdf2Uog+6neZt:8pHdNMtzJ5TFYkqaavfdf2+RU
                                  MD5:B744F334A4DB8788A3EEB1430CF48D98
                                  SHA1:3778F36A74AFC672B2D85E2CAAC61F6981B5A9AE
                                  SHA-256:E0C3583CDA9929EFE92454F87365F56177F11DE88097261ED60D440FC5A16DE2
                                  SHA-512:596C086BCAA0CCC0F6D4AE65BF49FF8120650D6C8C7766D265BE564520398B9AB29795BBA46D6936D036B44166F8E8EE4F4363399299225C494C9E29F28F2358
                                  Malicious:false
                                  Reputation:low
                                  Preview:x....S.(~....L.d ..F.2(:........%m2.....m.....*....9sH.^.={......-}.VT....e.......6p.'.T.:J.H.k..Or..h...}?.?.Hr.....k...k.....M.E...>. ...."....3..W....q.n.7.\.|`..U....{.v}..o|.!....*.....p-............]..fNy.?..?.k.....w./...Da'...o.....G.*......T.mz.kA......e.1.*.-....0.....6...6T.....?.<..+l..4..'e..\...E.a&U."$..."..I.3.~w............4z...}.BX...B..E.... .3{..{C.....V..._c...l.Lp.._}....f?..V...v*.e)M.j....3..p#..wNI.E.W...7!...+..O*N.8:&>.......>.......>.......>....(.%..OG.J2.\t.-..Z....r.1.....w.....<....j.E_...sw..u.....^9_."..hWxl}WB..[0.[.fd!....E..... W>.!N..>)Y..@v>..<.}..(..j..:....A1..;..........r=...u..l.z.r.:..Q*.AL..$....A...Y.o..K.'.2..aa/....JX.7g../..E.hW.L.S..m.._...V.'..X.M......o..D.Bx4......d0..`.u ..e.....6..#...4!.T<v......ub...DZ2B.a.R.:...0V..2=.j.;).....+.. ..D.[....I.X}..Y.c...U......!i.z../.<|.,l...B.....Y.!.....G.....Y..9...v...?s5.;&..`u.........M.I... D..f!.1_~....x.[r....(.7J..!.W....C
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):25199
                                  Entropy (8bit):7.963604729903431
                                  Encrypted:false
                                  SSDEEP:768:RIPZQAuCWkDX8jL/o6wAGRrbm0If/ZGnJToRDwdP:iPZQAuFkIX/Hwprb5InZrgP
                                  MD5:AAA4040F506983B519300073770AF82C
                                  SHA1:279E791057AAB875CE65309B3A5212E8F64D3B8F
                                  SHA-256:53B21720617ECED6A172317F5C3289FB027CF4F7E744525FE76F11B97C8B75F8
                                  SHA-512:C6EBF4E2823060B010208A95E8279F3815233D00ECE373564A8C60958511E7B1E25290AE105AF22FB05A7481F2F08E589D01E5BA7DC758C9C0F7BC0CF913B16A
                                  Malicious:false
                                  Reputation:low
                                  Preview:x...S\. Z?...?t..XY#..w.....ZH\@.o..h......A.Z..O.}.2+Of..9. ..C!............g.6{f.l.W./.m..V....4...2......f.L..3...3n>...../..O.......<o...pa>....<a.o.....Q.w..[;.n3.9h..oF.1..o;...k.i..6?4.Y._5....k..~...{..u....I....]....3nf>......O..w.O...\6..............?.g...y.G.i>.4.p..k.....I.....9\....s..+s..4l..d......n.7..]..'@kS.....89.....`.m....r.p.|j..i~.L...).5P..)..;..+..aVt.@v.a.../.;n.....O7.......q.x}.x.<....G.4..>....n....v.....F=...u.7..G0............iV..f ...f.i.ys.....O.T...a..*.!W.G+...n...$..........U={...NO.vxz.y...G....o&>....h..U..-.....h...g0..S>9......|..9<..-.x.....l........|...b..M...<m...+.l....y._.?v...iR..[..,z...W=g...i...?_r....rG(}....<.3.SG9;..p.7...........Y.....o7O.A.......f.X.Sxf.q......2.}..p.[\....F.8..?......t...42....s...wlF....9.........R...~....}...2._.$...g....5.Z.u.3....@8FW...k.@v.....$.. ..7/.O/......$.w....N...I.1.@.1;.......a).o...uI>.'Q?3.=C?5./@.:u.Xl.w..3.6...;..t............
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):231
                                  Entropy (8bit):7.132795794512945
                                  Encrypted:false
                                  SSDEEP:3:cEnwTIf6hA89prR7r8DeWmXpekmxSX8Qamr4cZ7r11qPNSiilJUs1LU54Vj7E4Du:cEwTZP7MCX0kWSX8BnwtoPAiBj+3NjqB
                                  MD5:003564FA9C1FE73CB6614BC3B9E74600
                                  SHA1:057FD04C67BD9B6DFEA06727BC7E4B000212E510
                                  SHA-256:0FF0C744A42F6E5482DB8096A64B0EBCBF773ED9072DFE13034E46078D5ADB5E
                                  SHA-512:5A89E1663DE2EE62C2B332A2DF268C7AF2106EBE3BB7856D4E0F3497DC9882DD35CB24A4407C5CCF0CADAADB5E343416D4FDD3CBD4FE5DA7F4A801B4A143558A
                                  Malicious:false
                                  Reputation:low
                                  Preview:x.e..j.0......I49x.)-.HwoK.a...5.'.....[..^...........qy..g=].e.&.q.:....lg.{......&A... 5........>..d..V....]y...4,#I.9.P1"..I.V..\$..P:.i...t..Ne.q.N.H.z.l..3.......|....Lw..M....:<xT.h.5.o..]....n.........8..Y...?w.
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):172665
                                  Entropy (8bit):7.996742454214979
                                  Encrypted:true
                                  SSDEEP:3072:u7G7ZCwwihoXGn/m9DOIMur+RxHs7qTRPb4Gp5+tImtejdw7rjKjjAet7i9s4D9:mG75wcg+mOeiRxHs7kRPb4GHbjdwPktO
                                  MD5:2F64B1032E9CFBA2006039B4DC3AA426
                                  SHA1:581231CD07B65F8E4061E0058B83ADCB1082B19F
                                  SHA-256:8845ABE6F203643E8E5D21FB4F6C68AE27488ECF063AD4F28EEDC199EDE6FEDB
                                  SHA-512:010831946CFAC2D4E74CDC1019F6079BB7E840A3DBB6B16BEBDBDF37D2059F773D65AAD64443D160F2578771620B788C64281D235F383061F43FF9060787E88C
                                  Malicious:false
                                  Reputation:low
                                  Preview:x.\.q\..u?......B/6.._..\.W.4.@#U.N.R....L.:.Cf....g.a..g.q.5.XC.%.X...k.Z.h....-..............u...>..9.....{....Fd....1.i........*.^..:3...r...6.s..Q]...]]TP..VPtGYTP..GU.U.z2..8nmckG..."S...&.g..C#.]=..n...........Gr....H.......c""#.6}..+...........hgWVd#..c..Y.xd..A"i.....&..`'p<..f .*.......DEy.....7k'.....-....g........3...R*..%\..d0q..I..m...RW{.'2...7U...{..v...?.F......c..[~...X..tu.%.Ygz..L7....q8..fow{u.rozNuzz...U......gXz~.nqggv.v.Fwa..g.a...n.r.&..k............]..RaA...=S].a....M..kYD.....H .d.......e.E.....B$.......A.FHJM.$....3.KsJ...........#..B*6.J.j.=K......&.ca.|.[...D...V7.YV"..Q.......E.+.W.../.9..,..<....i...C.P.....f.E..Jz.--.bu.To..W.....xH...>!.3.M].Y.2..tj.&.g.....0b.wV%....{F.V.f6..u....$....}.r.x{..S8......+.......f......R^3.).&.}..60;[1`..0..M..\M'xpf. R-.ok............./_..#>]?.zKFlf....S..#K".M..k".\.eo..l....I...nge....x[\jB\.>...9...s..Up.........l'..?C!....#R...E".h.(...4.JJ.Y.jb.Ls.1.....o......\*.!N...K.
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):256161
                                  Entropy (8bit):7.990565238629863
                                  Encrypted:true
                                  SSDEEP:6144:oIBXRBD/TYBYIqR8qJWDW9z4+xbOSc22vts3VlP2U4tS9s1:h/GZDWG+xba22vUtTk
                                  MD5:7E3602D08B22DEBF43E6258B02696F95
                                  SHA1:8748ED67FACB6377DF485D00E10882AB6B7A6528
                                  SHA-256:A95F7068FC5F6168DABC0AB9CACC158B7E93077889B52236BC6B117D35E32157
                                  SHA-512:3CECC3934F4B62482DBB7309A0F708B29D0B80539A9311BCD325CB62FAB3A8E560079D0A4E3F23745486B41EF6AE365064D3353487BAA9F9E7630BBB156811CB
                                  Malicious:false
                                  Reputation:low
                                  Preview:x..eP....;...3.K..ww.ww...%.......;..n........s.......Su..o._...Vw..U.T...H.....z}......$...4........>E..2E.c..I....................+..+...6...6......UC}...f..../.BJQ...G....c.HE..P..B.....P.......>.+..E......>.(....w-".....S....OF..b..."..S...._...,.0.@....$....{[..ZL.......HF...........A....o..?....o.,0...)......O...? .a............0.x.S..."....j...._.............}k.d.U...C..S.{xzX...O....8.....O...;.....=.....O....F....@J2#N......j.3.9.^.|..1x...O.Qn...)..V.....*.c.....T_..N........Zl-A.X.....N.....#?H..qg...A..........MhiA...h'.i.I.O...._..m..xG..WDI....3+`f.s.W.y...[Xlr..K\......."H .'N..R.v...z...B.Y.6..)....}..*mD?....XV..*L.....F..R..9..._.\..i..r.%.D....!+.#..(...SL..,..4U..x...._.K...;.<..P..1I...@..7.......1..,.B...{...j...W..f..S..!>'X......a.#.HD..@a.........jh.{.D.g..V~....MC....A.......f....wR.k..j.^{.&%.N.K.s...0.%0..'n.}.....Q7....$.#.P......|...)w...CK....$...M...,...o8b..X..T0. .....=y.........6D@.Yj..l...}....Pa.~0..zcc.........L.|....
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):51235
                                  Entropy (8bit):7.991380565803357
                                  Encrypted:true
                                  SSDEEP:1536:orrmXs49qNUA7gwZwi4wVZ4gq0UnOsf1raUXlI:orSVqtzdGhn1f1plI
                                  MD5:D718690B4D422351AFAAD30FB5005958
                                  SHA1:F2405024C9F0C8B8EC8680D36B76F2A2FE1EFF50
                                  SHA-256:9B94B54057CC73F36F8193DF3CC5AF0D0980CF94A5E3F102A1D652D9B35EA0A4
                                  SHA-512:6C4D324C654649DF9B6B427F3FD90EB28A6121F84574A78E87DB2C8B9421DA19C84DA6A94FB0814D46F023C4D395E010BD5C6974C82C911E154E413C910C6DD3
                                  Malicious:false
                                  Reputation:low
                                  Preview:x..{|...0>..M6!.Y ....A.A..K...$.....EDA.FcTTLv..*.&-.q-.j.[....jm..*..$..p. ..*^.uA.`..y..93...m...>......9s..9.9..<...V.fA.,.i.. ........_..i.;...4..mcfV.W.ZP...w>.......U...u.C....\.>|.=...).z..r...j.......7_HW...j.\......|.]Oo....nN..)....Bs:....t..*....D....U.\0K1.:.q..dA...^.i.......I......?B.*..h.....).F!......r..7..I(...N..O....2..0...?..|.....Y........3.K../...N..P}..S......W../...K.g......./[.3R......}..^V]S]..4&06B:\...........ml.R5.'.MA.&........,9p8Kf.5.MB..v.....7.Ref}....F....,.C...Y].....p..!.J.I......s3....LY..2......<.....O.C..3....;/K......v.MP....r.g..*.R7V.es.7.l.M.Hr...^..)....k,57..m...F.S...~p..i.^....I....-PZb.F.'.*h.m...#3..!...U.B..%.!.m..o..i......e.kee..l}4Sl....L.[`.o..,.[=.9.h..f...).%.g3W...ZY.......~].+.?f..wu.G\-...%.....5\p`.O..7.O|!.6...Mr..&.EM2kS.....d..P....Jh.M.Y.3.d....9.i..,..j/.Z..!b&0.!0"...Gi..xJi}....d....Up.&$-.#}a._.L....O.O...8..C.$%TG.....,..=<+.....x...WI.&%..\.cA%.PB.n,.o\|5N.b*
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):116078
                                  Entropy (8bit):7.995244675708865
                                  Encrypted:true
                                  SSDEEP:3072:vEEw9tYANVpotzJ54OFxPmkwhaavfdf2Uog+6neZt:8pHdNMtzJ5TFYkqaavfdf2+RU
                                  MD5:B744F334A4DB8788A3EEB1430CF48D98
                                  SHA1:3778F36A74AFC672B2D85E2CAAC61F6981B5A9AE
                                  SHA-256:E0C3583CDA9929EFE92454F87365F56177F11DE88097261ED60D440FC5A16DE2
                                  SHA-512:596C086BCAA0CCC0F6D4AE65BF49FF8120650D6C8C7766D265BE564520398B9AB29795BBA46D6936D036B44166F8E8EE4F4363399299225C494C9E29F28F2358
                                  Malicious:false
                                  Reputation:low
                                  Preview:x....S.(~....L.d ..F.2(:........%m2.....m.....*....9sH.^.={......-}.VT....e.......6p.'.T.:J.H.k..Or..h...}?.?.Hr.....k...k.....M.E...>. ...."....3..W....q.n.7.\.|`..U....{.v}..o|.!....*.....p-............]..fNy.?..?.k.....w./...Da'...o.....G.*......T.mz.kA......e.1.*.-....0.....6...6T.....?.<..+l..4..'e..\...E.a&U."$..."..I.3.~w............4z...}.BX...B..E.... .3{..{C.....V..._c...l.Lp.._}....f?..V...v*.e)M.j....3..p#..wNI.E.W...7!...+..O*N.8:&>.......>.......>.......>....(.%..OG.J2.\t.-..Z....r.1.....w.....<....j.E_...sw..u.....^9_."..hWxl}WB..[0.[.fd!....E..... W>.!N..>)Y..@v>..<.}..(..j..:....A1..;..........r=...u..l.z.r.:..Q*.AL..$....A...Y.o..K.'.2..aa/....JX.7g../..E.hW.L.S..m.._...V.'..X.M......o..D.Bx4......d0..`.u ..e.....6..#...4!.T<v......ub...DZ2B.a.R.:...0V..2=.j.;).....+.. ..D.[....I.X}..Y.c...U......!i.z../.<|.,l...B.....Y.!.....G.....Y..9...v...?s5.;&..`u.........M.I... D..f!.1_~....x.[r....(.7J..!.W....C
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):25199
                                  Entropy (8bit):7.963604729903431
                                  Encrypted:false
                                  SSDEEP:768:RIPZQAuCWkDX8jL/o6wAGRrbm0If/ZGnJToRDwdP:iPZQAuFkIX/Hwprb5InZrgP
                                  MD5:AAA4040F506983B519300073770AF82C
                                  SHA1:279E791057AAB875CE65309B3A5212E8F64D3B8F
                                  SHA-256:53B21720617ECED6A172317F5C3289FB027CF4F7E744525FE76F11B97C8B75F8
                                  SHA-512:C6EBF4E2823060B010208A95E8279F3815233D00ECE373564A8C60958511E7B1E25290AE105AF22FB05A7481F2F08E589D01E5BA7DC758C9C0F7BC0CF913B16A
                                  Malicious:false
                                  Reputation:low
                                  Preview:x...S\. Z?...?t..XY#..w.....ZH\@.o..h......A.Z..O.}.2+Of..9. ..C!............g.6{f.l.W./.m..V....4...2......f.L..3...3n>...../..O.......<o...pa>....<a.o.....Q.w..[;.n3.9h..oF.1..o;...k.i..6?4.Y._5....k..~...{..u....I....]....3nf>......O..w.O...\6..............?.g...y.G.i>.4.p..k.....I.....9\....s..+s..4l..d......n.7..]..'@kS.....89.....`.m....r.p.|j..i~.L...).5P..)..;..+..aVt.@v.a.../.;n.....O7.......q.x}.x.<....G.4..>....n....v.....F=...u.7..G0............iV..f ...f.i.ys.....O.T...a..*.!W.G+...n...$..........U={...NO.vxz.y...G....o&>....h..U..-.....h...g0..S>9......|..9<..-.x.....l........|...b..M...<m...+.l....y._.?v...iR..[..,z...W=g...i...?_r....rG(}....<.3.SG9;..p.7...........Y.....o7O.A.......f.X.Sxf.q......2.}..p.[\....F.8..?......t...42....s...wlF....9.........R...~....}...2._.$...g....5.Z.u.3....@8FW...k.@v.....$.. ..7/.O/......$.w....N...I.1.@.1;.......a).o...uI>.'Q?3.=C?5./@.:u.Xl.w..3.6...;..t............
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):231
                                  Entropy (8bit):7.132795794512945
                                  Encrypted:false
                                  SSDEEP:3:cEnwTIf6hA89prR7r8DeWmXpekmxSX8Qamr4cZ7r11qPNSiilJUs1LU54Vj7E4Du:cEwTZP7MCX0kWSX8BnwtoPAiBj+3NjqB
                                  MD5:003564FA9C1FE73CB6614BC3B9E74600
                                  SHA1:057FD04C67BD9B6DFEA06727BC7E4B000212E510
                                  SHA-256:0FF0C744A42F6E5482DB8096A64B0EBCBF773ED9072DFE13034E46078D5ADB5E
                                  SHA-512:5A89E1663DE2EE62C2B332A2DF268C7AF2106EBE3BB7856D4E0F3497DC9882DD35CB24A4407C5CCF0CADAADB5E343416D4FDD3CBD4FE5DA7F4A801B4A143558A
                                  Malicious:false
                                  Reputation:low
                                  Preview:x.e..j.0......I49x.)-.HwoK.a...5.'.....[..^...........qy..g=].e.&.q.:....lg.{......&A... 5........>..d..V....]y...4,#I.9.P1"..I.V..\$..P:.i...t..Ne.q.N.H.z.l..3.......|....Lw..M....:<xT.h.5.o..]....n.........8..Y...?w.
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):172665
                                  Entropy (8bit):7.996742454214979
                                  Encrypted:true
                                  SSDEEP:3072:u7G7ZCwwihoXGn/m9DOIMur+RxHs7qTRPb4Gp5+tImtejdw7rjKjjAet7i9s4D9:mG75wcg+mOeiRxHs7kRPb4GHbjdwPktO
                                  MD5:2F64B1032E9CFBA2006039B4DC3AA426
                                  SHA1:581231CD07B65F8E4061E0058B83ADCB1082B19F
                                  SHA-256:8845ABE6F203643E8E5D21FB4F6C68AE27488ECF063AD4F28EEDC199EDE6FEDB
                                  SHA-512:010831946CFAC2D4E74CDC1019F6079BB7E840A3DBB6B16BEBDBDF37D2059F773D65AAD64443D160F2578771620B788C64281D235F383061F43FF9060787E88C
                                  Malicious:false
                                  Reputation:low
                                  Preview:x.\.q\..u?......B/6.._..\.W.4.@#U.N.R....L.:.Cf....g.a..g.q.5.XC.%.X...k.Z.h....-..............u...>..9.....{....Fd....1.i........*.^..:3...r...6.s..Q]...]]TP..VPtGYTP..GU.U.z2..8nmckG..."S...&.g..C#.]=..n...........Gr....H.......c""#.6}..+...........hgWVd#..c..Y.xd..A"i.....&..`'p<..f .*.......DEy.....7k'.....-....g........3...R*..%\..d0q..I..m...RW{.'2...7U...{..v...?.F......c..[~...X..tu.%.Ygz..L7....q8..fow{u.rozNuzz...U......gXz~.nqggv.v.Fwa..g.a...n.r.&..k............]..RaA...=S].a....M..kYD.....H .d.......e.E.....B$.......A.FHJM.$....3.KsJ...........#..B*6.J.j.=K......&.ca.|.[...D...V7.YV"..Q.......E.+.W.../.9..,..<....i...C.P.....f.E..Jz.--.bu.To..W.....xH...>!.3.M].Y.2..tj.&.g.....0b.wV%....{F.V.f6..u....$....}.r.x{..S8......+.......f......R^3.).&.}..60;[1`..0..M..\M'xpf. R-.ok............./_..#>]?.zKFlf....S..#K".M..k".\.eo..l....I...nge....x[\jB\.>...9...s..Up.........l'..?C!....#R...E".h.(...4.JJ.Y.jb.Ls.1.....o......\*.!N...K.
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):256161
                                  Entropy (8bit):7.990565238629863
                                  Encrypted:true
                                  SSDEEP:6144:oIBXRBD/TYBYIqR8qJWDW9z4+xbOSc22vts3VlP2U4tS9s1:h/GZDWG+xba22vUtTk
                                  MD5:7E3602D08B22DEBF43E6258B02696F95
                                  SHA1:8748ED67FACB6377DF485D00E10882AB6B7A6528
                                  SHA-256:A95F7068FC5F6168DABC0AB9CACC158B7E93077889B52236BC6B117D35E32157
                                  SHA-512:3CECC3934F4B62482DBB7309A0F708B29D0B80539A9311BCD325CB62FAB3A8E560079D0A4E3F23745486B41EF6AE365064D3353487BAA9F9E7630BBB156811CB
                                  Malicious:false
                                  Reputation:low
                                  Preview:x..eP....;...3.K..ww.ww...%.......;..n........s.......Su..o._...Vw..U.T...H.....z}......$...4........>E..2E.c..I....................+..+...6...6......UC}...f..../.BJQ...G....c.HE..P..B.....P.......>.+..E......>.(....w-".....S....OF..b..."..S...._...,.0.@....$....{[..ZL.......HF...........A....o..?....o.,0...)......O...? .a............0.x.S..."....j...._.............}k.d.U...C..S.{xzX...O....8.....O...;.....=.....O....F....@J2#N......j.3.9.^.|..1x...O.Qn...)..V.....*.c.....T_..N........Zl-A.X.....N.....#?H..qg...A..........MhiA...h'.i.I.O...._..m..xG..WDI....3+`f.s.W.y...[Xlr..K\......."H .'N..R.v...z...B.Y.6..)....}..*mD?....XV..*L.....F..R..9..._.\..i..r.%.D....!+.#..(...SL..,..4U..x...._.K...;.<..P..1I...@..7.......1..,.B...{...j...W..f..S..!>'X......a.#.HD..@a.........jh.{.D.g..V~....MC....A.......f....wR.k..j.^{.&%.N.K.s...0.%0..'n.}.....Q7....$.#.P......|...)w...CK....$...M...,...o8b..X..T0. .....=y.........6D@.Yj..l...}....Pa.~0..zcc.........L.|....
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):51235
                                  Entropy (8bit):7.991380565803357
                                  Encrypted:true
                                  SSDEEP:1536:orrmXs49qNUA7gwZwi4wVZ4gq0UnOsf1raUXlI:orSVqtzdGhn1f1plI
                                  MD5:D718690B4D422351AFAAD30FB5005958
                                  SHA1:F2405024C9F0C8B8EC8680D36B76F2A2FE1EFF50
                                  SHA-256:9B94B54057CC73F36F8193DF3CC5AF0D0980CF94A5E3F102A1D652D9B35EA0A4
                                  SHA-512:6C4D324C654649DF9B6B427F3FD90EB28A6121F84574A78E87DB2C8B9421DA19C84DA6A94FB0814D46F023C4D395E010BD5C6974C82C911E154E413C910C6DD3
                                  Malicious:false
                                  Reputation:low
                                  Preview:x..{|...0>..M6!.Y ....A.A..K...$.....EDA.FcTTLv..*.&-.q-.j.[....jm..*..$..p. ..*^.uA.`..y..93...m...>......9s..9.9..<...V.fA.,.i.. ........_..i.;...4..mcfV.W.ZP...w>.......U...u.C....\.>|.=...).z..r...j.......7_HW...j.\......|.]Oo....nN..)....Bs:....t..*....D....U.\0K1.:.q..dA...^.i.......I......?B.*..h.....).F!......r..7..I(...N..O....2..0...?..|.....Y........3.K../...N..P}..S......W../...K.g......./[.3R......}..^V]S]..4&06B:\...........ml.R5.'.MA.&........,9p8Kf.5.MB..v.....7.Ref}....F....,.C...Y].....p..!.J.I......s3....LY..2......<.....O.C..3....;/K......v.MP....r.g..*.R7V.es.7.l.M.Hr...^..)....k,57..m...F.S...~p..i.^....I....-PZb.F.'.*h.m...#3..!...U.B..%.!.m..o..i......e.kee..l}4Sl....L.[`.o..,.[=.9.h..f...).%.g3W...ZY.......~].+.?f..wu.G\-...%.....5\p`.O..7.O|!.6...Mr..&.EM2kS.....d..P....Jh.M.Y.3.d....9.i..,..j/.Z..!b&0.!0"...Gi..xJi}....d....Up.&$-.#}a._.L....O.O...8..C.$%TG.....,..=<+.....x...WI.&%..\.cA%.PB.n,.o\|5N.b*
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):116078
                                  Entropy (8bit):7.995244675708865
                                  Encrypted:true
                                  SSDEEP:3072:vEEw9tYANVpotzJ54OFxPmkwhaavfdf2Uog+6neZt:8pHdNMtzJ5TFYkqaavfdf2+RU
                                  MD5:B744F334A4DB8788A3EEB1430CF48D98
                                  SHA1:3778F36A74AFC672B2D85E2CAAC61F6981B5A9AE
                                  SHA-256:E0C3583CDA9929EFE92454F87365F56177F11DE88097261ED60D440FC5A16DE2
                                  SHA-512:596C086BCAA0CCC0F6D4AE65BF49FF8120650D6C8C7766D265BE564520398B9AB29795BBA46D6936D036B44166F8E8EE4F4363399299225C494C9E29F28F2358
                                  Malicious:false
                                  Reputation:low
                                  Preview:x....S.(~....L.d ..F.2(:........%m2.....m.....*....9sH.^.={......-}.VT....e.......6p.'.T.:J.H.k..Or..h...}?.?.Hr.....k...k.....M.E...>. ...."....3..W....q.n.7.\.|`..U....{.v}..o|.!....*.....p-............]..fNy.?..?.k.....w./...Da'...o.....G.*......T.mz.kA......e.1.*.-....0.....6...6T.....?.<..+l..4..'e..\...E.a&U."$..."..I.3.~w............4z...}.BX...B..E.... .3{..{C.....V..._c...l.Lp.._}....f?..V...v*.e)M.j....3..p#..wNI.E.W...7!...+..O*N.8:&>.......>.......>.......>....(.%..OG.J2.\t.-..Z....r.1.....w.....<....j.E_...sw..u.....^9_."..hWxl}WB..[0.[.fd!....E..... W>.!N..>)Y..@v>..<.}..(..j..:....A1..;..........r=...u..l.z.r.:..Q*.AL..$....A...Y.o..K.'.2..aa/....JX.7g../..E.hW.L.S..m.._...V.'..X.M......o..D.Bx4......d0..`.u ..e.....6..#...4!.T<v......ub...DZ2B.a.R.:...0V..2=.j.;).....+.. ..D.[....I.X}..Y.c...U......!i.z../.<|.,l...B.....Y.!.....G.....Y..9...v...?s5.;&..`u.........M.I... D..f!.1_~....x.[r....(.7J..!.W....C
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):25199
                                  Entropy (8bit):7.963604729903431
                                  Encrypted:false
                                  SSDEEP:768:RIPZQAuCWkDX8jL/o6wAGRrbm0If/ZGnJToRDwdP:iPZQAuFkIX/Hwprb5InZrgP
                                  MD5:AAA4040F506983B519300073770AF82C
                                  SHA1:279E791057AAB875CE65309B3A5212E8F64D3B8F
                                  SHA-256:53B21720617ECED6A172317F5C3289FB027CF4F7E744525FE76F11B97C8B75F8
                                  SHA-512:C6EBF4E2823060B010208A95E8279F3815233D00ECE373564A8C60958511E7B1E25290AE105AF22FB05A7481F2F08E589D01E5BA7DC758C9C0F7BC0CF913B16A
                                  Malicious:false
                                  Reputation:low
                                  Preview:x...S\. Z?...?t..XY#..w.....ZH\@.o..h......A.Z..O.}.2+Of..9. ..C!............g.6{f.l.W./.m..V....4...2......f.L..3...3n>...../..O.......<o...pa>....<a.o.....Q.w..[;.n3.9h..oF.1..o;...k.i..6?4.Y._5....k..~...{..u....I....]....3nf>......O..w.O...\6..............?.g...y.G.i>.4.p..k.....I.....9\....s..+s..4l..d......n.7..]..'@kS.....89.....`.m....r.p.|j..i~.L...).5P..)..;..+..aVt.@v.a.../.;n.....O7.......q.x}.x.<....G.4..>....n....v.....F=...u.7..G0............iV..f ...f.i.ys.....O.T...a..*.!W.G+...n...$..........U={...NO.vxz.y...G....o&>....h..U..-.....h...g0..S>9......|..9<..-.x.....l........|...b..M...<m...+.l....y._.?v...iR..[..,z...W=g...i...?_r....rG(}....<.3.SG9;..p.7...........Y.....o7O.A.......f.X.Sxf.q......2.}..p.[\....F.8..?......t...42....s...wlF....9.........R...~....}...2._.$...g....5.Z.u.3....@8FW...k.@v.....$.. ..7/.O/......$.w....N...I.1.@.1;.......a).o...uI>.'Q?3.=C?5./@.:u.Xl.w..3.6...;..t............
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):231
                                  Entropy (8bit):7.132795794512945
                                  Encrypted:false
                                  SSDEEP:3:cEnwTIf6hA89prR7r8DeWmXpekmxSX8Qamr4cZ7r11qPNSiilJUs1LU54Vj7E4Du:cEwTZP7MCX0kWSX8BnwtoPAiBj+3NjqB
                                  MD5:003564FA9C1FE73CB6614BC3B9E74600
                                  SHA1:057FD04C67BD9B6DFEA06727BC7E4B000212E510
                                  SHA-256:0FF0C744A42F6E5482DB8096A64B0EBCBF773ED9072DFE13034E46078D5ADB5E
                                  SHA-512:5A89E1663DE2EE62C2B332A2DF268C7AF2106EBE3BB7856D4E0F3497DC9882DD35CB24A4407C5CCF0CADAADB5E343416D4FDD3CBD4FE5DA7F4A801B4A143558A
                                  Malicious:false
                                  Reputation:low
                                  Preview:x.e..j.0......I49x.)-.HwoK.a...5.'.....[..^...........qy..g=].e.&.q.:....lg.{......&A... 5........>..d..V....]y...4,#I.9.P1"..I.V..\$..P:.i...t..Ne.q.N.H.z.l..3.......|....Lw..M....:<xT.h.5.o..]....n.........8..Y...?w.
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):172665
                                  Entropy (8bit):7.996742454214979
                                  Encrypted:true
                                  SSDEEP:3072:u7G7ZCwwihoXGn/m9DOIMur+RxHs7qTRPb4Gp5+tImtejdw7rjKjjAet7i9s4D9:mG75wcg+mOeiRxHs7kRPb4GHbjdwPktO
                                  MD5:2F64B1032E9CFBA2006039B4DC3AA426
                                  SHA1:581231CD07B65F8E4061E0058B83ADCB1082B19F
                                  SHA-256:8845ABE6F203643E8E5D21FB4F6C68AE27488ECF063AD4F28EEDC199EDE6FEDB
                                  SHA-512:010831946CFAC2D4E74CDC1019F6079BB7E840A3DBB6B16BEBDBDF37D2059F773D65AAD64443D160F2578771620B788C64281D235F383061F43FF9060787E88C
                                  Malicious:false
                                  Reputation:low
                                  Preview:x.\.q\..u?......B/6.._..\.W.4.@#U.N.R....L.:.Cf....g.a..g.q.5.XC.%.X...k.Z.h....-..............u...>..9.....{....Fd....1.i........*.^..:3...r...6.s..Q]...]]TP..VPtGYTP..GU.U.z2..8nmckG..."S...&.g..C#.]=..n...........Gr....H.......c""#.6}..+...........hgWVd#..c..Y.xd..A"i.....&..`'p<..f .*.......DEy.....7k'.....-....g........3...R*..%\..d0q..I..m...RW{.'2...7U...{..v...?.F......c..[~...X..tu.%.Ygz..L7....q8..fow{u.rozNuzz...U......gXz~.nqggv.v.Fwa..g.a...n.r.&..k............]..RaA...=S].a....M..kYD.....H .d.......e.E.....B$.......A.FHJM.$....3.KsJ...........#..B*6.J.j.=K......&.ca.|.[...D...V7.YV"..Q.......E.+.W.../.9..,..<....i...C.P.....f.E..Jz.--.bu.To..W.....xH...>!.3.M].Y.2..tj.&.g.....0b.wV%....{F.V.f6..u....$....}.r.x{..S8......+.......f......R^3.).&.}..60;[1`..0..M..\M'xpf. R-.ok............./_..#>]?.zKFlf....S..#K".M..k".\.eo..l....I...nge....x[\jB\.>...9...s..Up.........l'..?C!....#R...E".h.(...4.JJ.Y.jb.Ls.1.....o......\*.!N...K.
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):256161
                                  Entropy (8bit):7.990565238629863
                                  Encrypted:true
                                  SSDEEP:6144:oIBXRBD/TYBYIqR8qJWDW9z4+xbOSc22vts3VlP2U4tS9s1:h/GZDWG+xba22vUtTk
                                  MD5:7E3602D08B22DEBF43E6258B02696F95
                                  SHA1:8748ED67FACB6377DF485D00E10882AB6B7A6528
                                  SHA-256:A95F7068FC5F6168DABC0AB9CACC158B7E93077889B52236BC6B117D35E32157
                                  SHA-512:3CECC3934F4B62482DBB7309A0F708B29D0B80539A9311BCD325CB62FAB3A8E560079D0A4E3F23745486B41EF6AE365064D3353487BAA9F9E7630BBB156811CB
                                  Malicious:false
                                  Reputation:low
                                  Preview:x..eP....;...3.K..ww.ww...%.......;..n........s.......Su..o._...Vw..U.T...H.....z}......$...4........>E..2E.c..I....................+..+...6...6......UC}...f..../.BJQ...G....c.HE..P..B.....P.......>.+..E......>.(....w-".....S....OF..b..."..S...._...,.0.@....$....{[..ZL.......HF...........A....o..?....o.,0...)......O...? .a............0.x.S..."....j...._.............}k.d.U...C..S.{xzX...O....8.....O...;.....=.....O....F....@J2#N......j.3.9.^.|..1x...O.Qn...)..V.....*.c.....T_..N........Zl-A.X.....N.....#?H..qg...A..........MhiA...h'.i.I.O...._..m..xG..WDI....3+`f.s.W.y...[Xlr..K\......."H .'N..R.v...z...B.Y.6..)....}..*mD?....XV..*L.....F..R..9..._.\..i..r.%.D....!+.#..(...SL..,..4U..x...._.K...;.<..P..1I...@..7.......1..,.B...{...j...W..f..S..!>'X......a.#.HD..@a.........jh.{.D.g..V~....MC....A.......f....wR.k..j.^{.&%.N.K.s...0.%0..'n.}.....Q7....$.#.P......|...)w...CK....$...M...,...o8b..X..T0. .....=y.........6D@.Yj..l...}....Pa.~0..zcc.........L.|....
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):51235
                                  Entropy (8bit):7.991380565803357
                                  Encrypted:true
                                  SSDEEP:1536:orrmXs49qNUA7gwZwi4wVZ4gq0UnOsf1raUXlI:orSVqtzdGhn1f1plI
                                  MD5:D718690B4D422351AFAAD30FB5005958
                                  SHA1:F2405024C9F0C8B8EC8680D36B76F2A2FE1EFF50
                                  SHA-256:9B94B54057CC73F36F8193DF3CC5AF0D0980CF94A5E3F102A1D652D9B35EA0A4
                                  SHA-512:6C4D324C654649DF9B6B427F3FD90EB28A6121F84574A78E87DB2C8B9421DA19C84DA6A94FB0814D46F023C4D395E010BD5C6974C82C911E154E413C910C6DD3
                                  Malicious:false
                                  Reputation:low
                                  Preview:x..{|...0>..M6!.Y ....A.A..K...$.....EDA.FcTTLv..*.&-.q-.j.[....jm..*..$..p. ..*^.uA.`..y..93...m...>......9s..9.9..<...V.fA.,.i.. ........_..i.;...4..mcfV.W.ZP...w>.......U...u.C....\.>|.=...).z..r...j.......7_HW...j.\......|.]Oo....nN..)....Bs:....t..*....D....U.\0K1.:.q..dA...^.i.......I......?B.*..h.....).F!......r..7..I(...N..O....2..0...?..|.....Y........3.K../...N..P}..S......W../...K.g......./[.3R......}..^V]S]..4&06B:\...........ml.R5.'.MA.&........,9p8Kf.5.MB..v.....7.Ref}....F....,.C...Y].....p..!.J.I......s3....LY..2......<.....O.C..3....;/K......v.MP....r.g..*.R7V.es.7.l.M.Hr...^..)....k,57..m...F.S...~p..i.^....I....-PZb.F.'.*h.m...#3..!...U.B..%.!.m..o..i......e.kee..l}4Sl....L.[`.o..,.[=.9.h..f...).%.g3W...ZY.......~].+.?f..wu.G\-...%.....5\p`.O..7.O|!.6...Mr..&.EM2kS.....d..P....Jh.M.Y.3.d....9.i..,..j/.Z..!b&0.!0"...Gi..xJi}....d....Up.&$-.#}a._.L....O.O...8..C.$%TG.....,..=<+.....x...WI.&%..\.cA%.PB.n,.o\|5N.b*
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):116078
                                  Entropy (8bit):7.995244675708865
                                  Encrypted:true
                                  SSDEEP:3072:vEEw9tYANVpotzJ54OFxPmkwhaavfdf2Uog+6neZt:8pHdNMtzJ5TFYkqaavfdf2+RU
                                  MD5:B744F334A4DB8788A3EEB1430CF48D98
                                  SHA1:3778F36A74AFC672B2D85E2CAAC61F6981B5A9AE
                                  SHA-256:E0C3583CDA9929EFE92454F87365F56177F11DE88097261ED60D440FC5A16DE2
                                  SHA-512:596C086BCAA0CCC0F6D4AE65BF49FF8120650D6C8C7766D265BE564520398B9AB29795BBA46D6936D036B44166F8E8EE4F4363399299225C494C9E29F28F2358
                                  Malicious:false
                                  Reputation:low
                                  Preview:x....S.(~....L.d ..F.2(:........%m2.....m.....*....9sH.^.={......-}.VT....e.......6p.'.T.:J.H.k..Or..h...}?.?.Hr.....k...k.....M.E...>. ...."....3..W....q.n.7.\.|`..U....{.v}..o|.!....*.....p-............]..fNy.?..?.k.....w./...Da'...o.....G.*......T.mz.kA......e.1.*.-....0.....6...6T.....?.<..+l..4..'e..\...E.a&U."$..."..I.3.~w............4z...}.BX...B..E.... .3{..{C.....V..._c...l.Lp.._}....f?..V...v*.e)M.j....3..p#..wNI.E.W...7!...+..O*N.8:&>.......>.......>.......>....(.%..OG.J2.\t.-..Z....r.1.....w.....<....j.E_...sw..u.....^9_."..hWxl}WB..[0.[.fd!....E..... W>.!N..>)Y..@v>..<.}..(..j..:....A1..;..........r=...u..l.z.r.:..Q*.AL..$....A...Y.o..K.'.2..aa/....JX.7g../..E.hW.L.S..m.._...V.'..X.M......o..D.Bx4......d0..`.u ..e.....6..#...4!.T<v......ub...DZ2B.a.R.:...0V..2=.j.;).....+.. ..D.[....I.X}..Y.c...U......!i.z../.<|.,l...B.....Y.!.....G.....Y..9...v...?s5.;&..`u.........M.I... D..f!.1_~....x.[r....(.7J..!.W....C
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):25199
                                  Entropy (8bit):7.963604729903431
                                  Encrypted:false
                                  SSDEEP:768:RIPZQAuCWkDX8jL/o6wAGRrbm0If/ZGnJToRDwdP:iPZQAuFkIX/Hwprb5InZrgP
                                  MD5:AAA4040F506983B519300073770AF82C
                                  SHA1:279E791057AAB875CE65309B3A5212E8F64D3B8F
                                  SHA-256:53B21720617ECED6A172317F5C3289FB027CF4F7E744525FE76F11B97C8B75F8
                                  SHA-512:C6EBF4E2823060B010208A95E8279F3815233D00ECE373564A8C60958511E7B1E25290AE105AF22FB05A7481F2F08E589D01E5BA7DC758C9C0F7BC0CF913B16A
                                  Malicious:false
                                  Reputation:low
                                  Preview:x...S\. Z?...?t..XY#..w.....ZH\@.o..h......A.Z..O.}.2+Of..9. ..C!............g.6{f.l.W./.m..V....4...2......f.L..3...3n>...../..O.......<o...pa>....<a.o.....Q.w..[;.n3.9h..oF.1..o;...k.i..6?4.Y._5....k..~...{..u....I....]....3nf>......O..w.O...\6..............?.g...y.G.i>.4.p..k.....I.....9\....s..+s..4l..d......n.7..]..'@kS.....89.....`.m....r.p.|j..i~.L...).5P..)..;..+..aVt.@v.a.../.;n.....O7.......q.x}.x.<....G.4..>....n....v.....F=...u.7..G0............iV..f ...f.i.ys.....O.T...a..*.!W.G+...n...$..........U={...NO.vxz.y...G....o&>....h..U..-.....h...g0..S>9......|..9<..-.x.....l........|...b..M...<m...+.l....y._.?v...iR..[..,z...W=g...i...?_r....rG(}....<.3.SG9;..p.7...........Y.....o7O.A.......f.X.Sxf.q......2.}..p.[\....F.8..?......t...42....s...wlF....9.........R...~....}...2._.$...g....5.Z.u.3....@8FW...k.@v.....$.. ..7/.O/......$.w....N...I.1.@.1;.......a).o...uI>.'Q?3.=C?5./@.:u.Xl.w..3.6...;..t............
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):231
                                  Entropy (8bit):7.132795794512945
                                  Encrypted:false
                                  SSDEEP:3:cEnwTIf6hA89prR7r8DeWmXpekmxSX8Qamr4cZ7r11qPNSiilJUs1LU54Vj7E4Du:cEwTZP7MCX0kWSX8BnwtoPAiBj+3NjqB
                                  MD5:003564FA9C1FE73CB6614BC3B9E74600
                                  SHA1:057FD04C67BD9B6DFEA06727BC7E4B000212E510
                                  SHA-256:0FF0C744A42F6E5482DB8096A64B0EBCBF773ED9072DFE13034E46078D5ADB5E
                                  SHA-512:5A89E1663DE2EE62C2B332A2DF268C7AF2106EBE3BB7856D4E0F3497DC9882DD35CB24A4407C5CCF0CADAADB5E343416D4FDD3CBD4FE5DA7F4A801B4A143558A
                                  Malicious:false
                                  Reputation:low
                                  Preview:x.e..j.0......I49x.)-.HwoK.a...5.'.....[..^...........qy..g=].e.&.q.:....lg.{......&A... 5........>..d..V....]y...4,#I.9.P1"..I.V..\$..P:.i...t..Ne.q.N.H.z.l..3.......|....Lw..M....:<xT.h.5.o..]....n.........8..Y...?w.
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):172665
                                  Entropy (8bit):7.996742454214979
                                  Encrypted:true
                                  SSDEEP:3072:u7G7ZCwwihoXGn/m9DOIMur+RxHs7qTRPb4Gp5+tImtejdw7rjKjjAet7i9s4D9:mG75wcg+mOeiRxHs7kRPb4GHbjdwPktO
                                  MD5:2F64B1032E9CFBA2006039B4DC3AA426
                                  SHA1:581231CD07B65F8E4061E0058B83ADCB1082B19F
                                  SHA-256:8845ABE6F203643E8E5D21FB4F6C68AE27488ECF063AD4F28EEDC199EDE6FEDB
                                  SHA-512:010831946CFAC2D4E74CDC1019F6079BB7E840A3DBB6B16BEBDBDF37D2059F773D65AAD64443D160F2578771620B788C64281D235F383061F43FF9060787E88C
                                  Malicious:false
                                  Reputation:low
                                  Preview:x.\.q\..u?......B/6.._..\.W.4.@#U.N.R....L.:.Cf....g.a..g.q.5.XC.%.X...k.Z.h....-..............u...>..9.....{....Fd....1.i........*.^..:3...r...6.s..Q]...]]TP..VPtGYTP..GU.U.z2..8nmckG..."S...&.g..C#.]=..n...........Gr....H.......c""#.6}..+...........hgWVd#..c..Y.xd..A"i.....&..`'p<..f .*.......DEy.....7k'.....-....g........3...R*..%\..d0q..I..m...RW{.'2...7U...{..v...?.F......c..[~...X..tu.%.Ygz..L7....q8..fow{u.rozNuzz...U......gXz~.nqggv.v.Fwa..g.a...n.r.&..k............]..RaA...=S].a....M..kYD.....H .d.......e.E.....B$.......A.FHJM.$....3.KsJ...........#..B*6.J.j.=K......&.ca.|.[...D...V7.YV"..Q.......E.+.W.../.9..,..<....i...C.P.....f.E..Jz.--.bu.To..W.....xH...>!.3.M].Y.2..tj.&.g.....0b.wV%....{F.V.f6..u....$....}.r.x{..S8......+.......f......R^3.).&.}..60;[1`..0..M..\M'xpf. R-.ok............./_..#>]?.zKFlf....S..#K".M..k".\.eo..l....I...nge....x[\jB\.>...9...s..Up.........l'..?C!....#R...E".h.(...4.JJ.Y.jb.Ls.1.....o......\*.!N...K.
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):256161
                                  Entropy (8bit):7.990565238629863
                                  Encrypted:true
                                  SSDEEP:6144:oIBXRBD/TYBYIqR8qJWDW9z4+xbOSc22vts3VlP2U4tS9s1:h/GZDWG+xba22vUtTk
                                  MD5:7E3602D08B22DEBF43E6258B02696F95
                                  SHA1:8748ED67FACB6377DF485D00E10882AB6B7A6528
                                  SHA-256:A95F7068FC5F6168DABC0AB9CACC158B7E93077889B52236BC6B117D35E32157
                                  SHA-512:3CECC3934F4B62482DBB7309A0F708B29D0B80539A9311BCD325CB62FAB3A8E560079D0A4E3F23745486B41EF6AE365064D3353487BAA9F9E7630BBB156811CB
                                  Malicious:false
                                  Reputation:low
                                  Preview:x..eP....;...3.K..ww.ww...%.......;..n........s.......Su..o._...Vw..U.T...H.....z}......$...4........>E..2E.c..I....................+..+...6...6......UC}...f..../.BJQ...G....c.HE..P..B.....P.......>.+..E......>.(....w-".....S....OF..b..."..S...._...,.0.@....$....{[..ZL.......HF...........A....o..?....o.,0...)......O...? .a............0.x.S..."....j...._.............}k.d.U...C..S.{xzX...O....8.....O...;.....=.....O....F....@J2#N......j.3.9.^.|..1x...O.Qn...)..V.....*.c.....T_..N........Zl-A.X.....N.....#?H..qg...A..........MhiA...h'.i.I.O...._..m..xG..WDI....3+`f.s.W.y...[Xlr..K\......."H .'N..R.v...z...B.Y.6..)....}..*mD?....XV..*L.....F..R..9..._.\..i..r.%.D....!+.#..(...SL..,..4U..x...._.K...;.<..P..1I...@..7.......1..,.B...{...j...W..f..S..!>'X......a.#.HD..@a.........jh.{.D.g..V~....MC....A.......f....wR.k..j.^{.&%.N.K.s...0.%0..'n.}.....Q7....$.#.P......|...)w...CK....$...M...,...o8b..X..T0. .....=y.........6D@.Yj..l...}....Pa.~0..zcc.........L.|....
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):51235
                                  Entropy (8bit):7.991380565803357
                                  Encrypted:true
                                  SSDEEP:1536:orrmXs49qNUA7gwZwi4wVZ4gq0UnOsf1raUXlI:orSVqtzdGhn1f1plI
                                  MD5:D718690B4D422351AFAAD30FB5005958
                                  SHA1:F2405024C9F0C8B8EC8680D36B76F2A2FE1EFF50
                                  SHA-256:9B94B54057CC73F36F8193DF3CC5AF0D0980CF94A5E3F102A1D652D9B35EA0A4
                                  SHA-512:6C4D324C654649DF9B6B427F3FD90EB28A6121F84574A78E87DB2C8B9421DA19C84DA6A94FB0814D46F023C4D395E010BD5C6974C82C911E154E413C910C6DD3
                                  Malicious:false
                                  Reputation:low
                                  Preview:x..{|...0>..M6!.Y ....A.A..K...$.....EDA.FcTTLv..*.&-.q-.j.[....jm..*..$..p. ..*^.uA.`..y..93...m...>......9s..9.9..<...V.fA.,.i.. ........_..i.;...4..mcfV.W.ZP...w>.......U...u.C....\.>|.=...).z..r...j.......7_HW...j.\......|.]Oo....nN..)....Bs:....t..*....D....U.\0K1.:.q..dA...^.i.......I......?B.*..h.....).F!......r..7..I(...N..O....2..0...?..|.....Y........3.K../...N..P}..S......W../...K.g......./[.3R......}..^V]S]..4&06B:\...........ml.R5.'.MA.&........,9p8Kf.5.MB..v.....7.Ref}....F....,.C...Y].....p..!.J.I......s3....LY..2......<.....O.C..3....;/K......v.MP....r.g..*.R7V.es.7.l.M.Hr...^..)....k,57..m...F.S...~p..i.^....I....-PZb.F.'.*h.m...#3..!...U.B..%.!.m..o..i......e.kee..l}4Sl....L.[`.o..,.[=.9.h..f...).%.g3W...ZY.......~].+.?f..wu.G\-...%.....5\p`.O..7.O|!.6...Mr..&.EM2kS.....d..P....Jh.M.Y.3.d....9.i..,..j/.Z..!b&0.!0"...Gi..xJi}....d....Up.&$-.#}a._.L....O.O...8..C.$%TG.....,..=<+.....x...WI.&%..\.cA%.PB.n,.o\|5N.b*
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):116078
                                  Entropy (8bit):7.995244675708865
                                  Encrypted:true
                                  SSDEEP:3072:vEEw9tYANVpotzJ54OFxPmkwhaavfdf2Uog+6neZt:8pHdNMtzJ5TFYkqaavfdf2+RU
                                  MD5:B744F334A4DB8788A3EEB1430CF48D98
                                  SHA1:3778F36A74AFC672B2D85E2CAAC61F6981B5A9AE
                                  SHA-256:E0C3583CDA9929EFE92454F87365F56177F11DE88097261ED60D440FC5A16DE2
                                  SHA-512:596C086BCAA0CCC0F6D4AE65BF49FF8120650D6C8C7766D265BE564520398B9AB29795BBA46D6936D036B44166F8E8EE4F4363399299225C494C9E29F28F2358
                                  Malicious:false
                                  Reputation:low
                                  Preview:x....S.(~....L.d ..F.2(:........%m2.....m.....*....9sH.^.={......-}.VT....e.......6p.'.T.:J.H.k..Or..h...}?.?.Hr.....k...k.....M.E...>. ...."....3..W....q.n.7.\.|`..U....{.v}..o|.!....*.....p-............]..fNy.?..?.k.....w./...Da'...o.....G.*......T.mz.kA......e.1.*.-....0.....6...6T.....?.<..+l..4..'e..\...E.a&U."$..."..I.3.~w............4z...}.BX...B..E.... .3{..{C.....V..._c...l.Lp.._}....f?..V...v*.e)M.j....3..p#..wNI.E.W...7!...+..O*N.8:&>.......>.......>.......>....(.%..OG.J2.\t.-..Z....r.1.....w.....<....j.E_...sw..u.....^9_."..hWxl}WB..[0.[.fd!....E..... W>.!N..>)Y..@v>..<.}..(..j..:....A1..;..........r=...u..l.z.r.:..Q*.AL..$....A...Y.o..K.'.2..aa/....JX.7g../..E.hW.L.S..m.._...V.'..X.M......o..D.Bx4......d0..`.u ..e.....6..#...4!.T<v......ub...DZ2B.a.R.:...0V..2=.j.;).....+.. ..D.[....I.X}..Y.c...U......!i.z../.<|.,l...B.....Y.!.....G.....Y..9...v...?s5.;&..`u.........M.I... D..f!.1_~....x.[r....(.7J..!.W....C
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):25199
                                  Entropy (8bit):7.963604729903431
                                  Encrypted:false
                                  SSDEEP:768:RIPZQAuCWkDX8jL/o6wAGRrbm0If/ZGnJToRDwdP:iPZQAuFkIX/Hwprb5InZrgP
                                  MD5:AAA4040F506983B519300073770AF82C
                                  SHA1:279E791057AAB875CE65309B3A5212E8F64D3B8F
                                  SHA-256:53B21720617ECED6A172317F5C3289FB027CF4F7E744525FE76F11B97C8B75F8
                                  SHA-512:C6EBF4E2823060B010208A95E8279F3815233D00ECE373564A8C60958511E7B1E25290AE105AF22FB05A7481F2F08E589D01E5BA7DC758C9C0F7BC0CF913B16A
                                  Malicious:false
                                  Reputation:low
                                  Preview:x...S\. Z?...?t..XY#..w.....ZH\@.o..h......A.Z..O.}.2+Of..9. ..C!............g.6{f.l.W./.m..V....4...2......f.L..3...3n>...../..O.......<o...pa>....<a.o.....Q.w..[;.n3.9h..oF.1..o;...k.i..6?4.Y._5....k..~...{..u....I....]....3nf>......O..w.O...\6..............?.g...y.G.i>.4.p..k.....I.....9\....s..+s..4l..d......n.7..]..'@kS.....89.....`.m....r.p.|j..i~.L...).5P..)..;..+..aVt.@v.a.../.;n.....O7.......q.x}.x.<....G.4..>....n....v.....F=...u.7..G0............iV..f ...f.i.ys.....O.T...a..*.!W.G+...n...$..........U={...NO.vxz.y...G....o&>....h..U..-.....h...g0..S>9......|..9<..-.x.....l........|...b..M...<m...+.l....y._.?v...iR..[..,z...W=g...i...?_r....rG(}....<.3.SG9;..p.7...........Y.....o7O.A.......f.X.Sxf.q......2.}..p.[\....F.8..?......t...42....s...wlF....9.........R...~....}...2._.$...g....5.Z.u.3....@8FW...k.@v.....$.. ..7/.O/......$.w....N...I.1.@.1;.......a).o...uI>.'Q?3.=C?5./@.:u.Xl.w..3.6...;..t............
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):231
                                  Entropy (8bit):7.132795794512945
                                  Encrypted:false
                                  SSDEEP:3:cEnwTIf6hA89prR7r8DeWmXpekmxSX8Qamr4cZ7r11qPNSiilJUs1LU54Vj7E4Du:cEwTZP7MCX0kWSX8BnwtoPAiBj+3NjqB
                                  MD5:003564FA9C1FE73CB6614BC3B9E74600
                                  SHA1:057FD04C67BD9B6DFEA06727BC7E4B000212E510
                                  SHA-256:0FF0C744A42F6E5482DB8096A64B0EBCBF773ED9072DFE13034E46078D5ADB5E
                                  SHA-512:5A89E1663DE2EE62C2B332A2DF268C7AF2106EBE3BB7856D4E0F3497DC9882DD35CB24A4407C5CCF0CADAADB5E343416D4FDD3CBD4FE5DA7F4A801B4A143558A
                                  Malicious:false
                                  Reputation:low
                                  Preview:x.e..j.0......I49x.)-.HwoK.a...5.'.....[..^...........qy..g=].e.&.q.:....lg.{......&A... 5........>..d..V....]y...4,#I.9.P1"..I.V..\$..P:.i...t..Ne.q.N.H.z.l..3.......|....Lw..M....:<xT.h.5.o..]....n.........8..Y...?w.
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):172665
                                  Entropy (8bit):7.996742454214979
                                  Encrypted:true
                                  SSDEEP:3072:u7G7ZCwwihoXGn/m9DOIMur+RxHs7qTRPb4Gp5+tImtejdw7rjKjjAet7i9s4D9:mG75wcg+mOeiRxHs7kRPb4GHbjdwPktO
                                  MD5:2F64B1032E9CFBA2006039B4DC3AA426
                                  SHA1:581231CD07B65F8E4061E0058B83ADCB1082B19F
                                  SHA-256:8845ABE6F203643E8E5D21FB4F6C68AE27488ECF063AD4F28EEDC199EDE6FEDB
                                  SHA-512:010831946CFAC2D4E74CDC1019F6079BB7E840A3DBB6B16BEBDBDF37D2059F773D65AAD64443D160F2578771620B788C64281D235F383061F43FF9060787E88C
                                  Malicious:false
                                  Reputation:low
                                  Preview:x.\.q\..u?......B/6.._..\.W.4.@#U.N.R....L.:.Cf....g.a..g.q.5.XC.%.X...k.Z.h....-..............u...>..9.....{....Fd....1.i........*.^..:3...r...6.s..Q]...]]TP..VPtGYTP..GU.U.z2..8nmckG..."S...&.g..C#.]=..n...........Gr....H.......c""#.6}..+...........hgWVd#..c..Y.xd..A"i.....&..`'p<..f .*.......DEy.....7k'.....-....g........3...R*..%\..d0q..I..m...RW{.'2...7U...{..v...?.F......c..[~...X..tu.%.Ygz..L7....q8..fow{u.rozNuzz...U......gXz~.nqggv.v.Fwa..g.a...n.r.&..k............]..RaA...=S].a....M..kYD.....H .d.......e.E.....B$.......A.FHJM.$....3.KsJ...........#..B*6.J.j.=K......&.ca.|.[...D...V7.YV"..Q.......E.+.W.../.9..,..<....i...C.P.....f.E..Jz.--.bu.To..W.....xH...>!.3.M].Y.2..tj.&.g.....0b.wV%....{F.V.f6..u....$....}.r.x{..S8......+.......f......R^3.).&.}..60;[1`..0..M..\M'xpf. R-.ok............./_..#>]?.zKFlf....S..#K".M..k".\.eo..l....I...nge....x[\jB\.>...9...s..Up.........l'..?C!....#R...E".h.(...4.JJ.Y.jb.Ls.1.....o......\*.!N...K.
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):256161
                                  Entropy (8bit):7.990565238629863
                                  Encrypted:true
                                  SSDEEP:6144:oIBXRBD/TYBYIqR8qJWDW9z4+xbOSc22vts3VlP2U4tS9s1:h/GZDWG+xba22vUtTk
                                  MD5:7E3602D08B22DEBF43E6258B02696F95
                                  SHA1:8748ED67FACB6377DF485D00E10882AB6B7A6528
                                  SHA-256:A95F7068FC5F6168DABC0AB9CACC158B7E93077889B52236BC6B117D35E32157
                                  SHA-512:3CECC3934F4B62482DBB7309A0F708B29D0B80539A9311BCD325CB62FAB3A8E560079D0A4E3F23745486B41EF6AE365064D3353487BAA9F9E7630BBB156811CB
                                  Malicious:false
                                  Reputation:low
                                  Preview:x..eP....;...3.K..ww.ww...%.......;..n........s.......Su..o._...Vw..U.T...H.....z}......$...4........>E..2E.c..I....................+..+...6...6......UC}...f..../.BJQ...G....c.HE..P..B.....P.......>.+..E......>.(....w-".....S....OF..b..."..S...._...,.0.@....$....{[..ZL.......HF...........A....o..?....o.,0...)......O...? .a............0.x.S..."....j...._.............}k.d.U...C..S.{xzX...O....8.....O...;.....=.....O....F....@J2#N......j.3.9.^.|..1x...O.Qn...)..V.....*.c.....T_..N........Zl-A.X.....N.....#?H..qg...A..........MhiA...h'.i.I.O...._..m..xG..WDI....3+`f.s.W.y...[Xlr..K\......."H .'N..R.v...z...B.Y.6..)....}..*mD?....XV..*L.....F..R..9..._.\..i..r.%.D....!+.#..(...SL..,..4U..x...._.K...;.<..P..1I...@..7.......1..,.B...{...j...W..f..S..!>'X......a.#.HD..@a.........jh.{.D.g..V~....MC....A.......f....wR.k..j.^{.&%.N.K.s...0.%0..'n.}.....Q7....$.#.P......|...)w...CK....$...M...,...o8b..X..T0. .....=y.........6D@.Yj..l...}....Pa.~0..zcc.........L.|....
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):51235
                                  Entropy (8bit):7.991380565803357
                                  Encrypted:true
                                  SSDEEP:1536:orrmXs49qNUA7gwZwi4wVZ4gq0UnOsf1raUXlI:orSVqtzdGhn1f1plI
                                  MD5:D718690B4D422351AFAAD30FB5005958
                                  SHA1:F2405024C9F0C8B8EC8680D36B76F2A2FE1EFF50
                                  SHA-256:9B94B54057CC73F36F8193DF3CC5AF0D0980CF94A5E3F102A1D652D9B35EA0A4
                                  SHA-512:6C4D324C654649DF9B6B427F3FD90EB28A6121F84574A78E87DB2C8B9421DA19C84DA6A94FB0814D46F023C4D395E010BD5C6974C82C911E154E413C910C6DD3
                                  Malicious:false
                                  Reputation:low
                                  Preview:x..{|...0>..M6!.Y ....A.A..K...$.....EDA.FcTTLv..*.&-.q-.j.[....jm..*..$..p. ..*^.uA.`..y..93...m...>......9s..9.9..<...V.fA.,.i.. ........_..i.;...4..mcfV.W.ZP...w>.......U...u.C....\.>|.=...).z..r...j.......7_HW...j.\......|.]Oo....nN..)....Bs:....t..*....D....U.\0K1.:.q..dA...^.i.......I......?B.*..h.....).F!......r..7..I(...N..O....2..0...?..|.....Y........3.K../...N..P}..S......W../...K.g......./[.3R......}..^V]S]..4&06B:\...........ml.R5.'.MA.&........,9p8Kf.5.MB..v.....7.Ref}....F....,.C...Y].....p..!.J.I......s3....LY..2......<.....O.C..3....;/K......v.MP....r.g..*.R7V.es.7.l.M.Hr...^..)....k,57..m...F.S...~p..i.^....I....-PZb.F.'.*h.m...#3..!...U.B..%.!.m..o..i......e.kee..l}4Sl....L.[`.o..,.[=.9.h..f...).%.g3W...ZY.......~].+.?f..wu.G\-...%.....5\p`.O..7.O|!.6...Mr..&.EM2kS.....d..P....Jh.M.Y.3.d....9.i..,..j/.Z..!b&0.!0"...Gi..xJi}....d....Up.&$-.#}a._.L....O.O...8..C.$%TG.....,..=<+.....x...WI.&%..\.cA%.PB.n,.o\|5N.b*
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):116078
                                  Entropy (8bit):7.995244675708865
                                  Encrypted:true
                                  SSDEEP:3072:vEEw9tYANVpotzJ54OFxPmkwhaavfdf2Uog+6neZt:8pHdNMtzJ5TFYkqaavfdf2+RU
                                  MD5:B744F334A4DB8788A3EEB1430CF48D98
                                  SHA1:3778F36A74AFC672B2D85E2CAAC61F6981B5A9AE
                                  SHA-256:E0C3583CDA9929EFE92454F87365F56177F11DE88097261ED60D440FC5A16DE2
                                  SHA-512:596C086BCAA0CCC0F6D4AE65BF49FF8120650D6C8C7766D265BE564520398B9AB29795BBA46D6936D036B44166F8E8EE4F4363399299225C494C9E29F28F2358
                                  Malicious:false
                                  Reputation:low
                                  Preview:x....S.(~....L.d ..F.2(:........%m2.....m.....*....9sH.^.={......-}.VT....e.......6p.'.T.:J.H.k..Or..h...}?.?.Hr.....k...k.....M.E...>. ...."....3..W....q.n.7.\.|`..U....{.v}..o|.!....*.....p-............]..fNy.?..?.k.....w./...Da'...o.....G.*......T.mz.kA......e.1.*.-....0.....6...6T.....?.<..+l..4..'e..\...E.a&U."$..."..I.3.~w............4z...}.BX...B..E.... .3{..{C.....V..._c...l.Lp.._}....f?..V...v*.e)M.j....3..p#..wNI.E.W...7!...+..O*N.8:&>.......>.......>.......>....(.%..OG.J2.\t.-..Z....r.1.....w.....<....j.E_...sw..u.....^9_."..hWxl}WB..[0.[.fd!....E..... W>.!N..>)Y..@v>..<.}..(..j..:....A1..;..........r=...u..l.z.r.:..Q*.AL..$....A...Y.o..K.'.2..aa/....JX.7g../..E.hW.L.S..m.._...V.'..X.M......o..D.Bx4......d0..`.u ..e.....6..#...4!.T<v......ub...DZ2B.a.R.:...0V..2=.j.;).....+.. ..D.[....I.X}..Y.c...U......!i.z../.<|.,l...B.....Y.!.....G.....Y..9...v...?s5.;&..`u.........M.I... D..f!.1_~....x.[r....(.7J..!.W....C
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:zlib compressed data
                                  Category:dropped
                                  Size (bytes):25199
                                  Entropy (8bit):7.963604729903431
                                  Encrypted:false
                                  SSDEEP:768:RIPZQAuCWkDX8jL/o6wAGRrbm0If/ZGnJToRDwdP:iPZQAuFkIX/Hwprb5InZrgP
                                  MD5:AAA4040F506983B519300073770AF82C
                                  SHA1:279E791057AAB875CE65309B3A5212E8F64D3B8F
                                  SHA-256:53B21720617ECED6A172317F5C3289FB027CF4F7E744525FE76F11B97C8B75F8
                                  SHA-512:C6EBF4E2823060B010208A95E8279F3815233D00ECE373564A8C60958511E7B1E25290AE105AF22FB05A7481F2F08E589D01E5BA7DC758C9C0F7BC0CF913B16A
                                  Malicious:false
                                  Reputation:low
                                  Preview:x...S\. Z?...?t..XY#..w.....ZH\@.o..h......A.Z..O.}.2+Of..9. ..C!............g.6{f.l.W./.m..V....4...2......f.L..3...3n>...../..O.......<o...pa>....<a.o.....Q.w..[;.n3.9h..oF.1..o;...k.i..6?4.Y._5....k..~...{..u....I....]....3nf>......O..w.O...\6..............?.g...y.G.i>.4.p..k.....I.....9\....s..+s..4l..d......n.7..]..'@kS.....89.....`.m....r.p.|j..i~.L...).5P..)..;..+..aVt.@v.a.../.;n.....O7.......q.x}.x.<....G.4..>....n....v.....F=...u.7..G0............iV..f ...f.i.ys.....O.T...a..*.!W.G+...n...$..........U={...NO.vxz.y...G....o&>....h..U..-.....h...g0..S>9......|..9<..-.x.....l........|...b..M...<m...+.l....y._.?v...iR..[..,z...W=g...i...?_r....rG(}....<.3.SG9;..p.7...........Y.....o7O.A.......f.X.Sxf.q......2.}..p.[\....F.8..?......t...42....s...wlF....9.........R...~....}...2._.$...g....5.Z.u.3....@8FW...k.@v.....$.. ..7/.O/......$.w....N...I.1.@.1;.......a).o...uI>.'Q?3.=C?5./@.:u.Xl.w..3.6...;..t............
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Generic INItialization configuration [Dialog1001]
                                  Category:dropped
                                  Size (bytes):5310
                                  Entropy (8bit):4.906222669572779
                                  Encrypted:false
                                  SSDEEP:96:Kq2orCnavjFYCac5ENA3jOpAWaMd1ZcMeJgocuEaegn:KopxYRcuU2NaM9eJ4aegn
                                  MD5:CFAEC980A3639A6B33704C0DB20CB812
                                  SHA1:E9402B1DEB9293D51EA7A45FF5AEA0F5BFF1EA8F
                                  SHA-256:55023B00E2C2401272D0AD7B4B633814869483B6D939C5D4910E4FF18EEEEE6C
                                  SHA-512:72BB65180098C195EA74C7DACF24500D98BBD872149E4247BDC98B3A12FABD2FD6846A61B7D30E610748D49348C347A1CEC5939276E3A0B30703AEEB591017B2
                                  Malicious:false
                                  Reputation:low
                                  Preview:[Dialog1000]..100=Welcome to the InstallShield Wizard for %s..101=The InstallShield Wizard(TM) will help install %s on your computer. To continue, click Next.....[Dialog1001]..0=License Agreement..1=Please read the following license agreement carefully...121=I &accept the terms in the license agreement..122=I &do not accept the terms in the license agreement....[Dialog1002]..0=Location to Save Files..1=Where would you like to save your files?..101=Please enter the folder where you want these files saved. If the folder does not exist, it will be created for you. To continue, click Next...102=&Save files in folder:..103=&Change.......[Dialog1003]..0=Password..1=This package has been password protected...106=&Password:..107=Enter the password required to run this package. Please note that passwords are case sensitive. Click Next to continue.....[Dialog1004]..0=Overwrite Protection..2=Cancel..109=&Yes..110=&No..111=Y&es to All..112=N&o to All..113=The following file is already on yo
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):26809448
                                  Entropy (8bit):7.998962719618118
                                  Encrypted:true
                                  SSDEEP:786432:anmjSF1eNuJhCBXSUnSyq/Cs6Q9E+q8D9D:ant1ZJoxyBZNT9D
                                  MD5:77423E9942B09AFD564C307B26D1F4BA
                                  SHA1:CFE1F1EFF897421C499112F4AEA136B4C4CC5C2C
                                  SHA-256:38D513221850C422E8EDFBBB65395998857D687A5BB6E2C293A53CFB5FD684EC
                                  SHA-512:FB4326B5053DA4F03A1F4DFA75E4B971F0CF1C0BFA9E0625088CAF9E177DB876350CD029043479C94907F82B7232EC2ABECB922043B6706EB9349B086CEF4DD1
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............l...l...l....u..l....c..l...>d..l.....l...l.%l....t..l....d..l....q..l..Rich.l..........PE..L....UIK.................T...................................................`......<~....@..................................W..x.......HS..............p.... ...:...b..8...........................p...@............... ....O.......................text....S.......T.................. ..`.data...8F...p...,...X..............@....rsrc...HS.......T..................@..@.reloc...:... ...<..................@..B................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: Cable Label Tool 1.0, Comments: ENG, Keywords: Installer,MSI,Database, Subject: Cable Label Tool 1.0, Author: Brother Industries, Ltd., Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2011 - Premier Edition 17, Last Saved Time/Date: Wed Apr 25 15:13:25 2018, Create Time/Date: Wed Apr 25 15:13:25 2018, Last Printed: Wed Apr 25 15:13:25 2018, Revision Number: {359EA332-970F-4A7E-BDB3-23381B02ECBF}, Code page: 1252, Template: Intel;1033
                                  Category:dropped
                                  Size (bytes):41839616
                                  Entropy (8bit):7.973469488021884
                                  Encrypted:false
                                  SSDEEP:786432:hJ0tD7MHWUcim3o9cuRP6TVnlP09obwW3Ap2jGITWIlYtHQBvxr5Tib5vv:hJ0tD7MHMroSuRWnGCBQQjGT2YIvxlk
                                  MD5:EAD26D65A4586D5291A052C0A5582464
                                  SHA1:97BDDEF16FF708128E977F9D5B30D33F0D769A40
                                  SHA-256:E8013C9B6C4D56C34500B93D97358622E365DCB28A63F883F9229B2570BC3D9F
                                  SHA-512:5BC6A71D81D84FDAB5201D0DD1E2F19C2FD83B57E9B8C0D3C2453B1E2B11BE8D274237E4805F299C14A905CB0195DC901875DBDFF3A729CEC4F86C0D49FD6A55
                                  Malicious:false
                                  Reputation:low
                                  Preview:......................>...................................8........6....................................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5...6..........;...............................................................................................................1... ...!..."...#...$...'...&...K...(.......*...+...,...-......./...0...%...2...3...4...5...6...7...>...M...:...<.......=.......?...@...A...B...C...D...E...F...G...H...I...J...N...L...f.......O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...h...g.......i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):889416
                                  Entropy (8bit):7.856409051573377
                                  Encrypted:false
                                  SSDEEP:24576:+tW4x8xAxCdUcyezFSjaBHFaNlsqK5/oh6iZf1LUXw/vxNI:d4x8xqCGexm8FCspg0iZf1LUXD
                                  MD5:53406E9988306CBD4537677C5336ABA4
                                  SHA1:06BECADB92A5FCCA2529C0B93687C2A0C6D0D610
                                  SHA-256:FA1AFFF978325F8818CE3A559D67A58297D9154674DE7FD8EB03656D93104425
                                  SHA-512:4F89DA81B5A3800AA16FF33CC4A42DBB17D4C698A5E2983B88C32738DECB57E3088A1DA444AD0EC0D745C3C6B6B8B9B86D3F19909142F9E51F513748C0274A99
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............}...}...}...,...}......}.......}...//..}.../...}.../...}.......}...}...}...,+..}...,/..}...,...}...,...}...,...}..Rich.}..........................PE..L......J.........."..........^...................@..........................@......a8....@...... ..................@.......D........................z..h.......l....................................V..@............................................text.............................. ..`.data....7..........................@....boxld01............................@..@.rsrc...............................@..@.reloc...(.......*..................@..B................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ISO-8859 text, with very long lines (741), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):8398
                                  Entropy (8bit):4.827478818964157
                                  Encrypted:false
                                  SSDEEP:192:5lOhj3Cg1mLZQqzaezBttQJgUgDbUU9SVuFw6KF:5khT9mB2ezfBs6a
                                  MD5:53C01EF14DC52A8D68AC9AF29AA4936D
                                  SHA1:3F9DFF0ED2A1FC81E0FB04AD01287C31AD739D6B
                                  SHA-256:4AF82D6E4AD75B40ACFE6380747F19CDE70EDF3DB709BB957C8A850D19A883A6
                                  SHA-512:7176F86FD72DE8FA9FE0154B719D7B8F0D397F95DDFCE3830376F0C98444F26C4FA50AA81CA22E97AD0D81CEA6794D215AAE43DDD2BF7337416A3963AF8505AE
                                  Malicious:false
                                  Reputation:low
                                  Preview:......... ..... ........ ....... ....... Brother..-----------------------------------------------....... - .... ....... ...... ... ..... ........:..--------------------------------........... ..... ........ ....... .. ..... ...... .... ("..." .. "........ .......") .... Brother Industries ........ (...... ..... .... ... .."Brother") .... .... ........ ....... Brother ...... ..... ... .. .... ........ .......... ........... ... .. ..... ......... (...... ..... ..... .... ... .."........"). ..... ..... ........ ..... ..... ... .. "......" .. .... ....... ....... ./.. ... ./.. ....... "........". .... ..... ... ........ ...... ..... ....... ..... ........ ....... .... ... ... .. ..... ... .... ...... ....... ..... ........ ....... ... ... ..... Brother .... "........". ..... ..... ..... ..... ....... ...... ... .... ["......"] ...... ..... ..... .... .. ....... ..... ........ ....... ... ...... ..... ..................... ..........---------------------....1. ... ..........----------
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (920), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):21016
                                  Entropy (8bit):3.791579032308075
                                  Encrypted:false
                                  SSDEEP:384:c34VwQJE3edRZ70+d0XyCRe25QALTUYuc6GbA:cowuDsyCgm61
                                  MD5:7C009BE1D786235AE79943832401344C
                                  SHA1:52A91A33985860CD3ED45766CB2B46525FC10B87
                                  SHA-256:03F2DF28CE829AE81F00ABD4B44A69791687C6F6FE538E90FE54D6EE85CD8E09
                                  SHA-512:FCDDA5A720B89A7A8B7D38A8B667E3400400FA142D8C146F3197163962A7E318E4D2E62B57760A48542C114FA97AED96B1D2ABF1AEE495B1E3335DAEB925DA66
                                  Malicious:false
                                  Reputation:low
                                  Preview:..'.*.A.'.B.J.). .*.1...J.5. .'.D.E.3.*.../.E. .'.D.F.G.'.&.J. .D.(.1.F.'.E.,. .B.r.o.t.h.e.r. .........E.G.E. .-. .'.D.1.,.'.!. .'.D.B.1.'.!.). .(.9.F.'.J.).:.........%.F. .'.*.A.'.B.J.). .*.1...J.5. .'.D.E.3.*.../.E. .'.D.F.G.'.&.J. .G.J. .'.*.A.'.B.J.). .B.'.F.H.F.J.). .(.J.F.C. .H.(.J.F. .4.1.C.). .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s. .'.D.E.-./.H./.). .(.".B.r.o.t.h.e.r.".). .H.G.J. .*.-.C.E. .'.3.*.../.'.E.C. .D.(.1.F.'.E.,. .B.r.o.t.h.e.r. .(.J.4.E.D. .#./.D.). .'.D.'.3.*.../.'.E. .'.D.E.1.*.(.7.). .H.'.D.H.+.'.&.B. .'.D.%.D.C.*.1.H.F.J.). .E.+.D. .E.D.A.'.*. .".'.D.E.3.'.9./.).". .H.".'.B.1.#.F.J.".). .(.%.,.E.'.D.'.K. .".S.O.F.T.W.A.R.E.". .(.".'.D.(.1.F.'.E.,.".).). .'.D.0.J. .3.J.*.E. .*.+.(.J.*.G. .9.F./.E.'. .*.6.:.7. .9.D.I. .2.1. .#.H. .*.-././. .E.1.(.9. .A.J. .E.1.(.9. .'.D.-.H.'.1. .G.0.'. .H.'.D.0.J. .J.4.J.1. .%.D.I. .F.J.*.C. .9.D.I. .'.D.E.H.'.A.B.). .(.E.+.D. .2.1. .#.H. .E.1.(.9. .'...*.J.'.1. .J.O.9.1.6. .C.@. .".B.(.H.D.". .#.H. .".E.H.'.A.B.).". .#.H. .".F.9.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ASCII text, with very long lines (831), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):9617
                                  Entropy (8bit):4.882486116465403
                                  Encrypted:false
                                  SSDEEP:192:IEH4Ii3gWxmFSEimGOvD5jnclZ5T2pe6q4hLOb5ns:IE4Ii3gSoievljczjzq
                                  MD5:CDA2A13690AF47214509889267F132AB
                                  SHA1:F54665C9F5862A7F077B7D7CE08301BEAB9D177D
                                  SHA-256:62E904E360D6D698FFF45F90F8F92F2804116971DF2368EF5BEE0613D1F702E1
                                  SHA-512:2BDD9FC617E6CDF13EEE263A994185F53DEAFAC480AD9AAF52DC4C142A080A5412F149469A56D9C586FEF575FCBBF0959A8298547F89EAD417C4B17BF2EA55DC
                                  Malicious:false
                                  Reputation:low
                                  Preview:..End-User License Agreement for Brother Software....IMPORTANT-PLEASE READ CAREFULLY BEFORE INSTALLING THE SOFTWARE:....This End-User License Agreement ("EULA") is a legal agreement between you ("you" or "End-user") and Brother Industries, Ltd. ("Brother"), which governs your use of the Brother software described above and any and all associated user manuals and electronic documents ("SOFTWARE"). The SOFTWARE will be installed if you press the "Next" button on this Dialog Box. By installing, reproducing and/or using the SOFTWARE, you agree to be bound by the terms of this EULA. If you do not agree to the terms of this EULA, Brother will not license the SOFTWARE to you and you must stop the installation process now by clicking the ["Cancel"] button below. You should print a copy of this EULA for future reference.....Terms and Conditions...---------------------..1. Grant of License...--------------------....In consideration of you agreeing to abide by the terms and conditions of this
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1177), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):26398
                                  Entropy (8bit):3.8034006238358935
                                  Encrypted:false
                                  SSDEEP:384:XdIj2dX7JBosnhrLZ3SpQC2sJGG00ukSDuJ70600ZSNt:XdICXBosnhrLZUQNgGGdukkuJ7nRut
                                  MD5:1A093DEFF26421810440A817E9DE9923
                                  SHA1:A99801A5CE7E4D8FCA594C7203B125273E106715
                                  SHA-256:37BA2A098AF2F86CEC3521421D0DA79F4DC4DE0B6BA198E00EB8A52645F08762
                                  SHA-512:C59FAC0C3D18C7451095CC3BAEC213BFA77327B5AB86F60409CD4EA2B9804C366BFAFF08D80CC7189E3AB7964DD76CA5504AD846A1074F41EC83E9E5A90F3AAA
                                  Malicious:false
                                  Reputation:low
                                  Preview:....8.F.5.=.7.8.>.=.=.>. .A.?.>.@.0.7.C.<.5.=.8.5. .A. .:.@.0.5.=. .?.>.B.@.5.1.8.B.5.;. .7.0. .A.>.D.B.C.5.@. .=.0. .B.r.o.t.h.e.r. ................... .. ... ...'..."..."... ...........".........:.........".>.2.0. ...8.F.5.=.7.8.>.=.=.>. .A.?.>.@.0.7.C.<.5.=.8.5. .A. .:.@.0.5.=. .?.>.B.@.5.1.8.B.5.;. .(.. ..!...... ). .?.@.5.4.A.B.0.2.;.O.2.0. .4.>.3.>.2.>.@. .<.5.6.4.C. .2.0.A. .8. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.. B.r.o.t.h.e.r.. ).,. .:.>.9.B.>. .C.@.5.6.4.0. .8.7.?.>.;.7.2.0.=.5.B.>. .=.0. .A.>.D.B.C.5.@.0. .=.0. .B.r.o.t.h.e.r. .(.2.:.;.N.G.8.B.5.;.=.>. .A.J.>.B.2.5.B.=.8.B.5. .@.J.:.>.2.>.4.A.B.2.0. .7.0. .?.>.B.@.5.1.8.B.5.;.O. .8. .5.;.5.:.B.@.>.=.=.8. .4.>.:.C.<.5.=.B.8.,. .:.0.B.>. .=.0.?.@.8.<.5.@. .D.0.9.;.>.2.5.B.5. .. ?.>.<.>.I.. .8. .. ?.@.>.G.5.B.8. .<.5.. ). .(.7.0.5.4.=.>. .=.0.@.8.G.0.=.8. .. !...$.".#... .. ).,. .:.>.9.B.>. .I.5. .1.J.4.5. .8.=.A.B.0.;.8.@.0.=.,. .0.:.>. .=.0.B.8.A.=.5.B.5. .1.C.B.>.=. .8.;.8. .>.B.<.5.B.=.5.B.5. .:.2.0.4.@.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ISO-8859 text, with very long lines (458), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):5532
                                  Entropy (8bit):6.288798095173917
                                  Encrypted:false
                                  SSDEEP:96:LCF3xl6Wa56Yk8eSie3MtVKttI/LLfq8yQbu7lgtntpkMwPoAjtm2eoE1A2nKPtJ:LCTa0Nhb5oE1NytcEGjCuFjoUli
                                  MD5:1DF643598EFC7305DA68C58472D49C83
                                  SHA1:A5C68C17A2DC2700F5838145051D5B1AAA7EB175
                                  SHA-256:6051568D2C1092D62FDE8A17101AD27B60D1E10E25F40535C4CE0897922F905B
                                  SHA-512:8A3EF2A6C064210A356EB5A6E8195D94CF41BB9807F745EE36714FC48DB7F3EB36048E54A3182DA9D254FF49230898F525AC6F615B80B8E46C111366A6244BD6
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother ..................------------------------------....... .. ...................------------------------------.....................EULA................................. Brother Industries, Ltd.......Brother........................... Brother .......................................... ........................................ ........../...................... EULA .... .......... EULA ....Brother .................................... [.......] ................ ........ EULA ...........................---------------------....1. .........--------------------.................. EULA ..............Brother ...................................1) ................................................................................. ............ Brother ................... Brother ........................................................
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (339), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):7924
                                  Entropy (8bit):6.587440646290695
                                  Encrypted:false
                                  SSDEEP:96:EL6MAVF6zXb7W2CsnHPmVlLS4kSX/G31AYMKZ/32/GEx5Awfc9z/EqnfFQVpNeVB:Eu0XXWdgHPmVlHkSPGKXKNSf2n9QBedh
                                  MD5:1093483957E19A28B0971E3E5D08B1E0
                                  SHA1:EA972DC7B18B9C5912E63481CFA2C5B627E02A58
                                  SHA-256:1B1D15BFE904CF7B999C8622E688DAFECB7549985997C818B34969E19E5E9DF9
                                  SHA-512:6E67EFE6CD72FEC42D8AC0E5CC2266E974A2ECECCC02930A747A36A9EC9BC7D8F07B4F4BAE020B6B762F493E2DB76EC15911831EDB39F5E1B3AB07A20E21E2BB
                                  Malicious:false
                                  Reputation:low
                                  Preview:..B.r.o.t.h.e.r. . .o..N.g.~...SOS.. .............c:y .-. ....N.~..............,g.g.~(u7b...SOS..... E.U.L.A.. ../f.`.N .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d...... B.r.o.t.h.e.r.. ..KN..1\.`.O(u .B.r.o.t.h.e.r. .o..N...S.b.vsQ(u7bKb.Q.T5uP[.ech...O.Y. .^.R. .T. r.e.a.d. .m.e.. .e.N.....~.y. o..N. .....b.v.l._OS.....Y.g.c.N.b..-N(Wdk.[.Fh.Nh.:y.`.T.a.a.T.v.c...b...bFh...O.Y>f:y. .c.S. .0. .T.a. .b. /f. .v.c...b.Y..Fh...\.[.@b..o..N.0 . ..c.N.b..-Nh.:y.`.T.a.a.T.v.c...b...bFh..h.:y.`.T.a.c.S,g .E.U.L.A. .ag>k.v.l._.~_g.0 . ..Y.g.N.T.a,g .E.U.L.A. ..vag>k...R.`.N.O..._,go..N.v.NUO...S.0 . .(W..y.`.Q.N...`.N._.O(u,go..N.0........ag>k.Tag.N.0........1...@b.gCg.0....,go..N-N.v.T^\.N,go..N.v@b.gCg)R.0.NCg.T)R.v...S.bFO.NP..N,go..N-N..b.v.NUO.z.^.T/..b,go..N-N.S+T.v.NUO.Q.[...O.Y.ech.0.V.P.0.VGr.0q_Gr..R_ .B.r.o.t.h.e.r. ..bvQ.O.^FU.b.g.0.`.b..v^.T.a,go..N-N.v.T^\.N,go..N.v@b.gW.\OCg.T.w..NCg.N.cCg.N.`..v^*g.\vQ..R.bhQ..Q.U.0l..y.bl....N.`.0........2...2... ....S.cCg.0....2...
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ISO-8859 text, with very long lines (474), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):5543
                                  Entropy (8bit):6.383594531344197
                                  Encrypted:false
                                  SSDEEP:96:3N+tQp4vQ5bL+P96dw5bG32DQx/4CtZblvHpUAxKqIHfMQx:342p4vsbq9625bZU5DUAbIHkg
                                  MD5:48F07B97FC433C427C2272F35F3D3CED
                                  SHA1:3C24058B9922ACB946961E0099661B03FEEE3289
                                  SHA-256:5F1D662E621D6CCF3716685F5147DB73514ACD425FCBA5016490EBDDB969B238
                                  SHA-512:A0DC26F9DD191441510A1FB37B7B114745BE690C10C8485984BC03BA3928C53F2E30E28AB6D4365BF7C9148AC540BCF1C3C2E3ED4B4E2EE5E7A5A7659D943E76
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Software ......v.X....-----------------------------------------------.......n..b.w....n...e....J..\..G..--------------------------------............v.X.. (.H.U..uEULA.v) .O.z (.H.U..u.z.v..u....v) .M Brother Industries, Ltd. (.H.U..uBrother.v) .......k..X...A..H.W.d.z..W.z Brother .n.............U.P.q.l... (.H.U..u...n..v) .....C .p.G.z.b............u.U.@.B.v.A.N.|.w....n..C .w..B...s../......n..A...z.P.N..u.. EULA ......C .p.G.z...P.N.. EULA ......ABrother .N...|...v.z.....n..A.z......Y...@.U [....] ...s.A.H.....n...w..{..C .z...C.L.. EULA .H......C..........M....C..---------------------....1. ....v......C..--------------------.....b.z.P.N..u.. EULA ......P.....U.ABrother ......z...i.....B.D.M......v.A.H.G....1) .b.@...q...W.w..@.....n..A.B....H... (.p.G.z.O...O..) ..z...q....... (.p.G.z.O...q).C .p.G...n..P Brother .w...~.f.t....A......e Brother .w...~.H...n...s.....A.z.i.b..@.a
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (343), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):7878
                                  Entropy (8bit):6.655631109794585
                                  Encrypted:false
                                  SSDEEP:96:fnS6sMkiJoJLqZkHWWIx0YETmliZjqBfUjNBujjwELWFY3LcvgZqv:fQZcQSGWZx0olbBoNBuIELl3Qt
                                  MD5:0F263ED476B75D41A79CB87E4FB07BC7
                                  SHA1:962CF8EC6A23695AAF74939CC0B4FB4492EA9820
                                  SHA-256:56E97565B76FA7AF4F1C5A93043227FEC06E9C9C651F32740175AA15CE38E6BD
                                  SHA-512:1E734E60277E34FE91A85B856FCBB8D8E2D5A79BA86099336EEC0EBAD3C65CA55ACF011D910699B876335116A63C2049F70D7B1B438B06B275BFFA21BAA08E39
                                  Malicious:false
                                  Reputation:low
                                  Preview:..B.r.o.t.h.e.r. .S.o.f.t.w.a.r.e. ..O(u...c.k.T.} .............N.. .-. ...N0}..............dk.O(u...c.k.T.}...N.N1z.0E.U.L.A..0...p.`.T .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d......N.N1z.0B.r.o.t.h.e.r..0..KN...v.l._.T.}..(u.N...{.`.\vu.`(W.\q..eJX-N.c.N.c...b.Rx..eJXh.:y.`.T.a...O.Yo.:y.p.0.c.S.0.0.0.T.a.0.b.0/f.0.v.c...b8h.S.eJX..Bf.\.g.[..v .B.r.o.t.h.e.r. ......S.b.v..v.O(uKb.Q.T..P[.e.N...O.Y.0h.e.l.p..0.T.0r.e.a.d. .m.e..0.jHh...T1z.p.0...0...v.O(u.0 . ..c.N.c...b.Rx..eJXh.:y.`.T.a..h.:y.`.c.S,g .E.U.L.A. ..h>k.v.l._.}_g.0 . ..Y.g.`.N.T.a,g .E.U.L.A. ..v.h>k...`.\!q.lrs._,g...v.c.k.0 . .(Wdk.`.l.N...`.N._.O(u,g...0.........h>k...h.}.0........1....d.g.k.0....,g.....S.bFO.NP..e,g..-Nte.T.v.NUO.z._...S/..b,g..-N.S+T.v.NUOgQ.[...O.Y.e.N.0q_.P.0...].WGr.0q_Gr.....N.SvQ@b.g.k)R.T)R.v..GW.p .B.r.o.t.h.e.r. ..bvQ.O.aFU@b.g.0.`.w.&N.T.a..,g...v@b.gHr.k.Tzfga.."u.kGW.].S._.c.k...N._.\KN.[te.b..R.Q.U.0.yI..0I....b.NvQ.N.e._.c>mf}.` ..0........2....O(u.kKN.c.N.0
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ASCII text, with very long lines (831), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):9617
                                  Entropy (8bit):4.882486116465403
                                  Encrypted:false
                                  SSDEEP:192:IEH4Ii3gWxmFSEimGOvD5jnclZ5T2pe6q4hLOb5ns:IE4Ii3gSoievljczjzq
                                  MD5:CDA2A13690AF47214509889267F132AB
                                  SHA1:F54665C9F5862A7F077B7D7CE08301BEAB9D177D
                                  SHA-256:62E904E360D6D698FFF45F90F8F92F2804116971DF2368EF5BEE0613D1F702E1
                                  SHA-512:2BDD9FC617E6CDF13EEE263A994185F53DEAFAC480AD9AAF52DC4C142A080A5412F149469A56D9C586FEF575FCBBF0959A8298547F89EAD417C4B17BF2EA55DC
                                  Malicious:false
                                  Reputation:low
                                  Preview:..End-User License Agreement for Brother Software....IMPORTANT-PLEASE READ CAREFULLY BEFORE INSTALLING THE SOFTWARE:....This End-User License Agreement ("EULA") is a legal agreement between you ("you" or "End-user") and Brother Industries, Ltd. ("Brother"), which governs your use of the Brother software described above and any and all associated user manuals and electronic documents ("SOFTWARE"). The SOFTWARE will be installed if you press the "Next" button on this Dialog Box. By installing, reproducing and/or using the SOFTWARE, you agree to be bound by the terms of this EULA. If you do not agree to the terms of this EULA, Brother will not license the SOFTWARE to you and you must stop the installation process now by clicking the ["Cancel"] button below. You should print a copy of this EULA for future reference.....Terms and Conditions...---------------------..1. Grant of License...--------------------....In consideration of you agreeing to abide by the terms and conditions of this
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1148), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):25420
                                  Entropy (8bit):3.542977883933766
                                  Encrypted:false
                                  SSDEEP:768:OOY6zbClUFPs25PIeIMh0DW5y1IXj+sBuhpHz:5Cls5PjaDW5y1IXjVBuhpHz
                                  MD5:121799EA62B640DD53A6DC4E85E75A30
                                  SHA1:190542073A882B3F1FCDED1AFA708620D4997498
                                  SHA-256:2B3364E4590E43C946172204A4D17B6F8F78208632A1824D56C8D353A711CC31
                                  SHA-512:8159EC9345A7E8AE05732EDD9C89818AA4203A81C9E10DA7C345822143855B9CF57DC65FB8767418FEB0C64F13CEDFEE80BFA5E512799DE92CFAD2DBE7449607
                                  Malicious:false
                                  Reputation:low
                                  Preview:..L.i.c.e.n...n.i. .u.g.o.v.o.r. .s.o.f.t.v.e.r.a. .t.v.r.t.k.e. .B.r.o.t.h.e.r. .z.a. .k.r.a.j.n.j.e. .k.o.r.i.s.n.i.k.e. .........V.A.}.N.O. .. .P.A.}.L.J.I.V.O. .P.R.O...I.T.A.J.T.E.:.........O.v.a.j. .l.i.c.e.n...n.i. .u.g.o.v.o.r. .z.a. .k.r.a.j.n.j.e. .k.o.r.i.s.n.i.k.e. .(.. L.I.C.E.N...N.I. .U.G.O.V.O.R.. ). .p.r.a.v.n.i. .j.e. .u.g.o.v.o.r. .i.z.m.e...u. .v.a.s. .i. .t.v.r.t.k.e. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.. B.r.o.t.h.e.r.. ). .k.o.j.i. .r.e.g.u.l.i.r.a. .v.a.a.u. .u.p.o.t.r.e.b.u. .s.o.f.t.v.e.r.a. .t.v.r.t.k.e. .B.r.o.t.h.e.r. .(.u. .a.t.o. .s.p.a.d.a.j.u. .s. .n.j.i.m. .p.o.v.e.z.a.n.i. .k.o.r.i.s.n.i...k.i. .p.r.i.r.u...n.i.c.i. .i. .e.l.e.k.t.r.o.n.i...k.i. .d.o.k.u.m.e.n.t.i.,. .k.a.o. .a.t.o. .s.u. .d.a.t.o.t.e.k.e. .. P.o.m.o.... .i. .. P.r.o...i.t.a.j. .m.e.. ). .(.z.a.j.e.d.n.i...k.i. .. S.O.F.T.V.E.R.. ). .k.o.j.i. ...e. .s.e. .i.n.s.t.a.l.i.r.a.t.i. .a.k.o. .p.r.i.t.i.s.n.e.t.e. .g.u.m.b. .i.l.i. .o.z.n.a...i.t.e. .o.k.v.i.r. .u. .o.v.o.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (891), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):9858
                                  Entropy (8bit):5.371496189454271
                                  Encrypted:false
                                  SSDEEP:192:IbGwGBWRZSWnoXY9vvrUD0VOSB3CQ/i/EZgv20+ACz:IbGwGBOZSWoXqvID0VJqsZgv9+A2
                                  MD5:F785B7D740D39ED5F1DD55709C352DBF
                                  SHA1:EDC4A92ABB3B0ED8F48FEFCF566E9576EFE609D9
                                  SHA-256:3B07833C8CF57BCD854167EE470AC8FDC8A0042A9CB2F7BC996DA6C35A0DCADE
                                  SHA-512:1C36D898E3E6ED52147F0AD0305C632B66300247FBB6932014099BD639BB01AB35190F2099AD75D203E31651385EED254D55FE4642744BA3EB920CEBA5E4F04F
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Licen.n. smlouva s koncov.m u.ivatelem programu Brother..-----------------------------------------------....D.LE.IT. . PROS.ME O POZORN. P.E.TEN. P.ED INSTALAC. PROGRAMU:..--------------------------------....Tato licen.n. smlouva s koncov.m u.ivatelem (.EULA.) je pr.vn. smlouvou mezi v.mi (.vy. nebo .koncov. u.ivatel.) a spole.nost. Brother Industries, Ltd. (.Brother.). T.k. se va.eho pou..v.n. v..e popsan.ho programu spole.nosti Brother a jak.chkoliv p..slu.n.ch p..ru.ek u.ivatele a elektronick.ch dokument. (.PROGRAM.). PROGRAM bude nainstalov.n, pokud stisknete tla..tko .Dal.. v tomto dialogov.m oknu. Instalac., reprodukc. a/nebo pou..v.n.m tohoto PROGRAMU potvrzujete, .e souhlas.te s podm.nkami t.to smlouvy EULA. Pokud s podm.nkami t.to smlouvy EULA nesouhlas.te, spole.nost Brother v.m k PROGRAMU neud.l. licen.n. opr.vn.n. a vy mus.te nyn. zastavit proces instalace kliknut.m na tla..tko [.Zru.it.] n.e. M.li byste si vytisknout kopii t.to smlouvy EULA k budouc.mu nahl.dnut...
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1092), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):25038
                                  Entropy (8bit):3.7307555634544682
                                  Encrypted:false
                                  SSDEEP:384:UA5hK9a/boNzWl1lmTDH/QINjww67UOlxX+W9LIMtXE/0Wy0qr4CGMMzZ:R3+8CvNbM9vt0diEN
                                  MD5:1F6A0711C600754BE261BCAD5C9EC8D9
                                  SHA1:627DF379B23E080E97BD4DF92A83E2560C1223D3
                                  SHA-256:CBFEE6CAAA10958A0013389E954976AF1E67BF0531961BCDCD9F4230D7AEC089
                                  SHA-512:7A86F00B98D842B85B0249B493BFFA0FD7C0C166CAD2A1FA78E855CBF6862D802405547D6772215A5FA1CC809C6273650E32EC0AFE7999BF9DC9BE6D03578243
                                  Malicious:false
                                  Reputation:low
                                  Preview:..L.i.c.e.n...n... .s.m.l.o.u.v.a. .s. .k.o.n.c.o.v...m. .u.~.i.v.a.t.e.l.e.m. .s.o.f.t.w.a.r.u. .B.r.o.t.h.e.r. .........D.n.L.E.}.I.T... .-. .P.R.O.S...M. ...T...T.E. .P.O.Z.O.R.N...:.........T.a.t.o. .l.i.c.e.n...n... .s.m.l.o.u.v.a. .s. .k.o.n.c.o.v...m. .u.~.i.v.a.t.e.l.e.m. .(.. E.U.L.A.. ). .j.e. .p.r...v.n... .s.m.l.o.u.v.a. .m.e.z.i. .v...m.i. .a. .s.p.o.l.e...n.o.s.t... .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.. B.r.o.t.h.e.r.. ).,. .k.t.e.r... .u.p.r.a.v.u.j.e. .v.a.a.e. .p.o.u.~...v...n... .s.o.f.t.w.a.r.u. .B.r.o.t.h.e.r. .(.v...e.t.n... .s.o.u.v.i.s.e.j...c...c.h. .u.~.i.v.a.t.e.l.s.k...c.h. .p.Y...r.u...e.k. .a. .e.l.e.k.t.r.o.n.i.c.k... .d.o.k.u.m.e.n.t.a.c.e.,. .j.a.k.o. .. n...p.o.v...d.a.. .a. .s.o.u.b.o.r.y. .. r.e.a.d. .m.e.. ). .(.s.o.u.h.r.n.n... .o.z.n.a...o.v...n.o. .j.a.k.o. .. S.O.F.T.W.A.R.E.. ).,. .k.t.e.r... .b.u.d.e. .n.a.i.n.s.t.a.l.o.v...n. .p.o. .s.t.i.s.k.n.u.t... .t.l.a.....t.k.a. .n.e.b.o. .z.a.a.k.r.t.n.u.t... .p.o.l.....k.a. .v. .t.o.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (966), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):10946
                                  Entropy (8bit):4.8956322514763375
                                  Encrypted:false
                                  SSDEEP:192:lUf1NA2Zh6z8aXQbE/9LBN/k0I5BJ1CDhw5ylLgvuiYDd:aNt4XwEd/k0IAlQfqd
                                  MD5:8D116976E5A31771FDBBFA60114B4249
                                  SHA1:FE512059A93DA9455F52388292F060FA20440912
                                  SHA-256:9E755B049E08AE8EADFCFAA2823944150FDCD13A9D2ADD7B82CE0B2F49259CA9
                                  SHA-512:365C57D9D5CC645703C5A19D198BAA7A247CA5A86F43E798D5B7EBD01DFC0EC22616DB33A51CECE314F4CD06F3863C5B99AE8D4379E23F38B0025F62C9A9D1CE
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Slutbrugerlicensaftale for Brother-software..-----------------------------------------------....VIGTIGT-B.R L.SES OMHYGGELIGT, INDEN SOFTWAREN INSTALLERES:..--------------------------------....Denne slutbrugerlicensaftale (.slutbrugerlicensaftale.) er en juridisk aftale mellem dig (.dig. eller .slutbrugeren.) og Brother Industries, Ltd. (.Brother.), og den regulerer din brug af den Brother-software, der er beskrevet ovenfor, og af alle tilknyttede brugsanvisninger og elektroniske dokumenter (.SOFTWARE.). SOFTWAREN installeres, hvis du trykker p. knappen .N.ste. i denne dialogboks. Ved at installere, reproducere og/eller bruge SOFTWAREN acceptere du at v.re bundet af denne slutbrugerlicensaftales vilk.r. Hvis du ikke accepterer denne slutbrugerlicensaftales vilk.r, vil Brother ikke licensere SOFTWAREN til dig, og du skal stoppe installationsprocessen nu ved at klikke p. knappen [.Annuller.] nedenfor. Du b.r udskrive en kopi af denne slutbrugerlicensaftale, s. du har den til r.digh
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1135), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):25918
                                  Entropy (8bit):3.4003688149028095
                                  Encrypted:false
                                  SSDEEP:192:QE782cXlu9tMZ8m45QVjhyEbSA0GdtjE3TbA47viug4JsoDCGTL1LD7oPPKI7qjN:4l8tMXkg5WXE14yoDCGT6PSRjN
                                  MD5:3D321B7CE7E5D6407A94D8F450358A22
                                  SHA1:9B06A03A239AC07E9C23BD8BAC41088C1A4F8348
                                  SHA-256:EEB2ED4D13EFC218887E577D83991F36B4203BF68719D6B792E3B3E8D77D2955
                                  SHA-512:311727B4B986147E5388AA6DED8DF3AE8B95CCCE80545A1B1D6B27DE78EAD09570EF97C83DD35E18A4B08C0D71133A77205756FCC1F1BFAB05CF0896288E0732
                                  Malicious:false
                                  Reputation:low
                                  Preview:..S.l.u.t.b.r.u.g.e.r.l.i.c.e.n.s.a.f.t.a.l.e. .f.o.r. .B.r.o.t.h.e.r.-.s.o.f.t.w.a.r.e. .........V.I.G.T.I.G.T. .-. .L...S. .O.M.H.Y.G.G.E.L.I.G.T.:.........D.e.n.n.e. .s.l.u.t.b.r.u.g.e.r.l.i.c.e.n.s.a.f.t.a.l.e. .(.. E.U.L.A.. ). .e.r. .e.n. .j.u.r.i.d.i.s.k. .b.i.n.d.e.n.d.e. .a.f.t.a.l.e. .m.e.l.l.e.m. .d.i.g. .o.g. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.. B.r.o.t.h.e.r.. ).,. .s.o.m. .r.e.g.u.l.e.r.e.r. .d.i.n. .b.r.u.g. .a.f. .B.r.o.t.h.e.r.-.s.o.f.t.w.a.r.e.n. .(.h.e.r.u.n.d.e.r. .t.i.l.h...r.e.n.d.e. .b.r.u.g.e.r.m.a.n.u.a.l.e.r. .o.g. .e.l.e.k.t.r.o.n.i.s.k.e. .d.o.k.u.m.e.n.t.f.i.l.e.r. .s.o.m. .f...e.k.s... .. h.j...l.p.. .O.g. .. l...s. .m.i.g.. ). .(.s.a.m.l.e.t. .. S.O.F.T.W.A.R.E.. ).,. .d.e.r. .v.i.l. .b.l.i.v.e. .i.n.s.t.a.l.l.e.r.e.t.,. .h.v.i.s. .d.u. .t.r.y.k.k.e.r. .p... .e.n. .k.n.a.p. .e.l.l.e.r. .m.a.r.k.e.r.e.r. .e.t. .a.f.k.r.y.d.s.n.i.n.g.s.f.e.l.t. .i. .d.e.n.n.e. .d.i.a.l.o.g.b.o.k.s.,. .d.e.r. .a.n.g.i.v.e.r. .d.i.t. .s.a.m.t.y.k.k.e. .(.s.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (961), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):11548
                                  Entropy (8bit):4.846100834284377
                                  Encrypted:false
                                  SSDEEP:192:rfAf+ZIY/AieTOiiDtVHqv6xaZ7xHzdRXX/Tk5INF1vrH90Jn:7G+ZazOiNDZd3XX/LX9+
                                  MD5:8D0198FDA99259E708251244EC03E1E6
                                  SHA1:3B3FEEA3FB0596311F9F33FF5643D6161B289B52
                                  SHA-256:C1C08587BF63C401461285E0DBB938C1448C400AF85069A28C6C1C42EDD096E3
                                  SHA-512:88B417AD8BF343646F43F9D5C9174013283CAB3934EF0F4967E64306B5D9560126553CF3CC3896CDC0A4BE5948B374F35BFA873E0C5410AFB4D39ACC7DA3086A
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Gebruiksrechtovereenkomst voor software van Brother..---------------------------------------------------....BELANGRIJK - ZORGVULDIG LEZEN VOOR INSTALLATIE VAN DE SOFTWARE:..--------------------------------------------....Deze Gebruiksrechtovereenkomst ("Overeenkomst") is een rechtsgeldige overeenkomst tussen u ("u" of "Eindgebruiker") en Brother Industries, Ltd. ("Brother"), en is van toepassing op uw gebruik van de software van Brother die hiervoor is beschreven en alle gebruikershandleidingen en elektronische documenten die daarmee verband houden ("SOFTWARE"). De SOFTWARE wordt ge.nstalleerd als u op de knop "Volgende" klikt in dit dialoogvenster. Door het installeren, kopi.ren of gebruiken van de SOFTWARE gaat u akkoord met de voorwaarden en bepalingen van deze Overeenkomst. Als u niet akkoord gaat met de voorwaarden van deze Overeenkomst, verleent Brother u geen licentie voor de SOFTWARE en moet u op de knop ["Annuleren"] hieronder klikken om de installatie af te breken. Druk
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1201), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):27734
                                  Entropy (8bit):3.374729847330121
                                  Encrypted:false
                                  SSDEEP:192:2gDroA433SUGRjD7T+gWM8AUfy83oCe6evyJLegZTR95B:3Xo1S/fG3oCe6evyJLegL9f
                                  MD5:0045FE61C15D9A5D6716D481F18B20DD
                                  SHA1:96F7C72A2EC8DF2448B7E50157E36361D814686A
                                  SHA-256:80C5505CAB30D6F5CEE6BF3BFF3E2034B2CF4D9983B1277B5604D8AF637E27EB
                                  SHA-512:95EA4B78F5DA41209A063DE12F72625E77B49D3F46F7E09B2B54BCB114AB235D54E1777C45424B26D8C28998D7602E5AD128991ABA0C95946BB59F7091648F6C
                                  Malicious:false
                                  Reputation:low
                                  Preview:..G.e.b.r.u.i.k.s.r.e.c.h.t.o.v.e.r.e.e.n.k.o.m.s.t. .v.o.o.r. .s.o.f.t.w.a.r.e. .v.a.n. .B.r.o.t.h.e.r. .........B.E.L.A.N.G.R.I.J.K. .-. .L.E.E.S. .Z.O.R.G.V.U.L.D.I.G.:.........D.e.z.e. .g.e.b.r.u.i.k.s.r.e.c.h.t.o.v.e.r.e.e.n.k.o.m.s.t. .v.o.o.r. .e.i.n.d.g.e.b.r.u.i.k.e.r.s. .(.".E.U.L.A.".). .i.s. .e.e.n. .j.u.r.i.d.i.s.c.h.e. .o.v.e.r.e.e.n.k.o.m.s.t. .t.u.s.s.e.n. .u. .e.n. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.".B.r.o.t.h.e.r.".).,. .d.i.e. .u.w. .g.e.b.r.u.i.k. .v.a.n. .d.e. .B.r.o.t.h.e.r.-.s.o.f.t.w.a.r.e. .b.e.h.e.e.r.s.t. .(.i.n.c.l.u.s.i.e.f. .b.i.j.b.e.h.o.r.e.n.d.e. .g.e.b.r.u.i.k.e.r.s.h.a.n.d.l.e.i.d.i.n.g.e.n. .e.n. .e.l.e.k.t.r.o.n.i.s.c.h.e. .d.o.c.u.m.e.n.t.e.n. .z.o.a.l.s. .".h.e.l.p.". .e.n. .".l.e.e.s. .m.e.".-.b.e.s.t.a.n.d.e.n.). .(.c.o.l.l.e.c.t.i.e.f.,. .".S.O.F.T.W.A.R.E.".). .d.i.e. .g.e...n.s.t.a.l.l.e.e.r.d. .z.u.l.l.e.n. .w.o.r.d.e.n. .a.l.s. .u. .o.p. .e.e.n. .k.n.o.p. .d.r.u.k.t. .o.f. .e.e.n. .v.a.k.j.e. .i.n. .d.i.t. .d.i.a.l.o.o.g.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ASCII text, with very long lines (831), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):9619
                                  Entropy (8bit):4.882905729208935
                                  Encrypted:false
                                  SSDEEP:192:IEH4Ij3gWxmFSEimGOvD5jnclZ5T2pe6q4hLOb5ns:IE4Ij3gSoievljczjzq
                                  MD5:444963737C29887279F5C1BE1568574E
                                  SHA1:6B3DC1BD54E36D5C1A461106320F9661C9379EEE
                                  SHA-256:EF41F204380577FBEFF14DF28578BA89D10076708EB89A1F8AB33C1959680699
                                  SHA-512:08F7158CC14AA73992C4CA79DDAD4C96191AAE13BECF56BD06776825667E491AA82944AFC9725A16C82352E8138A0BCC209E8F200F93E2E33BC6B1ED6444D4F3
                                  Malicious:false
                                  Reputation:low
                                  Preview:..End-User License Agreement for Brother Software....IMPORTANT-PLEASE READ CAREFULLY BEFORE INSTALLING THE SOFTWARE:....This End-User License Agreement ("EULA") is a legal agreement between you ("you" or "End-user") and Brother Industries, Ltd. ("Brother"), which governs your use of the Brother software described above and any and all associated user manuals and electronic documents ("SOFTWARE"). The SOFTWARE will be installed if you press the "Next" button on this Dialog Box. By installing, reproducing and/or using the SOFTWARE, you agree to be bound by the terms of this EULA. If you do not agree to the terms of this EULA, Brother will not license the SOFTWARE to you and you must stop the installation process now by clicking the ["Cancel"] button below. You should print a copy of this EULA for future reference.....Terms and Conditions...---------------------..1. Grant of License...--------------------....In consideration of you agreeing to abide by the terms and conditions of this
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1104), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):24616
                                  Entropy (8bit):3.4008036755992355
                                  Encrypted:false
                                  SSDEEP:384:e1PdeFliDy2J3iDx+EffFzbFdQeELKEVcNhPfH:1TV+Eff1QeEGEKhPfH
                                  MD5:14024D3E30A47E883785B090315CAB6F
                                  SHA1:A0C806BC456BEE0F746478116BB1F58CA7B69D40
                                  SHA-256:21FADFC4E005880D38532197AA597308026A9C1C712E22264F50D008CFD6DB8D
                                  SHA-512:FDA843120C8C2D5E0F2D47A301ED5CE13EDE116E3A07BABD02578F2D2AFF4A9B411D464BDEC11EAAFFDAB1B6AB53B63437A41A1FB72FDA3D4DAEFFD136C47DF8
                                  Malicious:false
                                  Reputation:low
                                  Preview:..E.n.d.-.U.s.e.r. .L.i.c.e.n.s.e. .A.g.r.e.e.m.e.n.t. .f.o.r. .B.r.o.t.h.e.r. .S.o.f.t.w.a.r.e. .........I.M.P.O.R.T.A.N.T.-. .P.L.E.A.S.E. .R.E.A.D. .C.A.R.E.F.U.L.L.Y.:.........T.h.i.s. .E.n.d.-.U.s.e.r. .L.i.c.e.n.s.e. .A.g.r.e.e.m.e.n.t. .(.".E.U.L.A.".). .i.s. .a. .l.e.g.a.l. .a.g.r.e.e.m.e.n.t. .b.e.t.w.e.e.n. .y.o.u. .a.n.d. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.".B.r.o.t.h.e.r.".).,. .w.h.i.c.h. .g.o.v.e.r.n.s. .y.o.u.r. .u.s.e. .o.f. .t.h.e. .B.r.o.t.h.e.r. .s.o.f.t.w.a.r.e. .(.i.n.c.l.u.d.i.n.g. .a.s.s.o.c.i.a.t.e.d. .u.s.e.r. .m.a.n.u.a.l.s. .a.n.d. .e.l.e.c.t.r.o.n.i.c. .d.o.c.u.m.e.n.t.s. .s.u.c.h. .a.s. .".h.e.l.p.. .a.n.d. .. r.e.a.d. .m.e.. .f.i.l.e.s.).(.c.o.l.l.e.c.t.i.v.e.l.y.,. .".S.O.F.T.W.A.R.E.".). .t.h.a.t. .w.i.l.l. .b.e. .i.n.s.t.a.l.l.e.d. .i.f. .y.o.u. .p.r.e.s.s. .a. .b.u.t.t.o.n. .o.r. .c.h.e.c.k. .a. .b.o.x. .o.n. .t.h.i.s. .D.i.a.l.o.g. .B.o.x. .w.h.i.c.h. .i.n.d.i.c.a.t.e.s. .y.o.u.r. .i.n.t.e.n.t.i.o.n. .o.f. .c.o.n.s.e.n.t. .(.s.u.c.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (1052), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):10842
                                  Entropy (8bit):4.871185085996219
                                  Encrypted:false
                                  SSDEEP:192:Hs7Rh6ikzlNRLkVc6C+XRsqhGVp6PywdT/EukmNplHuI+wGhEyvai9fvHN39Zq5N:Hs8vLkVc6TstVwdT8QplZGhNN8
                                  MD5:90BF45C564EA1ADC3BA80EC906595F08
                                  SHA1:2A1940FDE29A84576B2195D083076B5A133E5FD4
                                  SHA-256:F405743A01F7041738597BC61A41BA9601187712A7CD0D0E1D8DD8F5AAE16AEF
                                  SHA-512:E593B1E6E593D176271CBA9F7078263D27E7068BEE4E4F6F036C1F237564EBBAE9FBB22038DA830515A769950F10A060BB44C08FF97AE26057951B9427ECC523
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother-ohjelmiston k.ytt.oikeussopimus..-----------------------------------------------....T.RKE.. . LUE HUOLELLISESTI ENNEN OHJELMISTON ASENTAMISTA:..-----------------------------------------------....T.m. K.ytt.oikeussopimus (.K.ytt.oikeussopimus.) on juridinen sopimus asiakkaan (.sin., .asiakas. tai .k.ytt.j.) ja Brother Industries, Ltd:n (.Brother.) v.lill.. Se koskee asiakkaan yll. olevan Brother-ohjelmiston k.ytt.. sek. kaikkia liittyvi. oppaita ja elektronisia asiakirjoja (.OHJELMISTO.). OHJELMISTO asennetaan, jos asiakas napsauttaa t.ss. valintaikkunassa .Seuraava.-vaihtoehtoa. Jos asiakas asentaa ja/tai kopioi OHJELMISTON ja/tai k.ytt.. sit., asiakas sitoutuu noudattamaan t.m.n K.ytt.oikeussopimuksen ehtoja. Jos asiakas ei hyv.ksy t.m.n K.ytt.oikeussopimuksen ehtoja, Brother ei anna OHJELMISTON k.ytt.oikeutta asiakkaalle, ja asiakkaan on pys.ytett.v. asennusprosessi nyt napsauttamalla alla olevaa [.Peruuta.]-painiketta. Asiakkaan tulee tulostaa kopio t.st. K.ytt.oikeu
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1084), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):25806
                                  Entropy (8bit):3.4139423018561064
                                  Encrypted:false
                                  SSDEEP:384:suQKTI1nPI0I5UipJiVtW3lBBOIoRB8BaAWsjcqx82PQZFqIkq5ph6nHoN7A0G7S:YWUIvXCpqx8FhyHoNs0DSMUl4awem
                                  MD5:10499B0C0BD410A6D52C22C2F6B66C42
                                  SHA1:383194F48EADDCB07EE7BA40246452F13E0806D4
                                  SHA-256:6F8691C58A6A67B92D3329D5ACF877EB00542AFD9C28AE94CB2AFE546C1B541B
                                  SHA-512:DD8CCBFFC1A1A108B76F5BF05D42A4E5CF74C13E0F6CB381ED2C38E02795D35F4B128674E3508AF65154C6295C937DC47CBBF85D9EDA498EB887A994FCCE106E
                                  Malicious:false
                                  Reputation:low
                                  Preview:..B.r.o.t.h.e.r.-.o.h.j.e.l.m.i.s.t.o.n. .k...y.t.t...o.i.k.e.u.s.s.o.p.i.m.u.s. .........T...R.K.E..... .. .L.U.E. .H.U.O.L.E.L.L.I.S.E.S.T.I.:.........T...m... .o.n. .o.i.k.e.u.d.e.l.l.i.s.e.s.t.i. .s.i.t.o.v.a. .k...y.t.t...o.i.k.e.u.s.s.o.p.i.m.u.s. .(.. E.U.L.A.. ). .s.i.n.u.n. .j.a. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s. .L.t.d.:.n. .(.. B.r.o.t.h.e.r.. ). .v...l.i.l.l..... .S.e. .s.....t.e.l.e.e. .s.i.t...,. .m.i.t.e.n. .k...y.t...t. .B.r.o.t.h.e.r.-.o.h.j.e.l.m.i.s.t.o.a. .(.m.u.k.a.a.n. .l.u.k.i.e.n. .l.i.i.t.t.y.v...t. .k...y.t.t...o.p.p.a.a.t. .j.a. .e.l.e.k.t.r.o.n.i.s.e.t. .a.s.i.a.k.i.r.j.a.t.,. .k.u.t.e.n. .o.h.j.e.-. .j.a. .r.e.a.d.m.e.-.t.i.e.d.o.s.t.o.t.). .(.y.h.d.e.s.s... .. O.H.J.E.L.M.I.S.T.O.. ).,. .j.o.k.a. .a.s.e.n.n.e.t.a.a.n.,. .j.o.s. .p.a.i.n.a.t. .p.a.i.n.i.k.e.t.t.a. .t.a.i. .m.e.r.k.i.t.s.e.t. .v.a.h.v.i.s.t.u.s.r.u.u.d.u.n.,. .j.o.k.a. .i.l.m.a.i.s.e.e. .s.u.o.s.t.u.m.u.k.s.e.s.i. .(.e.s.i.m.e.r.k.i.k.s.i. .p.a.i.n.i.k.e. .t.a.i. .v.a.l.i.n.t.a.r.u.u.t.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (929), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):10983
                                  Entropy (8bit):4.887777147644997
                                  Encrypted:false
                                  SSDEEP:192:ugrPm6Cum6TIGLnUNncau3Tr7s6SdqXJycYCDjvHNH60qHNGciJ:ugruv4ZDr7s6eqXJHdH608GJJ
                                  MD5:646A92CA2AF1F063ADD8CE349023F31A
                                  SHA1:CC482D462F247D7BC32E5F946C655E589E5AA53B
                                  SHA-256:43DAD5EE18505311D46FA0354FA07B88B8F112924AFE3CAE2368D61A17093EE5
                                  SHA-512:78FF770D150A363D7DEDFA690D96754CADC47FD85178BBCD8DE1E1EE57CA6DCBCA513FA16A56C1F77A91AA2045388B369594E42AC0FCB1A34F35BA9B84A3AB06
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Contrat de Licence Utilisateur Final pour un logiciel Brother..-------------------------------------------------------------....IMPORTANT - VEUILLEZ LIRE ATTENTIVEMENT AVANT D.INSTALLER LE LOGICIEL.:..----------------------------------------------------------------------....Le pr.sent Contrat de Licence Utilisateur Final (..CLUF..) est une convention l.gale entre vous (..vous.. ou l...utilisateur final..) et Brother Industries, Ltd. (..Brother..), qui r.git votre utilisation du logiciel Brother d.crit ci-dessus et tout manuel ou document .lectronique associ. (..LOGICIEL..). Le LOGICIEL sera install. si vous cliquez sur le bouton ..Suivant.. dans cette bo.te de dialogue. En installant, reproduisant et/ou en utilisant le LOGICIEL, vous vous engagez . respecter les conditions du pr.sent CLUF. Si vous n.acceptez pas les conditions du pr.sent CLUF, Brother ne vous accorde pas la licence du LOGICIEL et vous devez arr.ter le processus d.installation d.s maintenant en cliquant sur le bout
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1333), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):27910
                                  Entropy (8bit):3.3938512098343083
                                  Encrypted:false
                                  SSDEEP:768:Ht7Z9zRjPPuiMnLb2n45EOXJwQTam6OmMNydioFY8p/4jkn:gnWn+Xu
                                  MD5:5D9F375C15394563BA1F2ED4FE641237
                                  SHA1:7CEF0D2EB9BC9050EAAC65561248AE270B354E40
                                  SHA-256:CA4EC12F9A1222725E1C7ED3E303C549B1632786804ACBB3D8CCBB9B33EFC84B
                                  SHA-512:E8082DCAD99FF8D63F0AF531147AF9BE39C3713BDAA0F26E9B6A3C983942CEC8447750886C5E21D32CF50C7A9677A06AC45A0546539BA5F85BF6DDCB0B6487BF
                                  Malicious:false
                                  Reputation:low
                                  Preview:..C.o.n.t.r.a.t. .d.e. .l.i.c.e.n.c.e. .d.. u.t.i.l.i.s.a.t.e.u.r. .f.i.n.a.l. .p.o.u.r. .l.o.g.i.c.i.e.l. .B.r.o.t.h.e.r. .........I.M.P.O.R.T.A.N.T...-. ... .L.I.R.E. .A.T.T.E.N.T.I.V.E.M.E.N.T...:.........L.e. .p.r...s.e.n.t. .c.o.n.t.r.a.t. .d.e. .l.i.c.e.n.c.e. .u.t.i.l.i.s.a.t.e.u.r. .f.i.n.a.l. .(.....C.L.U.F.....). .e.s.t. .u.n. .a.c.c.o.r.d. .l...g.a.l. .e.n.t.r.e. .v.o.u.s. .e.t. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.....B.r.o.t.h.e.r.....). .q.u.i. .r...g.i.t. .v.o.t.r.e. .u.t.i.l.i.s.a.t.i.o.n. .d.u. .l.o.g.i.c.i.e.l. .B.r.o.t.h.e.r. .(.n.o.t.a.m.m.e.n.t. .d.e.s. .m.a.n.u.e.l.s. .d.e. .l.. u.t.i.l.i.s.a.t.e.u.r. .e.t. .d.e.s. .d.o.c.u.m.e.n.t.s. ...l.e.c.t.r.o.n.i.q.u.e.s. .t.e.l.s. .q.u.e. .l.e.s. .f.i.c.h.i.e.r.s. .d.. ....a.i.d.e..... .e.t. .....l.i.s.e.z.-.m.o.i.....). .(...l...m.e.n.t.s. .a.p.p.e.l...s. .c.o.l.l.e.c.t.i.v.e.m.e.n.t. .....L.O.G.I.C.I.E.L.....). .q.u.i. .s.e.r.o.n.t. .i.n.s.t.a.l.l...s. .s.i. .v.o.u.s. .a.p.p.u.y.e.z. .s.u.r. .u.n. .b.o.u.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (986), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):11135
                                  Entropy (8bit):4.997308576633175
                                  Encrypted:false
                                  SSDEEP:192:gPlDSAGaoGeZQirGqhNUygUTnoGDjgdLprePhuAlzmg512tz:rkeZJrGq7siKaucgz
                                  MD5:C8A6A104A9C8032C4134D5F0ECD9C2CD
                                  SHA1:893FDFB89EE757CA576F9F4D95408A6B0F44B234
                                  SHA-256:274D683A9152CC814328F2D419FADC158BAE44AB57E11EB17B920C856CE7B2FA
                                  SHA-512:45D1E11FE19081BB6D49125C35654D53A8E761B41CD51F3FA460E39327FF94E137E2A7A6B784F0471F72678E7CC59346681D6B6B0195D7CC8E8E67E18497B51F
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Endbenutzer-Lizenzvertrag f.r Brother-Software..----------------------------------------------....WICHTIG . BITTE VOR INSTALLATION DER SOFTWARE AUFMERKSAM LESEN:..--------------------------------------------------------------....Dieser Endbenutzer-Lizenzvertrag (.EULA.) ist eine rechtsg.ltige Vereinbarung zwischen Ihnen (.Sie. oder .Endbenutzer.) und Brother Industries, Ltd. (.Brother.), die Ihre Nutzung der oben beschriebenen Brother-Software und aller zugeh.rigen Benutzerhandb.cher und elektronischen Dokumente (.SOFTWARE.) regelt. Die SOFTWARE wird installiert, wenn Sie in diesem Dialogfeld auf die Schaltfl.che .Weiter. klicken. Indem Sie die SOFTWARE installieren, reproduzieren und/oder verwenden, stimmen Sie zu, dass die Bestimmungen dieser EULA f.r Sie rechtlich bindend sind. Wenn Sie den Bestimmungen dieser EULA nicht zustimmen, gew.hrt Brother Ihnen keine Lizenz f.r die SOFTWARE. In diesem Fall m.ssen Sie den Installationsprozess jetzt beenden, indem Sie unten auf die Schal
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1230), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):29150
                                  Entropy (8bit):3.4438653369290577
                                  Encrypted:false
                                  SSDEEP:384:4tNyCq7sz93z+oFcgzHqOT91Vd2x0fG8twlYhmWwDMAO24:4Nn1j+oegzH7T900fPt4Ynwm24
                                  MD5:B581F71C494CE83F068580887A7A0BAD
                                  SHA1:0F5E4FD9AAB4F023BE831F3D27D87181264A60F4
                                  SHA-256:BEAF8744D98C24486876B771CF0DDAEDB56BD4DEF826B03F1AA899D8C87693DA
                                  SHA-512:EEE0A6BF225BF6CC821F66BB2BD3178E5450054FA3139F0004ECD130EA8C07B01370A474D7B56846717322F0D45B42F9A5DD54DCFD6A8B57375042F1006E5948
                                  Malicious:false
                                  Reputation:low
                                  Preview:..E.n.d.b.e.n.u.t.z.e.r.-.L.i.z.e.n.z.v.e.r.t.r.a.g. .f...r. .B.r.o.t.h.e.r. .S.o.f.t.w.a.r.e. .........W.I.C.H.T.I.G. .. .B.I.T.T.E. .S.O.R.G.F...L.T.I.G. .L.E.S.E.N.:.........D.e.r. .v.o.r.l.i.e.g.e.n.d.e. .E.n.d.b.e.n.u.t.z.e.r.-.L.i.z.e.n.z.v.e.r.t.r.a.g. .(.E.n.d.-.U.s.e.r. .L.i.c.e.n.s.e. .A.g.r.e.e.m.e.n.t. .. .. E.U.L.A.. ). .s.t.e.l.l.t. .e.i.n.e. .r.e.c.h.t.s.v.e.r.b.i.n.d.l.i.c.h.e. .V.e.r.e.i.n.b.a.r.u.n.g. .z.w.i.s.c.h.e.n. .I.h.n.e.n. .u.n.d. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.. B.r.o.t.h.e.r.. ). .d.a.r.;. .e.r. .r.e.g.e.l.t. .I.h.r.e. .N.u.t.z.u.n.g. .d.e.r. .B.r.o.t.h.e.r.-.S.o.f.t.w.a.r.e. .(.e.i.n.s.c.h.l.i.e...l.i.c.h. .d.e.r. .z.u.g.e.h...r.i.g.e.n. .B.e.n.u.t.z.e.r.h.a.n.d.b...c.h.e.r. .u.n.d. .e.l.e.k.t.r.o.n.i.s.c.h.e.n. .D.o.k.u.m.e.n.t.e. .w.i.e. .. H.i.l.f.e.. -. .u.n.d. .. R.e.a.d.m.e.. -.D.a.t.e.i.e.n.). .(.z.u.s.a.m.m.e.n.f.a.s.s.e.n.d. .a.l.s. .. S.O.F.T.W.A.R.E.. .b.e.z.e.i.c.h.n.e.t.).,. .d.i.e. .n.a.c.h. .e.n.t.s.p.r.e.c.h.e.n.d.e.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (668), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):7802
                                  Entropy (8bit):4.669738283166335
                                  Encrypted:false
                                  SSDEEP:192:OeTZJXLte2TvjV7gFV19e6gjicfUnM7AEkrf3:Oe1FLte2Tvh0z19+TsREs
                                  MD5:DA37387D7D13D3746A378C739E822437
                                  SHA1:AC5C1E215206F69329C0E69E3EC292251BA1EAC2
                                  SHA-256:A8351D179DA5AB0170FB52DF8D98E917D13F112C0B601AF06B3A3B3D8032188A
                                  SHA-512:A6F2DB8B9860CE968CA90E8308C0A5D7E503572C6A26230E07EF3993054587CA2F35EE08C119943403B3CA85BA047D9947B1F3DBF1832709DAAF010DD2B62DC0
                                  Malicious:false
                                  Reputation:low
                                  Preview:...... ...... ..... ... .... ..... Brother..-----------------------------------------------........ - ... ...... .. .... ..... ......:..--------------------------------........ ..... ... .. ("EULA") ... .... ..... .... ("..." .. "..... ....") .-Brother Industries, Ltd... ("Brother"), ... .. .. .. ..... ..... ...... Brother ....... .... ... .. ........ ...... ........ .... ... ...... .......... ("....."). ...... ..... ...... .. .... "..." ..... ..-... ... ...... ......, ...... ./.. ...... ......, ... .... .. ...... ....... ..... .... ...... ... .. .... ..... ..... .... ...... .., Brother .. .... .. ...... ...... ..... ..... .. ..... ...... ....., .. ... ..... .. ..... ["....."] ..... ... ....... ...... .... .. ...... ..... .. ..... ............... ..........---------------------....1. ..... .........--------------------.......... ....... ..... ...... ........ .. .... ...... .., Brother ...... .. ...... ..... .... ...... ...... ..... ...:....1) ...... .... ... .. ...... .. .... ....
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (785), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):19224
                                  Entropy (8bit):3.7251391483692897
                                  Encrypted:false
                                  SSDEEP:384:pn3isxzuxttUY+bIpAqXAdOCRAKwo2yM/sUC103bmNr:pCF/Lh+MrKr
                                  MD5:66D285CBD0B59F9224B3693015A6375A
                                  SHA1:DF8A2F72083CE0980F9247F1CE79BCBA72EAEF50
                                  SHA-256:25A2CAF2EB4984303F5B6752EA3234B8FC7901C1C110CF1EE5F8751F254352F4
                                  SHA-512:4E5F73D14BD1FA292DC4F38264225BB0253D973A795E02912783642050BB9A07725414A4C6E50F7F6A63B3C756C7DDAAC226998DC69F79BE1CC14A09AFDA47E0
                                  Malicious:false
                                  Reputation:low
                                  Preview:.......... ............. ............. ....... ......... ........... .B.r.o.t.h.e.r. ................. .-. ..... ........... ...............:................. ............. ..... ............. ....... .(.".E.U.L.A.".). ........... ......... ........... ......... ......... .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d.... .. (.".B.r.o.t.h.e.r.".).,. ....... ..... ..... ............. ....... ............. ..... .B.r.o.t.h.e.r. .(......... ..... ............. ........... ............... ..................... .............,. ......... ........... .".........". ..."....... .........".). .(.........,. ."...........".). ....... ........... ..... ......... ..... ......... ..... ......... ......... ........... .....-....... ..... ....... ........... ..... ........... ............. ....... .(......... ......... ..... ......... ........... ................. ....... .".......". .(.A.c.c.e.p.t.).,. ."...........". .(.A.g.r.e.e.). ..... .".....". .(.Y.e.s.).)... . ............. ..... ........... .
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (858), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):10236
                                  Entropy (8bit):5.2277461909746545
                                  Encrypted:false
                                  SSDEEP:192:LyG9FOcXnEJXR5C/hxRyjsDcGt8juYra1P18XZD2YQEST3:LyGDEJC/hTubG18RXm
                                  MD5:82C5AEF9D63EBD4858F63D81985C2F7E
                                  SHA1:576A19A657DEC165A70BF68762E22E885574DB79
                                  SHA-256:B751DA953F69BA49936EF8DDE9AA0116E71F256ED608D6289C6D1B7736D3D23C
                                  SHA-512:3E50C1EB8463EF664FE462A6309D76DC9B7034835A18522F8394964CB643BB75471FF871FF122F45614F8C50321EACBA288052A5F1F5D207A102B03882D0843A
                                  Malicious:false
                                  Reputation:low
                                  Preview:..V.gfelhaszn.l.i licencszerz.d.s Brother szoftverhez..---------------------------------------------------....FONTOS INFORM.CI.K. K.RJ.K, OLVASSA EL A SZOFTVER TELEP.T.SE EL.TT:..------------------------------------------------------------------....A jelen V.gfelhaszn.l.i Licencszerz.d.s (End-User License Agreement), a tov.bbiakban .EULA., jogilag k.telez. meg.llapod.s .n .s a Brother Industries, Ltd, a tov.bbiakban .Brother" k.z.tt, amely a fenti Brother szoftver, valamint minden hozz. kapcsol.d. felhaszn.l.i .tmutat. .s elektronikus dokumentum, a tov.bbiakban .SZOFTVER., haszn.lat.t szab.lyozza. A SZOFTVER akkor lesz telep.tve, ha ezen a p.rbesz.dpanelen a .Tov.bb. gombra kattint. A SZOFTVER telep.t.s.vel, sokszoros.t.s.val .s/vagy haszn.lat.val .n elfogadja az EULA felt.teleit. Ha nem fogadja el az EULA felt.teleit, a Brother nem adja licencbe .nnek a SZOFTVERT, .s meg kell szak.tania a telep.t.si folyamatot az al.bbi [.M.gse.] gombra t.rt.n. kattint.ssal. Nyomtassa ki az EULA-t
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1213), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):26484
                                  Entropy (8bit):3.6001321042639276
                                  Encrypted:false
                                  SSDEEP:768:3HrbRPst8ma6UFCEzYXRLwfZR62TtQ+Am3esnsR:3HBPFma6UFCIYXRLwfZR625Ql5
                                  MD5:F315FB12240A2A246ADFEE22BCF41C02
                                  SHA1:653155BA52DAF421895109398C7156BCBB64EE39
                                  SHA-256:21C036AB7E7E76625E176503F72B38A3E80D79038F6F42B5F002632391B14BB5
                                  SHA-512:76EC4DDB856730942E60886618530A5433E588EB3F5CB5D5433B5E03BD28F80C641D042AB0B03369469F5D74101330B4A0D4EF5724BC70C9982207E37A6B3C01
                                  Malicious:false
                                  Reputation:low
                                  Preview:..V...g.f.e.l.h.a.s.z.n...l...i. .l.i.c.e.n.c.s.z.e.r.z.Q.d...s. .B.r.o.t.h.e.r. .s.z.o.f.t.v.e.r.h.e.z. .........F.O.N.T.O.S. .-. .K...R.J...K. .A.L.A.P.O.S.A.N. .O.L.V.A.S.S.A. .E.L.:.........E.z. .a. .v...g.f.e.l.h.a.s.z.n...l...i. .l.i.c.e.n.c.s.z.e.r.z.Q.d...s. .(.. E.U.L.A.. ). .e.g.y. .j.o.g.i.l.a.g. .k...t.e.l.e.z.Q. ...r.v...n.y.q. .s.z.e.r.z.Q.d...s. ...n. ...s. .a. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.. B.r.o.t.h.e.r.. ). .k...z...t.t.,. .m.e.l.y. .a.z.t. .s.z.a.b...l.y.o.z.z.a.,. .h.o.g.y.a.n. .h.a.s.z.n...l.h.a.t.j.a. ...n. .a.z.t. .a. .B.r.o.t.h.e.r. .s.z.o.f.t.v.e.r.t. .(.b.e.l.e...r.t.v.e. .a. .k.a.p.c.s.o.l...d... .f.e.l.h.a.s.z.n...l...i. .k...z.i.k...n.y.v.e.k.e.t. ...s. .e.l.e.k.t.r.o.n.i.k.u.s. .d.o.k.u.m.e.n.t.u.m.o.k.a.t.,. .m.i.n.t. .p...l.d...u.l. .a. .. s...g...t.. ...s. .a. .. o.l.v.a.s.s. .e.l.. .f...j.l.o.k.a.t.). .(.e.g.y...t.t.e.s.e.n. .. S.Z.O.F.T.V.E.R.. ).,. .a.m.e.l.y.e.k. .a.k.k.o.r. .k.e.r...l.n.e.k. .t.e.l.e.p...t...s.r.e.,. .h.a.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ISO-8859 text, with very long lines (956), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):10874
                                  Entropy (8bit):4.830217593329946
                                  Encrypted:false
                                  SSDEEP:192:uQCv9+lovyLrAQWVEadaEkCFdjd5X6l1QtCwCdg8Q7zC2Aw7CHXpP++I7c:uQwsCyLrAQWBdjhG8hd7C0+sc
                                  MD5:FBBE5737080955683A1F665707205438
                                  SHA1:CB3D22CC8EC214D70A0D3C42E09F7A91619B2A71
                                  SHA-256:E130CDBE4838B11DFEB359D6ACDB54333A49FE19AB713605AC149F105D53ED22
                                  SHA-512:2C1AE0EFBF03BF79F397EAB372BF776A1D79C7D4B9EFBA106499FB75F1B45ED5B41D48C7290022E3AC00AB3F2126BA33D16AE02530357D34195655CEA8FBE621
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Contratto di licenza con l'utente finale per software Brother..-----------------------------------------------....IMPORTANTE-LEGGERE ATTENTAMENTE PRIMA DI INSTALLARE IL SOFTWARE:..--------------------------------....Questo contratto di licenza con l'utente finale ("EULA") costituisce un contratto legale tra l'utente ("utente" o "utente finale") e Brother Industries, Ltd. ("Brother"), il quale disciplina l'uso del software Brother sopra descritto e gli eventuali manuali dell'utente e documenti elettronici ("SOFTWARE") ad esso associati. Il SOFTWARE viene installato se si preme il pulsante "Avanti" in questa finestra di dialogo. Installando, riproducendo e/o usando il SOFTWARE, si accetta di essere vincolati ai termini di questo EULA. Se non si accettano i termini di questo EULA, Brother non conceder. in licenza il SOFTWARE all'utente e l'utente dovr. interrompere immediatamente il processo di installazione facendo clic sul pulsante ["Annulla"] qui di seguito. . opportuno stampare
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1290), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):26666
                                  Entropy (8bit):3.357138786966732
                                  Encrypted:false
                                  SSDEEP:384:S8HnkYHmXmoLC8OeFiGonKwKxJ730aKoz9C4Ke6uNqdpNdk:LHnjGd2Kwa73OkRIq
                                  MD5:C9DC5C8589565519518D8D78F6A845CB
                                  SHA1:3D742C042C4629D192FBB296649EFEC25E3AE7E7
                                  SHA-256:88C873D46B59281E1DBD8AD553CF4148F153517FC793CC791E038070BEE5757E
                                  SHA-512:72DFF64E7375AB36B0EA08B95C4B869AB2F3FD51894EB0133AC6A182FC5276680E4D99E71874AD9F7D7EEF5A5668A65A89C1B0084BDFF077E21F56664B40FD2A
                                  Malicious:false
                                  Reputation:low
                                  Preview:..C.o.n.t.r.a.t.t.o. .d.i. .l.i.c.e.n.z.a. .c.o.n. .l.'.u.t.e.n.t.e. .f.i.n.a.l.e. .p.e.r. .s.o.f.t.w.a.r.e. .B.r.o.t.h.e.r. .........I.M.P.O.R.T.A.N.T.E. .-. .L.E.G.G.E.R.E. .A.T.T.E.N.T.A.M.E.N.T.E.:.........I.l. .p.r.e.s.e.n.t.e. .C.o.n.t.r.a.t.t.o. .d.i. .l.i.c.e.n.z.a. .c.o.n. .l.'.u.t.e.n.t.e. .f.i.n.a.l.e. .(.".E.U.L.A.".). ... .u.n. .a.c.c.o.r.d.o. .l.e.g.a.l.m.e.n.t.e. .v.i.n.c.o.l.a.n.t.e. .t.r.a. .l.'.u.t.e.n.t.e. .e. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.".B.r.o.t.h.e.r.".).,. .c.h.e. .d.i.s.c.i.p.l.i.n.a. .l.'.u.t.i.l.i.z.z.o. .d.e.l. .s.o.f.t.w.a.r.e. .B.r.o.t.h.e.r. .(.c.o.m.p.r.e.s.i. .i. .m.a.n.u.a.l.i. .u.t.e.n.t.e. .e. .l.a. .d.o.c.u.m.e.n.t.a.z.i.o.n.e. .e.l.e.t.t.r.o.n.i.c.a. .a.s.s.o.c.i.a.t.i.,. .c.o.m.e. .i.l. .f.i.l.e. .".h.e.l.p.". .e. .".r.e.a.d.m.e.".). .(.c.o.n.g.i.u.n.t.a.m.e.n.t.e.,. .".S.O.F.T.W.A.R.E.".). .c.h.e. .v.e.r.r... .i.n.s.t.a.l.l.a.t.o. .f.a.c.e.n.d.o. .c.l.i.c. .s.u. .u.n. .p.u.l.s.a.n.t.e. .o. .s.e.l.e.z.i.o.n.a.n.d.o. .u.n.a.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (754), with CRLF, NEL line terminators
                                  Category:dropped
                                  Size (bytes):7561
                                  Entropy (8bit):5.913703142293994
                                  Encrypted:false
                                  SSDEEP:96:IKV4sW+Ft4CC/jw+WBo9VCFI8MfPcK8v03oLU+yQhw3E5tdJERyZVz49C6bqnLva:IKk+FqCCNWy8Mc3ciXC3E5td3kqt+WK1
                                  MD5:17442AD1A75F2891A08E1F95F3B472B2
                                  SHA1:A54A17205D24F98FA47F0D47234DE32B980A7952
                                  SHA-256:28391D791446A765E7DCE250E57CCC6E6B07661D0B2527399A81193B4BD11F93
                                  SHA-512:7D980AA9CFA50203FD21E9972748D5B94EFF5356E00596BD60B6A87EA7725AAE86703AE202BBC8F451E506EB71B0B236F502DA7425C709488BC3A303665F0D71
                                  Malicious:false
                                  Reputation:low
                                  Preview:.....g.p....._.......d.v.I.I.@.......C.Z...X._...................B..-------------------------------------------------------.....{.g.p....._.. (....u.{._..v) ..A..L........u...U.[ .\.t.g.E.F.A.i.C...X.g.[........C...X.g.[.......A.b.v.f.[.g.R...e...c........j(....u.{.\.t.g.E.F.A.v) ......A...q.l (..l.....@.l) ..u...U.[.H........i....u....v.j............._.....B.{.\.t.g.E.F.A..A...q.l...C...X.g.[....g.p....._..y.[.W...\.......{._........A[....].....[...].{.^.....N...b.N.........C...X.g.[........L.\.t.g.E.F.A.A......A.....}..A..... (.}.j...A.........).A.....I.....C.......d.q............B.{.\.t.g.E.F.A...C...X.g.[...A.....A.....g.p...........A...q.l..{._........S...........................B.{._...................A.....A...q.l..{.\.t.g.E.F.A.................A[......].{.^.....N...b.N...C...X.g.[.....f..........B...q.l...A.Q......{._....v.....g.A.E.g.........
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (501), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):10108
                                  Entropy (8bit):5.757187546644224
                                  Encrypted:false
                                  SSDEEP:192:1fEO2dFkPfYzFFuFmripNK0L1AJMbtFEgg:1yPsOyNx3I
                                  MD5:082449C01975D9BB0934561757CF607E
                                  SHA1:E87052ACCB4F886CC2A1174B69B977B6A3965378
                                  SHA-256:317DBCE10E40908EE8CF58739708BEA5C690CFA760BFACCACB9C688A1575C4CC
                                  SHA-512:96733CFAD1184781B097AFF7B894ACB582F6E022D5B18E7EA52B5159547C665FA8EB811196258884B27FBE44D621E99F5F1DFD98F6B9F4AF5A92E04AF08214FE
                                  Malicious:false
                                  Reputation:low
                                  Preview:...0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0QY.}................0.0O0J0...0.NU0D0............S0n0.0.0.0.0.0.0.0.0.0.0.0.0.0QY.}.0...N.N.0.0,gQY.}.0h0D0D0~0Y0..o0.0J0.[.iL0S0n0.0.0.0.0.0.0.0.0.0.Nn0.0.b...0.0.0o0D0.0.0.So0.0.T.aW0~0Y0.0I{.0J0.[.iL0,gQY.}.Q.[k0.T.aU0.0_0S0h0.0:yY0.0.0.0.0.0.0.0.0...W0O0o0.0.0.0.0I{.0?ceQ..Y0.0h0.0.0.0.0.0.0U0.0.0.0.0.0.0.0.0...N^\n0.0.0.0.0.0.0.0.0.0.0r.e.a.d. .m.e.I{n0.0.0.0.0.0.0^..0+T.0.0.N.N.0.0,g.0.0.0.0.0.0.0h0D0D0~0Y0..k0d0D0f0.0J0.[.i.TMOh0.0.0.0.0.]mi*h._.O>y...N.N.0.0._>y.0h0D0D0~0Y0..L0.}P}Y0.0QY.}g0Y0.0,gQY.}.Q.[k0T0.T.a..Q0.04X.Tn0.0.0S0n0.0.0.0.0.0.0.0.0.0.Nn0.0.T.a.0.0:yY0.0.0.0.0.0.0.0.0...W0O0o0.0.0.0.0I{.0?ceQ..W0f0.NU0D0.0.0W0J0.[.iL0,gQY.}.Q.[k0T0.T.a..Q0j0D04X.T.0J0.[.io0,g.0.0.0.0.0.0.0T0)R(u..O0S0h0L0g0M0~0[0.0.0.........O(u1...ag.N..........1... . .)j)Rn00^^\....,g.0.0.0.0.0.0..,g.0.0.0.0.0.0k0D}.0..~0.0_0.0.0.0.0.0.0,g.0.0.0.0.0.0k0+T~0.0.0.e.f.0.0.0.0.0.0.Q.w.0.R;uI{n0.0.0.0.0.0.0+T.0~0Y0L0.0S0.0k0P..0~0[0.0.0..k0..Y0.0.N
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ISO-8859 text, with very long lines (696), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):7996
                                  Entropy (8bit):5.776333301861149
                                  Encrypted:false
                                  SSDEEP:192:zuKTyjwRNN5wkbnZzUHNuSyRTypSCwVwVq:zujwRNN5fbnZ4t5/MVwVq
                                  MD5:E3684BDBB513E073B9664E243584EB59
                                  SHA1:5744B1D53E5239F6F4D1D86A38BDEEBD306A0E3D
                                  SHA-256:562B3DDDA4FAD1D0E86A9371BC64FDD56B7469715ABAAC2285717E292A601EC8
                                  SHA-512:E5B4154D335C52AFECEA98BFFE0F45BD4187110EDA55B2AE698D0788C7DA474433C21F589E192EC219506B92F8E77ED1CEA151AB8BE115D0603E2A67CEEB97EB
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother ......... .... ..... ....... .....-----------------------------------------------.......-......... ...... .... ..... ... ........-----------------------------------------------...... .... ..... ....... ...("EULA").. ....("...." ... ".... .....") .. Brother Industries, Ltd.("Brother") .... ..... ......, ...... ...... Brother ......... .. ... .... ..... ...... .... ....(".........").. ... ........ .......... .. ... ....... "...." ..... ...... ........ .. ......... ..., .... ../... ...... .. EULA.. ... .... ....... ...... ........ .. EULA.. ..... ........ .... ... Brother.. ....... ......... ......... ....... ...... ..... ["..."] ..... ...... ... ... ......... ....... ..... .... ...... .... .. EULA.. .... ..... .... ................ .....---------------------....1. ....... ......--------------------...... EULA.. ... ..... ....... ....... ... Brother.. .... .. .... ........ ......
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (495), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):11832
                                  Entropy (8bit):5.570471681571695
                                  Encrypted:false
                                  SSDEEP:192:olCQpc/CHY7tuzVWSZ+UUy6Fyg0XVvZIpVpGxjPFbi9ByP1/i3pb:nkrNInyVvxz8Dy963N
                                  MD5:80A9B0F9DBC72954F10ADCB996DC3C3B
                                  SHA1:025490EC2FCA091267A2A2A7EC2C9A77D60D335E
                                  SHA-256:4BC431DD6E59F647B3EACDFBC86B2F8B0911352C4C9DC1F00B5C6CD69A139AF3
                                  SHA-512:8E58D9DF9108538AB40A1FEF70391025F01C512E619A46514767A0EC5A32EE7B278CCEAB3679489020F48FEE46F8C1450233F5CD0C1538CFFEC0E104249E7630
                                  Malicious:false
                                  Reputation:low
                                  Preview:..B.r.o.t.h.e.r. ......... .\.. ...... .|.t.<... ..}. ............ .-. ..L. .....D. ...X. .J... .}.. .....X.....$............. .\.. ...... .|.t.<... ..X... .(.".E.U.L.A.".)... ......@. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d...(.t.X. .".B.r.o.t.h.e.r.".). ...X. ..... ..}.<.\.h. ........ ... ...T.....X. .....D. ...t.p... .....(."...x.".,. ."..X.".,. ."...". ..<.\. .\....... .....t.. ...T.....)... ...l.h.<.\.h. ..X.|. .\...\. ....... .$.X..... .B.r.o.t.h.e.r. .........(...(. ...... ..t... ... .".....". ... ."......(.r.e.a.d. .m.e.).". ...|. ..X. .... .8... ...h.).(...i...<.\.,. .".........".|. .h.).X. .t.... ....)..... . ...X...... ..X. .X..|. ........ .....D. ...t.p... ....... ...l.h.<.\.h. ... .E.U.L.A. .p.m.X. ..... .l...%... ..X.X.... .)..... . . ... .E.U.L.A.X. .p.t... ..X.X... .J.<... ..... .........X. .|.t.<...|. ...<... ... ........ . ....\. ..... .t... ....... ... .........|. .....`. ... ................t.. .}.......
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (908), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):10197
                                  Entropy (8bit):4.906543786597085
                                  Encrypted:false
                                  SSDEEP:192:THLcnTHN3DvlrBK+v585ZDfvymccW+X8iupff5RTbAZnhUGIB:PcnB3Dv1BK+oZDfvymvLXeBHUhvIB
                                  MD5:C049DAA01E4CBC3CB1BB64AB468127E3
                                  SHA1:F090125FC5635D80FE76960004DE40FF59B96F5A
                                  SHA-256:03A7C2322B783CFF39F8E6DE25A0F065D9998216514E49BAEB9DB56D2F813150
                                  SHA-512:EEADB7FA229BE24E0CE31E35F880FE484B259978E63AD818BDCEAC9F4203E3D84DE540A064683761ABB195CCCD78462AB31F2841FDAA3C89E5841210AA6A1616
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Lisensavtale for sluttbrukere av Brother-programvare..----------------------------------------------------....VIKTIG . LES N.YE F.R DU INSTALLERER PROGRAMVAREN:..-------------------------------------------------....Denne lisensavtalen for sluttbrukere ("EULA-en") er en juridisk avtale mellom deg ("du" eller "sluttbrukeren") og Brother Industries, Ltd. ("Brother"). Avtalen regulerer din bruk av Brother-programvaren som er beskrevet ovenfor, og alle tilh.rende brukermanualer og elektroniske dokumenter ("PROGRAMVAREN"). PROGRAMVAREN vil installeres hvis du trykker p. Neste-knappen i denne dialogboksen. Ved . installere, reprodusere og/eller bruke PROGRAMVAREN godtar du . v.re bundet av vilk.rene i denne EULA-en. Hvis du ikke godtar vilk.rene i denne EULA-en, vil Brother ikke lisensiere PROGRAMVAREN til deg, og du m. avslutte installeringsprosessen n. ved . klikke p. ["Avbryt"]-knappen nedenfor. Du b.r skrive ut en kopi av denne EULA-en for fremtidige referanseform.l.........Vilk.r o
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1102), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):25424
                                  Entropy (8bit):3.3858672286951474
                                  Encrypted:false
                                  SSDEEP:384:o5q7Pke7f3a4Ct4U7K8RVQ+TIbcZlz4RcXBWXdm:o5qLTz3a4Ct4U7KwVQ+TIbKUCBW4
                                  MD5:E6A3B12AFFECF4F1DB44DE12B708853D
                                  SHA1:6E7DBDEC10D693C27E5E6E256CD5B8BD437543AC
                                  SHA-256:4FF718700AD7A6C475E45334ABD4A4F231DA7ECAD1149B95A049C68631C5C731
                                  SHA-512:94AF4486079F1BA4666006FDCBD9B552C7B6EDDC0D0143D7F835C1B4446F43474E43771E01F7FB69BC172E12D41A2732AA59BB6E15720BA8E60D7386F180B397
                                  Malicious:false
                                  Reputation:low
                                  Preview:..L.i.s.e.n.s.a.v.t.a.l.e. .f.o.r. .s.l.u.t.t.b.r.u.k.e.r.e. .a.v. .B.r.o.t.h.e.r.-.p.r.o.g.r.a.m.v.a.r.e. .........V.I.K.T.I.G. .. .L.E.S. .N...Y.E. .G.J.E.N.N.O.M.:.........D.e.n.n.e. .l.i.s.e.n.s.a.v.t.a.l.e.n. .f.o.r. .s.l.u.t.t.b.r.u.k.e.r.e. .(.".E.U.L.A.".). .e.r. .e.n. .j.u.r.i.d.i.s.k. .a.v.t.a.l.e. .m.e.l.l.o.m. .d.e.g. .o.g. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.".B.r.o.t.h.e.r.".).,. .s.o.m. .b.e.s.t.e.m.m.e.r. .b.r.u.k.e.n. .d.i.n. .a.v. .B.r.o.t.h.e.r.-.p.r.o.g.r.a.m.v.a.r.e.n. .(.i.n.k.l.u.d.e.r.t. .t.i.l.k.n.y.t.t.e.d.e. .b.r.u.k.e.r.v.e.i.l.e.d.n.i.n.g.e.r. .o.g. .e.l.e.k.t.r.o.n.i.s.k.e. .d.o.k.u.m.e.n.t.e.r. .s.l.i.k. .s.o.m. .".h.j.e.l.p.". .o.g. .".l.e.s. .m.e.g.".-.f.i.l.e.r.). .(.s.a.m.l.e.t. .o.m.t.a.l.t. .s.o.m. .".P.R.O.G.R.A.M.V.A.R.E.".). .s.o.m. .v.i.l. .b.l.i. .i.n.s.t.a.l.l.e.r.t. .h.v.i.s. .d.u. .t.r.y.k.k.e.r. .p... .e.n. .k.n.a.p.p. .e.l.l.e.r. .m.e.r.k.e.r. .e.n. .b.o.k.s. .p... .d.e.n.n.e. .d.i.a.l.o.g.b.o.k.s.e.n.,. .h.v.i.l.k.e.t. .
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (974), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):11236
                                  Entropy (8bit):5.27453527216045
                                  Encrypted:false
                                  SSDEEP:192:XwWLEIqdZQiOYQdwmhNgsHSxCMl8XO7PHkcgVN9a5kcP8Q:AW7qd2iOtwmhuV9l8XG7grAi8
                                  MD5:DAEB25B5C3B4BFB055BCD6C5D4111B6A
                                  SHA1:AEB0BFDC5DF179F44BAAC0F6F839E3BE94B8C78A
                                  SHA-256:F5473164E0B8DF8EDE3B35FC1817D2964F50E36200C2A26A366D3CC1E36E5408
                                  SHA-512:AABD88884A77354BA51F3694766757685F1A7E4E23BC24558C091370E41DD9E8FA98FAC62218D2FBE81EAACDF17CD36359A047C3C28E1153A1C853D1C303FCB1
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Umowa licencyjna u.ytkownika ko.cowego oprogramowania Brother..-------------------------------------------------------------....WA.NE: NALE.Y PRZECZYTA. UWA.NIE PRZED INSTALACJ. PONI.SZEGO OPROGRAMOWANIA:..---------------------------------------------------------------------------......Niniejsza Umowa licencyjna u.ytkownika ko.cowego (.EULA.) stanowi prawne porozumienie pomi.dzy u.ytkownikiem (.U.ytkownikiem. lub .U.ytkownikiem ko.cowym.) a firm. Brother Industries, Ltd. (.Brother.), okre.laj.ce spos.b korzystania z oprogramowania firmy Brother opisanego powy.ej oraz wszelkich powi.zanych instrukcji u.ytkownika i dokument.w elektronicznych (.OPROGRAMOWANIA.). OPROGRAMOWANIE zostanie zainstalowane po naci.ni.ciu przycisku .Dalej. w poni.szym oknie dialogowym. Instaluj.c, odtwarzaj.c i (lub) u.ywaj.c OPROGRAMOWANIE u.ytkownik zobowi.zuje si. przestrzega. warunk.w niniejszej umowy EULA. Je.li U.ytkownik nie wyra.a zgody na warunki niniejszej umowy EULA, firma Brother nie udzieli U.yt
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1212), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):28998
                                  Entropy (8bit):3.6733021954423153
                                  Encrypted:false
                                  SSDEEP:768:wuL1cpYe/rQ+hU1LxoQq/rgupSkX4naDfbNaDlUiRjEBgki:wuL1IYV+hMLxoQq/00ZGaDfAlUyvn
                                  MD5:A7661DB02E208D8755E07E3B997DEB86
                                  SHA1:0A9C0775E8D3AA350E350E78D074A8391BB41ADB
                                  SHA-256:6F96542E21C0702EA7E963BF0C638D7F3F8D4D0DAEB663A39239D821EA5F1B5B
                                  SHA-512:D7F65E90F5B23B7D4DFAC34601FF50A81DF7E3E73217969AB95A445431FA6A72BBD37CB6BA1C915DDD64EE94B1B4C3BE89E5829BBFE4BAC3EF1090359E793B8A
                                  Malicious:false
                                  Reputation:low
                                  Preview:..U.m.o.w.a. .l.i.c.e.n.c.y.j.n.a. .u.|.y.t.k.o.w.n.i.k.a. .k.o.D.c.o.w.e.g.o. .o.p.r.o.g.r.a.m.o.w.a.n.i.a. .B.r.o.t.h.e.r. .........W.A.{.N.E. .. .P.R.O.S.Z... .U.W.A.{.N.I.E. .P.R.Z.E.C.Z.Y.T.A...:.........N.i.n.i.e.j.s.z.a. .U.m.o.w.a. .l.i.c.e.n.c.y.j.n.a. .u.|.y.t.k.o.w.n.i.k.a. .k.o.D.c.o.w.e.g.o. .(.. E.U.L.A.. ). .j.e.s.t. .p.r.a.w.n... .u.m.o.w... .p.o.m.i...d.z.y. .U.|.y.t.k.o.w.n.i.k.i.e.m. .a. .f.i.r.m... .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.. B.r.o.t.h.e.r.. ).,. .k.t...r.a. .r.e.g.u.l.u.j.e. .k.o.r.z.y.s.t.a.n.i.e. .p.r.z.e.z. .U.|.y.t.k.o.w.n.i.k.a. .z. .o.p.r.o.g.r.a.m.o.w.a.n.i.a. .B.r.o.t.h.e.r. .(.w. .t.y.m. .p.o.w.i...z.a.n.y.c.h. .p.o.d.r...c.z.n.i.k...w. .u.|.y.t.k.o.w.n.i.k.a. .i. .d.o.k.u.m.e.n.t...w. .w. .f.o.r.m.i.e. .e.l.e.k.t.r.o.n.i.c.z.n.e.j.,. .n.p... .p.l.i.k...w. .. h.e.l.p.. .i. .. r.e.a.d. .m.e.. ). .(.B...c.z.n.i.e. .z.w.a.n.y.c.h. .. O.P.R.O.G.R.A.M.O.W.A.N.I.E.M.. ).,. .k.t...r.e. .z.o.s.t.a.n.i.e. .z.a.i.n.s.t.a.l.o.w.a.n.e. .p.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (941), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):11120
                                  Entropy (8bit):4.892263454061196
                                  Encrypted:false
                                  SSDEEP:192:u2ojQ9GPIRtsUvhz0y8otvP6cqKdUPNCrFh16DTuYm6ifeB864:u2ojQ9GPIRtsUvb8oV6cqKdUA71CTAfn
                                  MD5:93278359C37C14490F886A2E56D6DFB2
                                  SHA1:E284B2431FA7BA7960CB373846A2F2B3D0B0EA7C
                                  SHA-256:443B0FA920A72D5209381F7D7B6287778FC84857646891E7A9141ECB166CFF9C
                                  SHA-512:CF993172BBEDFBC19DE70109D9334EEF0C1C74CA557B318617B660589EA8A78F0F23BEF855E31B3FC3D484951EC62E106B9352510E0ABD74361138D970142248
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Contrato de licen.a do utilizador final para software Brother..-------------------------------------------------------------....IMPORTANTE . LEIA ATENTAMENTE ANTES DE INSTALAR O SOFTWARE:..----------------------------------------------------------....Este contrato de licen.a do utilizador final (.Contrato.) . um contrato legal entre o adquirente (.utilizador. ou .utilizador final.) e a Brother Industries, Ltd. (.Brother.) que rege a utiliza..o do software Brother acima descrito e todos e quaisquer manuais do utilizador e documentos eletr.nicos associados (.SOFTWARE.). O SOFTWARE ser. instalado se premir o bot.o .Seguinte. nesta caixa de di.logo. Ao instalar, reproduzir e/ou utilizar o SOFTWARE, o utilizador aceita ficar vinculado aos termos deste Contrato. Caso n.o concorde com os termos deste Contrato, a Brother n.o licenciar. o SOFTWARE ao utilizador e o mesmo tem de interromper o processo de instala..o nesta altura ao clicar no bot.o .Cancelar. abaixo. O utilizador deve imprim
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1293), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):27682
                                  Entropy (8bit):3.401607132237301
                                  Encrypted:false
                                  SSDEEP:384:P544y0ytV/zQ4JlZSYyHNetZZfhHimaVxcJ3R:P5nQ7QemtwhhHPJh
                                  MD5:3686412AE35980744890AC64888D7D9F
                                  SHA1:9A24A9DA391959F96AE4C54AD9F4BF5C479C327C
                                  SHA-256:AB67728554F60C0E8A54F0AA582F75E2DBD3F8F11585BBEAFAF781173808E6CC
                                  SHA-512:4A3F587489784EC63490E4EBE341DDDBA74CD05C0E120DB1EE2039A9D1DC6B5879E8872830975EFE506C09E0F92BB3BD4BDF4623BA45C573777F08423B4FA01E
                                  Malicious:false
                                  Reputation:low
                                  Preview:..C.o.n.t.r.a.t.o. .d.e. .l.i.c.e.n...a. .d.o. .u.t.i.l.i.z.a.d.o.r. .f.i.n.a.l. .p.a.r.a. .s.o.f.t.w.a.r.e. .B.r.o.t.h.e.r. .........I.M.P.O.R.T.A.N.T.E. .. .L.E.I.A. .A.T.E.N.T.A.M.E.N.T.E.:.........E.s.t.e. .c.o.n.t.r.a.t.o. .d.e. .l.i.c.e.n...a. .d.o. .u.t.i.l.i.z.a.d.o.r. .f.i.n.a.l. .(.. C.o.n.t.r.a.t.o.. ). ... .u.m. .c.o.n.t.r.a.t.o. .l.e.g.a.l. .e.n.t.r.e. .o. .u.t.i.l.i.z.a.d.o.r. .e. .a. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.. B.r.o.t.h.e.r.. ). .q.u.e. .r.e.g.e. .a. .u.t.i.l.i.z.a.....o. .d.o. .s.o.f.t.w.a.r.e. .B.r.o.t.h.e.r. .(.i.n.c.l.u.i.n.d.o. .m.a.n.u.a.i.s. .d.o. .u.t.i.l.i.z.a.d.o.r. .e. .d.o.c.u.m.e.n.t.o.s. .e.l.e.t.r...n.i.c.o.s. .a.s.s.o.c.i.a.d.o.s.,. .c.o.m.o. .f.i.c.h.e.i.r.o.s. .d.e. .. A.j.u.d.a.. .e. .. L.e.i.a.-.m.e.. ). .(.c.o.l.e.t.i.v.a.m.e.n.t.e.,. .. S.O.F.T.W.A.R.E.. ). .q.u.e. .s.e.r... .i.n.s.t.a.l.a.d.o. .s.e. .o. .u.t.i.l.i.z.a.d.o.r. .p.r.e.m.i.r. .u.m. .b.o.t...o. .o.u. .c.o.l.o.c.a.r. .u.m. .v.i.s.t.o. .n.e.s.t.a. .c.a.i.x.a.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ISO-8859 text, with very long lines (868), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):10365
                                  Entropy (8bit):4.929601609638811
                                  Encrypted:false
                                  SSDEEP:192:ugH8FlrXmedh43O8EpxpYO9TVLD5ELZksu1IxvnSwJKPNY4whINBxMa9F52VPr1N:ugcFZXmed+3O8EBYO9TVLO9OW/SwJKPw
                                  MD5:E0725355207F9D55AB0D54E8DCC38793
                                  SHA1:3B721EAC5ADB14B6EB4A1B049D1200D435C51276
                                  SHA-256:56D996A1ECD1779D40FBA18A330E1A5BA10C85EF7B20FDF5674CE92039DE3BFD
                                  SHA-512:7BE1429E96F45AA76A17F35F1002552D439FAA1C80DB88D9170BCDC55AAF0B13FCCB3B831ACD718A13FE09FF9A330C87FA6E1D9C9C7802E04BDAE21D8C7E1B2C
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Contrato de Licen.a de Usu.rio Final para Software da Brother..-----------------------------------------------....IMPORTANTE-LEIA COM ATEN..O ANTES DE INSTALAR O SOFTWARE:..--------------------------------....Este Contrato de Licen.a de Usu.rio Final ("EULA" - End-User License Agreement) . um contrato legal entre voc. ("voc." ou "usu.rio final") e a Brother Industries, Ltd. ("Brother"), que regula o uso do software da Brother descrito acima e quaisquer e todos os manuais de usu.rio associados e documentos eletr.nicos ("SOFTWARE"). O SOFTWARE ser. instalado se voc. pressionar o bot.o "Avan.ar" na Caixa de Di.logo. Ao instalar, reproduzir e/ou usar o SOFTWARE, voc. concorda em acatar os termos deste EULA. Se voc. n.o concordar com os termos deste EULA, a Brother n.o licenciar. o SOFTWARE para voc. e voc. deve parar o processo de instala..o agora clicando no bot.o ["Cancelar"] abaixo. Voc. deve imprimir uma c.pia deste EULA para refer.ncia futura.........Termos e Condi..es...-------
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1168), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):25606
                                  Entropy (8bit):3.4161341209149474
                                  Encrypted:false
                                  SSDEEP:384:D/g9y1+kZskMeHdBUpbiXexvCEw99imLoTMs+Bl:D/gsLiH2LUFiYvw3AMsel
                                  MD5:FBE1A98566330E028085AE8709D9126E
                                  SHA1:94159E2B0C79C98BE727648BDF1B56004B963961
                                  SHA-256:832DFA9E8109EF8A274D8246BE9A0BBA14FE2D24BAC39371A03B319B552460CE
                                  SHA-512:CF31BAE1B4D1F1FD5C3AFB4CA34CA7807FE87DC4C3CCA7D4F0A73B359A2D0077CEA60E2D73824242EEEDD8C62F58989C52028E4BA9AE49A962EC9A989F6C2E1A
                                  Malicious:false
                                  Reputation:low
                                  Preview:..C.o.n.t.r.a.t.o. .d.e. .L.i.c.e.n...a. .d.e. .U.s.u...r.i.o. .F.i.n.a.l. .p.a.r.a. .S.o.f.t.w.a.r.e. .d.a. .B.r.o.t.h.e.r. .........I.M.P.O.R.T.A.N.T.E. .-. .L.E.I.A. .A.T.E.N.T.A.M.E.N.T.E.:.........E.s.t.e. .C.o.n.t.r.a.t.o. .d.e. .L.i.c.e.n...a. .d.e. .U.s.u...r.i.o. .F.i.n.a.l. .(.".E.U.L.A.".). ... .u.m. .a.c.o.r.d.o. .l.e.g.a.l. .e.n.t.r.e. .v.o.c... .e. .a. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.".B.r.o.t.h.e.r.".).,. .q.u.e. .r.e.g.u.l.a. .a. .u.t.i.l.i.z.a.....o. .d.o. .s.o.f.t.w.a.r.e. .B.r.o.t.h.e.r. .(.i.n.c.l.u.i.n.d.o. .m.a.n.u.a.i.s. .d.e. .u.s.u...r.i.o. .a.s.s.o.c.i.a.d.o.s. .e. .d.o.c.u.m.e.n.t.o.s. .e.l.e.t.r...n.i.c.o.s.,. .c.o.m.o. .a.r.q.u.i.v.o.s. .".a.j.u.d.a.". .e. .".l.e.i.a.-.m.e.".). .(.c.o.l.e.t.i.v.a.m.e.n.t.e.,. .".S.O.F.T.W.A.R.E.".). .q.u.e. .s.e.r... .i.n.s.t.a.l.a.d.o. .s.e. .v.o.c... .p.r.e.s.s.i.o.n.a.r. .u.m. .b.o.t...o. .o.u. .m.a.r.c.a.r. .u.m.a. .c.a.i.x.a. .n.e.s.t.a. .C.a.i.x.a. .d.e. .D.i...l.o.g.o. .q.u.e. .i.n.d.i.q.u.e. .s.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ASCII text, with very long lines (831), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):9617
                                  Entropy (8bit):4.882486116465403
                                  Encrypted:false
                                  SSDEEP:192:IEH4Ii3gWxmFSEimGOvD5jnclZ5T2pe6q4hLOb5ns:IE4Ii3gSoievljczjzq
                                  MD5:CDA2A13690AF47214509889267F132AB
                                  SHA1:F54665C9F5862A7F077B7D7CE08301BEAB9D177D
                                  SHA-256:62E904E360D6D698FFF45F90F8F92F2804116971DF2368EF5BEE0613D1F702E1
                                  SHA-512:2BDD9FC617E6CDF13EEE263A994185F53DEAFAC480AD9AAF52DC4C142A080A5412F149469A56D9C586FEF575FCBBF0959A8298547F89EAD417C4B17BF2EA55DC
                                  Malicious:false
                                  Reputation:low
                                  Preview:..End-User License Agreement for Brother Software....IMPORTANT-PLEASE READ CAREFULLY BEFORE INSTALLING THE SOFTWARE:....This End-User License Agreement ("EULA") is a legal agreement between you ("you" or "End-user") and Brother Industries, Ltd. ("Brother"), which governs your use of the Brother software described above and any and all associated user manuals and electronic documents ("SOFTWARE"). The SOFTWARE will be installed if you press the "Next" button on this Dialog Box. By installing, reproducing and/or using the SOFTWARE, you agree to be bound by the terms of this EULA. If you do not agree to the terms of this EULA, Brother will not license the SOFTWARE to you and you must stop the installation process now by clicking the ["Cancel"] button below. You should print a copy of this EULA for future reference.....Terms and Conditions...---------------------..1. Grant of License...--------------------....In consideration of you agreeing to abide by the terms and conditions of this
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1250), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):28190
                                  Entropy (8bit):3.5101525990490816
                                  Encrypted:false
                                  SSDEEP:768:XVMJRGAhsILGgZxnyjyMlB4cBDTnM7Nhvi8w4YBDjZ/:+JRAdJlBVRbsu
                                  MD5:B70D678533B2B8E40AB35DBC49454547
                                  SHA1:2EF64EA2B80466ABAAA00F5DE112452AD18690DA
                                  SHA-256:D45874DDA80993B888FF1A3A9418016A81C561039F9E9A5D2B3A310EBA6AE5B1
                                  SHA-512:C3ED692FDE73EA3A97C709FAF4A081BBD80440A1ED445C985DFDBCA7126C14EBFDD979B4B41844A5251631DACD44D6B25870AFBDBAFCC4193D775366B22FA949
                                  Malicious:false
                                  Reputation:low
                                  Preview:..A.c.o.r.d. .d.e. .l.i.c.e.n.c... .p.e.n.t.r.u. .u.t.i.l.i.z.a.t.o.r.u.l. .f.i.n.a.l. .p.e.n.t.r.u. .s.o.f.t.w.a.r.e.-.u.l. .B.r.o.t.h.e.r. .........I.M.P.O.R.T.A.N.T. .-. .C.I.T.I.b.I. .C.U. .A.T.E.N.b.I.E.:.........P.r.e.z.e.n.t.u.l. .a.c.o.r.d. .d.e. .l.i.c.e.n.c... .p.e.n.t.r.u. .u.t.i.l.i.z.a.t.o.r.u.l. .f.i.n.a.l. .(.. A.L.U.F.. ). .r.e.p.r.e.z.i.n.t... .u.n. .a.c.o.r.d. .l.e.g.a.l. ...n.t.r.e. .d.v.s... ._.i. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.. B.r.o.t.h.e.r.. ).,. .c.a.r.e. .r.e.g.l.e.m.e.n.t.e.a.z... .m.o.d.u.l. .d.e. .u.t.i.l.i.z.a.r.e. .a. .s.o.f.t.w.a.r.e.-.u.l.u.i. .B.r.o.t.h.e.r. .(.i.n.c.l.u.s.i.v. .m.a.n.u.a.l.e.l.e. .d.e. .u.t.i.l.i.z.a.r.e. .a.s.o.c.i.a.t.e. ._.i. .d.o.c.u.m.e.n.t.e.l.e. ...n. .f.o.r.m.a.t. .e.l.e.c.t.r.o.n.i.c.,. .p.r.e.c.u.m. ._.i. .f.i._.i.e.r.e.l.e. .d.e. .t.i.p. .. h.e.l.p.. .(.a.j.u.t.o.r.). ._.i. .. r.e.a.d. .m.e.. .(.c.i.t.e._.t.e.-.m...).). .(.d.e.n.u.m.i.t. .g.e.n.e.r.i.c. .. S.O.F.T.W.A.R.E.. ). .c.a.r.e. .v.a. .f.i. .
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (931), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):10156
                                  Entropy (8bit):5.193258476964147
                                  Encrypted:false
                                  SSDEEP:192:8UYytofiunSfxF71vrWwFR6/5B4aaiubJXcT0ChcC:YfhSBb4U1JFnsl
                                  MD5:C772183CB328DDAA1476A5C3819984EA
                                  SHA1:4B6D31963AC914884EABEF9548A45926E8840F61
                                  SHA-256:3443726EBBF13E2DCB2B263F30762134C576EC7FA2E933F4F05117F3C3F1B996
                                  SHA-512:2FC4729E8615CE73363D2D6FBB253E25676BFD36641E06549FE5AB73A36DC0AF6AD7A8082A878773FAE5B0DB4BA636F14AC7E477A2179542AEEA763DF34A0027
                                  Malicious:false
                                  Reputation:low
                                  Preview:.............. .......... . ........ ............. ............ ........... Brother..-----------------------------------------------.........! ........... ............ . ....... .......... ..... .......... ............ ..............--------------------------------............. ............ .......... . ........ ............. (..... ............ ..........) ............ ..... ........... .......... ..... .... (..... .. ... ........ ............) . ......... Brother Industries, Ltd. (..... Brother), ....... .............. ............. .... ........... .... ............ ........... Brother, . ..... .... ......... . ... .......... ............ . ........... .......... (..... ..). .... .. ....... ...... ...... . .... .......... ...., .. ..... .......... ..... ........... ... ......., ............ ./... ......... ... .., .. ............ ......... ... ....... ....... ............. ........... .... .. .. ........ . ........... ....... ............. .........., ........ Brother ..
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1061), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):24204
                                  Entropy (8bit):3.8577591649073604
                                  Encrypted:false
                                  SSDEEP:192:ZMVflY3mDP2lUtcpMSFnHrRIp4ToXShYkZfono17N8aglWOB7KqHkc:ZE6376gMSFnHrRaXswihKcOB7KqHkc
                                  MD5:F5E7C46492D8355E93AF862EDC0D2367
                                  SHA1:A16DFBADF28BE480FF979034BDBD8585D9610451
                                  SHA-256:68C711F66204AA9CDD53CBE74FDC3B89097EC8D97DD8ABDAA024EB72E1AF0B7A
                                  SHA-512:1B78B46D7C3817E37775A4E790D02744B419604D35EE805CF3F0E3E891D3053EE53FA59BB7CFECDCCDA0EBF37C7D8DFB9D16F2BA712A7DCA2F34A5F180A3CFC6
                                  Malicious:false
                                  Reputation:low
                                  Preview:....8.F.5.=.7.8.>.=.=.>.5. .A.>.3.;.0.H.5.=.8.5. .A. .:.>.=.5.G.=.K.<. .?.>.;.L.7.>.2.0.B.5.;.5.<. .=.0. .?.@.>.3.@.0.<.<.=.>.5. .>.1.5.A.?.5.G.5.=.8.5. .B.r.o.t.h.e.r. .................../. .....$... .....&.../.!. ...........".....,..... .....#.'..."... ...............-.B.>. .;.8.F.5.=.7.8.>.=.=.>.5. .A.>.3.;.0.H.5.=.8.5. .A. .:.>.=.5.G.=.K.<. .?.>.;.L.7.>.2.0.B.5.;.5.<. .(.4.0.;.5.5.... .!.>.3.;.0.H.5.=.8.5.). .O.2.;.O.5.B.A.O. .?.@.0.2.>.2.K.<. .A.>.3.;.0.H.5.=.8.5.<. .<.5.6.4.C. .2.0.<.8. .8. .:.>.<.?.0.=.8.5.9. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.4.0.;.5.5.... .:.>.<.?.0.=.8.O. .B.r.o.t.h.e.r.).,. .@.5.3.C.;.8.@.C.N.I.5.5. .8.A.?.>.;.L.7.>.2.0.=.8.5. .2.0.<.8. .?.@.>.3.@.0.<.<.=.>.3.>. .>.1.5.A.?.5.G.5.=.8.O. .B.r.o.t.h.e.r. .(.2.:.;.N.G.0.O. .A.>.>.B.2.5.B.A.B.2.C.N.I.8.5. .@.C.:.>.2.>.4.A.B.2.0. .?.>.;.L.7.>.2.0.B.5.;.O. .8. .M.;.5.:.B.@.>.=.=.K.5. .4.>.:.C.<.5.=.B.K.,. .=.0.?.@.8.<.5.@. .D.0.9.;.K. .A.?.@.0.2.:.8. .8. .r.e.a.d.m.e.). .(.4.0.;.5.5.... .....).
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ISO-8859 text, with very long lines (905), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):10402
                                  Entropy (8bit):4.867405422901496
                                  Encrypted:false
                                  SSDEEP:192:uyJSy1zGlO11qLxvfqWL/bkRMuDKVDP1kSeG7TFA/nC9wzJG3bQ5dC:uyJSy1zGlO11qLFf7keqKVXi/C9wV5A
                                  MD5:809CED2B672391C94F339F439925515A
                                  SHA1:FB91D81002EA94F996EBED986D14091C50DE4A97
                                  SHA-256:25EB32A79D43E98CEF14DF5704AAE6DE70CDB83B6AA1597A7892BCC21A61E08A
                                  SHA-512:F96ECBF0B45EC199C995B94E377809AF864519A662B7F130D8B84FF680292EE0B49BF4844EFD160864E2AFFCFD4FFFD1D234FAC39A6BE2ECD2FB56BC0056FC48
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Contrato de licencia de usuario final del software de Brother....IMPORTANTE - LEER DETENIDAMENTE ANTES DE INSTALAR EL SOFTWARE:....Este contrato de licencia de usuario final ("CLUF") es un contrato legal entre usted ("usted" o "usuario final") y Brother Industries, Ltd. ("Brother"), que rige el uso que haga del software de Brother descrito anteriormente y cualquier manual de usuario y documentos electr.nicos asociados ("SOFTWARE"). El SOFTWARE se instalar. si pulsa el bot.n "Siguiente" de este cuadro de di.logo. Al instalar, reproducir y/o utilizar el SOFTWARE, acepta estar legalmente vinculado por los t.rminos de este CLUF. Si no acepta los t.rminos de este CLUF, Brother no le conceder. la licencia del SOFTWARE y debe detener el proceso de instalaci.n en este momento haciendo clic en el bot.n ["Cancelar"] a continuaci.n. Imprima una copia de este CLUF como referencia futura.....T.rminos y condiciones...---------------------..1. Concesi.n de licencia...--------------------....En
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1319), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):27972
                                  Entropy (8bit):3.3737256316628685
                                  Encrypted:false
                                  SSDEEP:192:qGyHd+nq90GD600nqXv5/vDWrypZlaTEG1jLS89+Pa37qLjL2yPnqnTdQrEO4qZs:oPJ5HyrypZ5eu4Or5Ihty+
                                  MD5:FE73BD2FD0D952A80A5AD8104F3E66A6
                                  SHA1:19AA786A30E2B72E9E70195992F7A50B9EF52956
                                  SHA-256:B7A759358329FB7555EE9E8D9E739346038551CBE39877216F0AC11F9D1C865A
                                  SHA-512:C2B7996B847B67540FA42165D140034296DB4D2CB1D796A67E2FC151B16C6FD9DFAB849D4DCA60B70FBF0EEAEAB2F6478325C1F2B2CFC8166BC864F447314448
                                  Malicious:false
                                  Reputation:low
                                  Preview:..C.o.n.t.r.a.t.o. .d.e. .l.i.c.e.n.c.i.a. .d.e. .u.s.u.a.r.i.o. .f.i.n.a.l. .d.e.l. .s.o.f.t.w.a.r.e. .d.e. .B.r.o.t.h.e.r. .........I.M.P.O.R.T.A.N.T.E. .-. .L.E.E.R. .D.E.T.E.N.I.D.A.M.E.N.T.E.:.........E.s.t.e. .C.o.n.t.r.a.t.o. .d.e. .l.i.c.e.n.c.i.a. .d.e. .u.s.u.a.r.i.o. .f.i.n.a.l. .(.. C.L.U.F.. ). .e.s. .u.n. .a.c.u.e.r.d.o. .l.e.g.a.l. .e.n.t.r.e. .u.s.t.e.d. .y. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.. B.r.o.t.h.e.r.. ). .q.u.e. .r.i.g.e. .e.l. .u.s.o. .p.o.r. .s.u. .p.a.r.t.e. .d.e.l. .s.o.f.t.w.a.r.e. .d.e. .B.r.o.t.h.e.r. .(.i.n.c.l.u.i.d.o.s. .l.o.s. .m.a.n.u.a.l.e.s. .d.e. .u.s.u.a.r.i.o. .y. .l.o.s. .d.o.c.u.m.e.n.t.o.s. .e.l.e.c.t.r...n.i.c.o.s. .a.s.o.c.i.a.d.o.s.,. .t.a.l.e.s. .c.o.m.o. .l.o.s. .a.r.c.h.i.v.o.s. .d.e. .. a.y.u.d.a.. .y. .. l...a.m.e.. ). .(.d.e. .f.o.r.m.a. .c.o.l.e.c.t.i.v.a.,. .. S.O.F.T.W.A.R.E.. ). .q.u.e. .s.e. .i.n.s.t.a.l.a. .a.l. .p.u.l.s.a.r. .u.n. .b.o.t...n. .o. .m.a.r.c.a.r. .u.n.a. .c.a.s.i.l.l.a. .e.n. .e.s.t.e. .c.u.a.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ASCII text, with very long lines (831), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):9617
                                  Entropy (8bit):4.882486116465403
                                  Encrypted:false
                                  SSDEEP:192:IEH4Ii3gWxmFSEimGOvD5jnclZ5T2pe6q4hLOb5ns:IE4Ii3gSoievljczjzq
                                  MD5:CDA2A13690AF47214509889267F132AB
                                  SHA1:F54665C9F5862A7F077B7D7CE08301BEAB9D177D
                                  SHA-256:62E904E360D6D698FFF45F90F8F92F2804116971DF2368EF5BEE0613D1F702E1
                                  SHA-512:2BDD9FC617E6CDF13EEE263A994185F53DEAFAC480AD9AAF52DC4C142A080A5412F149469A56D9C586FEF575FCBBF0959A8298547F89EAD417C4B17BF2EA55DC
                                  Malicious:false
                                  Reputation:low
                                  Preview:..End-User License Agreement for Brother Software....IMPORTANT-PLEASE READ CAREFULLY BEFORE INSTALLING THE SOFTWARE:....This End-User License Agreement ("EULA") is a legal agreement between you ("you" or "End-user") and Brother Industries, Ltd. ("Brother"), which governs your use of the Brother software described above and any and all associated user manuals and electronic documents ("SOFTWARE"). The SOFTWARE will be installed if you press the "Next" button on this Dialog Box. By installing, reproducing and/or using the SOFTWARE, you agree to be bound by the terms of this EULA. If you do not agree to the terms of this EULA, Brother will not license the SOFTWARE to you and you must stop the installation process now by clicking the ["Cancel"] button below. You should print a copy of this EULA for future reference.....Terms and Conditions...---------------------..1. Grant of License...--------------------....In consideration of you agreeing to abide by the terms and conditions of this
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1160), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):26324
                                  Entropy (8bit):3.703734703753877
                                  Encrypted:false
                                  SSDEEP:768:K3GGNmpGXvFOfd0kROrSaPPnpTihhZLgVVxUoMxF:yGStOfdVaPvp2RM2b
                                  MD5:18ACD63CA4C33F18EA42A8AED04C52E9
                                  SHA1:BCD2EA8E8B3B80F1D4FC4C889C97057BE17292DB
                                  SHA-256:2E0B31322478237FAF74457D4D7A8F62FB6A58E8F3FC31C5883FF1EE22CD83F7
                                  SHA-512:5779E51B226CA375B034A3820B2C07AFB91F3EA18FF594C46288B37B2B8FB7C4EA967254389544EA570565054E9AE4E427C6472A09401C30007D194AA8525348
                                  Malicious:false
                                  Reputation:low
                                  Preview:..L.i.c.e.n...n... .z.m.l.u.v.a. .s. .k.o.n.c.o.v...m. .p.o.u.~...v.a.t.e.>.o.m. .p.r.e. .s.o.f.t.v...r. .B.r.o.t.h.e.r. .........D...L.E.}.I.T... .. .P.O.Z.O.R.N.E. .S.I. .P.R.E.....T.A.J.T.E. .T.E.N.T.O. .T.E.X.T.:.........T...t.o. .L.i.c.e.n...n... .z.m.l.u.v.a. .s. .k.o.n.c.o.v...m. .p.o.u.~...v.a.t.e.>.o.m. .(...a.l.e.j. .l.e.n. .. L.Z.K.P.. ). .j.e. .p.r...v.n.a. .d.o.h.o.d.a. .m.e.d.z.i. .v.a.m.i. .a...s.p.o.l.o...n.o.s.e.o.u. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(...a.l.e.j. .l.e.n. .. B.r.o.t.h.e.r.. ).,. .k.t.o.r... .u.p.r.a.v.u.j.e. .p.o.d.m.i.e.n.k.y. .v...a.h.o. .p.o.u.~...v.a.n.i.a. .s.o.f.t.v...r.u. .B.r.o.t.h.e.r. .(.v.r...t.a.n.e. .s...v.i.s.i.a.c.i.c.h. .p.o.u.~...v.a.t.e.>.s.k...c.h. .p.r...r.u...i.e.k. .a. .e.l.e.k.t.r.o.n.i.c.k...c.h. .d.o.k.u.m.e.n.t.o.v.,. .n.a.p.r...k.l.a.d. .s...b.o.r.o.v. .. P.o.m.o.c.n...k.. .a. .. R.e.a.d. .m.e.. ). .(.s.p.o.l.o...n.e. .o.z.n.a...o.v.a.n... .a.k.o. .. S.O.F.T.V...R.. ).,. .k.t.o.r... .s.a. .n.a.i.n.a.t.a.l.u.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ASCII text, with very long lines (831), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):9617
                                  Entropy (8bit):4.882486116465403
                                  Encrypted:false
                                  SSDEEP:192:IEH4Ii3gWxmFSEimGOvD5jnclZ5T2pe6q4hLOb5ns:IE4Ii3gSoievljczjzq
                                  MD5:CDA2A13690AF47214509889267F132AB
                                  SHA1:F54665C9F5862A7F077B7D7CE08301BEAB9D177D
                                  SHA-256:62E904E360D6D698FFF45F90F8F92F2804116971DF2368EF5BEE0613D1F702E1
                                  SHA-512:2BDD9FC617E6CDF13EEE263A994185F53DEAFAC480AD9AAF52DC4C142A080A5412F149469A56D9C586FEF575FCBBF0959A8298547F89EAD417C4B17BF2EA55DC
                                  Malicious:false
                                  Reputation:low
                                  Preview:..End-User License Agreement for Brother Software....IMPORTANT-PLEASE READ CAREFULLY BEFORE INSTALLING THE SOFTWARE:....This End-User License Agreement ("EULA") is a legal agreement between you ("you" or "End-user") and Brother Industries, Ltd. ("Brother"), which governs your use of the Brother software described above and any and all associated user manuals and electronic documents ("SOFTWARE"). The SOFTWARE will be installed if you press the "Next" button on this Dialog Box. By installing, reproducing and/or using the SOFTWARE, you agree to be bound by the terms of this EULA. If you do not agree to the terms of this EULA, Brother will not license the SOFTWARE to you and you must stop the installation process now by clicking the ["Cancel"] button below. You should print a copy of this EULA for future reference.....Terms and Conditions...---------------------..1. Grant of License...--------------------....In consideration of you agreeing to abide by the terms and conditions of this
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1109), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):25920
                                  Entropy (8bit):3.41069723014633
                                  Encrypted:false
                                  SSDEEP:384:q2qw1xQOSjP6aw/LNn5wcMlr5+/kcHURxbDYtBZht:Xxh1LsZrWkuuHy3ht
                                  MD5:94720FF93C23F8A22720C9D23CB86B11
                                  SHA1:32F87A5B212C8A3E13F9B54E14A9A46B38207517
                                  SHA-256:0E08F9477AF704E97D5F5D029A7BAD8F8BA70162210ED8EA011F2E5E3C15C66D
                                  SHA-512:2B6C9A043A1F403616C70D190C7153745116EC1645B68AB27019656648D62C221A86E84F85019C8480BD060E2CC4E9FD9885F1C264EF4794F5C6A419C1BC3CE0
                                  Malicious:false
                                  Reputation:low
                                  Preview:..L.i.c.e.n...n.a. .p.o.g.o.d.b.a. .z.a. .k.o.n...n.e.g.a. .u.p.o.r.a.b.n.i.k.a. .z.a. .p.r.o.g.r.a.m.s.k.o. .o.p.r.e.m.o. .B.r.o.t.h.e.r. .........P.O.M.E.M.B.N.O. .. .P.R.E.B.E.R.I.T.E. .P.A.Z.L.J.I.V.O.:.........T.a. .L.i.c.e.n...n.a. .p.o.g.o.d.b.a. .z.a. .k.o.n...n.e.g.a. .u.p.o.r.a.b.n.i.k.a. .(...l.i.c.e.n...n.a. .p.o.g.o.d.b.a...). .j.e. .p.r.a.v.n.i. .d.o.g.o.v.o.r. .m.e.d. .v.a.m.i. .i.n. .p.o.d.j.e.t.j.e.m. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(...p.o.d.j.e.t.j.e. .B.r.o.t.h.e.r...).,. .k.i. .u.r.e.j.a. .v.a.a.o. .r.a.b.o. .p.r.o.g.r.a.m.s.k.e. .o.p.r.e.m.e. .B.r.o.t.h.e.r. .(.v.k.l.j.u...n.o. .s. .p.o.v.e.z.a.n.i.m.i. .p.r.i.r.o...n.i.k.i. .z.a. .u.p.o.r.a.b.o. .i.n. .e.l.e.k.t.r.o.n.s.k.i.m.i. .d.o.k.u.m.e.n.t.i.,. .n.a. .p.r.i.m.e.r. .z.a. .p.o.m.o... .i.n. .o.b.v.e.s.t.i.l.a.). .(.s.k.u.p.a.j. ...p.r.o.g.r.a.m.s.k.a. .o.p.r.e.m.a...).,. .k.i. .b.o. .n.a.m.e.a...e.n.a.,. ...e. .p.r.i.t.i.s.n.e.t.e. .g.u.m.b. .a.l.i. .p.o.t.r.d.i.t.e. .p.o.t.r.d.i.t.v.e.n.o.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (842), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):9892
                                  Entropy (8bit):4.987204932167659
                                  Encrypted:false
                                  SSDEEP:192:l23+r6nTAR2TFqHX6cvyQHPGxjxCP5PLZRumHY7yH675WtmqcDxgnw/5OneF:A3bHxq3TojOZTYuHgAc9gna
                                  MD5:9FFCFBE8B338BCF7599B78744D77D972
                                  SHA1:D42F254BB8FA81882B8CDA3C7C4C4112185D499F
                                  SHA-256:6AFE75D1807C3A77E1987566259221CFCC39C08835BC4EF4B8E7BEB150000408
                                  SHA-512:00BE649AE0EA9B5E70CF80A5790CE2195D33BFC871F4D6CA7C4580D75DF5F9F724D7739ED904C0C8412AF393FDB93648D27007F5385C08FB9B18D467E9D530F9
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Slutanv.ndarlicensavtal f.r Brother-programvara..-----------------------------------------------....VIKTIGT-L.S NOGA IGENOM F.LJANDE INNAN DU INSTALLERAR PROGRAMVARAN:..------------------------------------------------------------------....Detta slutanv.ndarlicensavtal (.licensavtal.) .r ett juridiskt avtal mellan dig (.dig. eller .slutanv.ndaren.) och Brother Industries, Ltd. (.Brother.), som reglerar din anv.ndning av den ovan angivna Brother-programvaran och eventuella tillh.rande anv.ndarmanualer och elektroniska dokument (.PROGRAMVARA.). PROGRAMVARAN installeras om du trycker p. .N.sta.-knappen i dialogrutan. Genom att installera, reproducera och/eller anv.nda PROGRAMVARAN samtycker du till att vara bunden av licensavtalets villkor. Om du inte samtycker till licensavtalets villkor, kommer Brother inte att licensiera PROGRAMVARAN till dig och i s.dant fall m.ste du, genom att klicka p. knappen [.Avbryt.] nedan, avbryta installationsprocessen. Skriv ut licensavtalet f.r framtid
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1214), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):27056
                                  Entropy (8bit):3.3745247351924346
                                  Encrypted:false
                                  SSDEEP:192:47z2HsUDHaPVZNQa2AHwrSgIWy5CXgNu7VwAwGo2+Lr60+5lTVrN+7oLpgGmvApH:8nUrkVUMQhRSLjeYGo7ogDnN37LdfmqS
                                  MD5:E8EB6C3A61EAA9C64AB6A019354C1490
                                  SHA1:ED6133AA3C45EA4C14667C50D64FF379111C94F9
                                  SHA-256:99C30B3E723D991330D8967079B971AD7DCDDF05B12B221A52B53BBE264FD7B4
                                  SHA-512:FB705A5B33038C626D7F7AA02775F1CDD47F59D44D8FEB5AB24C03BF6F7EB589E967841BD1FC3784D899CF1EC06772E68F3DB827C38A6F1954AB3B164754775A
                                  Malicious:false
                                  Reputation:low
                                  Preview:..S.l.u.t.a.n.v...n.d.a.r.l.i.c.e.n.s.a.v.t.a.l. .f...r. .B.r.o.t.h.e.r.-.p.r.o.g.r.a.m.v.a.r.a. .........V.I.K.T.I.G.T. .. .L...S. .N.O.G.G.R.A.N.T.:.........D.e.t. .h...r. .s.l.u.t.a.n.v...n.d.a.r.l.i.c.e.n.s.a.v.t.a.l.e.t. ...r. .e.t.t. .j.u.r.i.d.i.s.k.t. .a.v.t.a.l. .m.e.l.l.a.n. .d.i.g. .o.c.h. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.. B.r.o.t.h.e.r.. ). .s.o.m. .r.e.g.l.e.r.a.r. .d.i.n. .a.n.v...n.d.n.i.n.g. .a.v. .B.r.o.t.h.e.r.s. .p.r.o.g.r.a.m.v.a.r.a. .(.i.n.k.l.u.s.i.v.e. .t.i.l.l.h...r.a.n.d.e. .a.n.v...n.d.a.r.m.a.n.u.a.l.e.r. .o.c.h. .e.l.e.k.t.r.o.n.i.s.k.a. .d.o.k.u.m.e.n.t. .s.o.m. .h.j...l.p.-. .o.c.h. .r.e.a.d.m.e.-.f.i.l.e.r.,. .t.i.l.l.s.a.m.m.a.n.s. .k.a.l.l.a.t. .. p.r.o.g.r.a.m.v.a.r.a.n.. ).,. .s.o.m. .i.n.s.t.a.l.l.e.r.a.s. .o.m. .d.u. .t.r.y.c.k.e.r. .p... .e.n. .k.n.a.p.p. .e.l.l.e.r. .m.a.r.k.e.r.a.r. .e.n. .r.u.t.a. .i. .d.e.n. .h...r. .d.i.a.l.o.g.r.u.t.a.n. .v.i.l.k.e.n. .i.n.d.i.k.e.r.a.r. .d.i.t.t. .s.a.m.t.y.c.k.e. .(.t...e.x... .e.n. .
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ISO-8859 text, with very long lines (855), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):8999
                                  Entropy (8bit):5.673174185947005
                                  Encrypted:false
                                  SSDEEP:96:FxenmKBR5drxLOhI1Nj7G6gj/Xg88mRPwvvAa/7YmwszjMe3IGpfyZPAb8zb:FAnlBR5dt18/g883ga/7Hnzjn3IGIZ7
                                  MD5:30337833CEB5B30B9405ED109AEF4412
                                  SHA1:2BAAD6397B5AC5EC22731BE38FA9EFF386A21FE8
                                  SHA-256:EE0730777C87CB5AD48A8C68EF5C1F36104E29938A133D88F9891F73EB25185D
                                  SHA-512:EF047F3A581FF71970DF78081D91534EEF568CB7E5973FFDF0875EE2FBFB9B06BF9547CEBACFF89027B9ADFDA8AEC10AF8DDC1380EA053A0CF35A6F121368B2F
                                  Malicious:false
                                  Reputation:low
                                  Preview:.......................................... Brother..-----------------------------------------------.......... ..............................................:..--------------------------------.............................. ("EULA") ............................ (".." .... ".........") ... Brother Industries, Ltd. ("Brother") ......................... Brother .................................................... ................ ("........") ............................ "...." ............... ........ .... .../.... ........... .............................. . EULA ...... .................. EULA ...... Brother ............................................................... ["...."] ...... .............. EULA .............................................---------------------....1. ..............--------------------
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1009), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):23694
                                  Entropy (8bit):3.8805594479867196
                                  Encrypted:false
                                  SSDEEP:192:3bQDUB8v2fnbugPpfjF/REJGMAl4PhU1CXOA072QprzTOislsnKGPdRZB3oxuGE9:pN2QAmAS7Qwc9RUKIiQj
                                  MD5:6D3750C7A4F5D77A8ACD640326016587
                                  SHA1:E6FAB0E96DAD7957140B709FB056072A29DE511F
                                  SHA-256:777D07120F5369FAD1C45240A3B1698096755484228AC5F55FA62EE2F3A18F49
                                  SHA-512:99450D78593DC27B64917FE86C6AD39EC44F9C34DF35054772DC907BE74B4A090D814D98E5FF5F82A6773322AE2D999821A0952AC8E4FD4A1DD6F80F0B70CA11
                                  Malicious:false
                                  Reputation:low
                                  Preview:....I.-.....%.....2.#.-...8...2...C.+.I.C...I.*.4.....4.*.3.+.#.1.....9.I.C...I...%.2."...2...*.3.+.#.1.....-.....L.A.'.#.L...-... .B.r.o.t.h.e.r. .........*.3...1... .-. .B...#...-.H.2.....I.-.....%...-.".H.2...%.0.@.-.5."...:...........I.-.....%...'.H.2...I.'."...2.#.-...8...2...*.3.+.#.1.....9.I.C...I. .(.".E.U.L.A.".). ...5.I. .@...G.....I.-.....%.....2.#.-...8...2...#.0.+.'.H.2.....H.2...A.%.0...#.4.).1... .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d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
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (913), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):10377
                                  Entropy (8bit):5.090931414873416
                                  Encrypted:false
                                  SSDEEP:192:4WE15PgTXOwSy7hsAypoeQpXGth/FQnMpGI9mT:4j1RI/S6PpWh/qnM8
                                  MD5:54DE8DD93894DA981D76969B8564D79B
                                  SHA1:DA48B300CD1897A88900AF0AAF41C5B480FD916F
                                  SHA-256:669274D06541D340F8021449BC32626C5CFA8BA4D480D68D906012AD60159F29
                                  SHA-512:648B02F6E79514A08AFD593A08DF60D8250C5A6A8660573312BB0A2B0AE910D7BB11F7E711222AFDC149643A788E9867AD443999B6BA02712FA41597ECC62362
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Yaz.l.m. i.in Son Kullan.c. Lisans S.zle.mesi..-----------------------------------------------------.....NEML.-L.TFEN YAZILIMI Y.KLEMEDEN .NCE D.KKATL.CE OKUYUN:..--------------------------------------------------------....Bu Son Kullan.c. Lisans S.zle.mesi (.EULA.) siz (.siz. veya .Son kullan.c..) ile Brother Industries, Ltd. (.Brother.) aras.nda mutabakata var.lm.. olan yukar.da tan.mlanan Brother yaz.l.m.na ve ilgili t.m kullan.c. k.lavuzlar. ile elektronik belgelere (.YAZILIM.) dair hususlar. y.netecek olan yasal s.zle.meyi olu.turur. Bu .leti.im Kutusunda ..leri. d..mesine bast...n.zda YAZILIM y.klenecektir. Bu yaz.l.m. y.kleyerek, .o.altarak ve/veya kullanarak bu EULA.n.n ko.ullar.na tabi olmay. kabul etmi. olacaks.n.z. Bu EULA.n.n ko.ullar.na kat.lmaman.z halinde, Brother YAZILIM lisans.n. size sunmayacakt.r ve y.kleme i.lemini a.a..daki [..ptal.] d..mesine basarak sonland.rman.z gerekmektedir. .leride ba.vurmak .zere bu EULA.n.n bir n.shas.n. yazd.rabilirsiniz....
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1077), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):25994
                                  Entropy (8bit):3.689114716740888
                                  Encrypted:false
                                  SSDEEP:768:JvBPoPsPpfPtOnRLvbBcvD1d9yKSiDxynaa+qVVadWA:tBJPpfPtD7YKSiDxQaaVVad/
                                  MD5:8976B0056E8B26D42EC9F00018303C8C
                                  SHA1:80B74DD61FC41552848FF201141DF901CCD27BD2
                                  SHA-256:53533FE533CD45C3330587752D27DA7029389CC155910C511B3FBDE514B5ED7E
                                  SHA-512:769C77C609558E498726081FED203E767AED3986DC465E6D5B554D5ED50A416F4DBDD56C3FBCF1299E552FCB643B9C0D875F02014DD119F47C26AFB8D36B5260
                                  Malicious:false
                                  Reputation:low
                                  Preview:..B.r.o.t.h.e.r. .Y.a.z.1.l.1.m.1. .i...i.n. .S.o.n. .K.u.l.l.a.n.1.c.1. .L.i.s.a.n.s. .S...z.l.e._.m.e.s.i. ...........N.E.M.L.0. .-. .L...T.F.E.N. .D.0.K.K.A.T.L.0. .B.0.R. .^.E.K.0.L.D.E. .O.K.U.Y.U.N.:.........B.u. .S.o.n. .K.u.l.l.a.n.1.c.1. .L.i.s.a.n.s. .S...z.l.e._.m.e.s.i. .(.. E.U.L.A.. ).,. .b.u. .i.l.e.t.i._.i.m. .k.u.t.u.s.u.n.d.a. .o.n.a.y.l.a.m.a. .a.m.a.c.1.n.1.z. .o.l.d.u...u.n.u. .g...s.t.e.r.e.n. .b.i.r. .d.....m.e.y.e. .b.a.s.m.a.n.1.z. .y.a. .d.a. .b.i.r. .k.u.t.u.y.u. .i._.a.r.e.t.l.e.m.e.n.i.z. .d.u.r.u.m.u.n.d.a. .(.. K.a.b.u.l. .E.t.. ,. .. K.a.b.u.l. .E.d.i.y.o.r.u.m.. .v.e.y.a. .. E.v.e.t.. ._.e.k.l.i.n.d.e. .g...s.t.e.r.i.l.e.n. .b.i.r. .d.....m.e. .v.e.y.a. .o.n.a.y. .k.u.t.u.s.u.). .y...k.l.e.n.e.c.e.k. .o.l.a.n. .B.r.o.t.h.e.r. .y.a.z.1.l.1.m.1.n.1. .(.. y.a.r.d.1.m.. .v.e. .. b.e.n.i. .o.k.u.. .d.o.s.y.a.l.a.r.1. .g.i.b.i. .i.l.i._.k.i.l.i. .k.u.l.l.a.n.1.c.1. .k.1.l.a.v.u.z.l.a.r.1. .v.e. .e.l.e.k.t.r.o.n.i.k. .b.e.l.g.e.l.e.r. .d.e. .d.a.h.i.l. .o.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ASCII text, with very long lines (831), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):9619
                                  Entropy (8bit):4.882905729208935
                                  Encrypted:false
                                  SSDEEP:192:IEH4Ij3gWxmFSEimGOvD5jnclZ5T2pe6q4hLOb5ns:IE4Ij3gSoievljczjzq
                                  MD5:444963737C29887279F5C1BE1568574E
                                  SHA1:6B3DC1BD54E36D5C1A461106320F9661C9379EEE
                                  SHA-256:EF41F204380577FBEFF14DF28578BA89D10076708EB89A1F8AB33C1959680699
                                  SHA-512:08F7158CC14AA73992C4CA79DDAD4C96191AAE13BECF56BD06776825667E491AA82944AFC9725A16C82352E8138A0BCC209E8F200F93E2E33BC6B1ED6444D4F3
                                  Malicious:false
                                  Reputation:low
                                  Preview:..End-User License Agreement for Brother Software....IMPORTANT-PLEASE READ CAREFULLY BEFORE INSTALLING THE SOFTWARE:....This End-User License Agreement ("EULA") is a legal agreement between you ("you" or "End-user") and Brother Industries, Ltd. ("Brother"), which governs your use of the Brother software described above and any and all associated user manuals and electronic documents ("SOFTWARE"). The SOFTWARE will be installed if you press the "Next" button on this Dialog Box. By installing, reproducing and/or using the SOFTWARE, you agree to be bound by the terms of this EULA. If you do not agree to the terms of this EULA, Brother will not license the SOFTWARE to you and you must stop the installation process now by clicking the ["Cancel"] button below. You should print a copy of this EULA for future reference.....Terms and Conditions...---------------------..1. Grant of License...--------------------....In consideration of you agreeing to abide by the terms and conditions of this
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1104), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):24616
                                  Entropy (8bit):3.4008036755992355
                                  Encrypted:false
                                  SSDEEP:384:e1PdeFliDy2J3iDx+EffFzbFdQeELKEVcNhPfH:1TV+Eff1QeEGEKhPfH
                                  MD5:14024D3E30A47E883785B090315CAB6F
                                  SHA1:A0C806BC456BEE0F746478116BB1F58CA7B69D40
                                  SHA-256:21FADFC4E005880D38532197AA597308026A9C1C712E22264F50D008CFD6DB8D
                                  SHA-512:FDA843120C8C2D5E0F2D47A301ED5CE13EDE116E3A07BABD02578F2D2AFF4A9B411D464BDEC11EAAFFDAB1B6AB53B63437A41A1FB72FDA3D4DAEFFD136C47DF8
                                  Malicious:false
                                  Reputation:low
                                  Preview:..E.n.d.-.U.s.e.r. .L.i.c.e.n.s.e. .A.g.r.e.e.m.e.n.t. .f.o.r. .B.r.o.t.h.e.r. .S.o.f.t.w.a.r.e. .........I.M.P.O.R.T.A.N.T.-. .P.L.E.A.S.E. .R.E.A.D. .C.A.R.E.F.U.L.L.Y.:.........T.h.i.s. .E.n.d.-.U.s.e.r. .L.i.c.e.n.s.e. .A.g.r.e.e.m.e.n.t. .(.".E.U.L.A.".). .i.s. .a. .l.e.g.a.l. .a.g.r.e.e.m.e.n.t. .b.e.t.w.e.e.n. .y.o.u. .a.n.d. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.".B.r.o.t.h.e.r.".).,. .w.h.i.c.h. .g.o.v.e.r.n.s. .y.o.u.r. .u.s.e. .o.f. .t.h.e. .B.r.o.t.h.e.r. .s.o.f.t.w.a.r.e. .(.i.n.c.l.u.d.i.n.g. .a.s.s.o.c.i.a.t.e.d. .u.s.e.r. .m.a.n.u.a.l.s. .a.n.d. .e.l.e.c.t.r.o.n.i.c. .d.o.c.u.m.e.n.t.s. .s.u.c.h. .a.s. .".h.e.l.p.. .a.n.d. .. r.e.a.d. .m.e.. .f.i.l.e.s.).(.c.o.l.l.e.c.t.i.v.e.l.y.,. .".S.O.F.T.W.A.R.E.".). .t.h.a.t. .w.i.l.l. .b.e. .i.n.s.t.a.l.l.e.d. .i.f. .y.o.u. .p.r.e.s.s. .a. .b.u.t.t.o.n. .o.r. .c.h.e.c.k. .a. .b.o.x. .o.n. .t.h.i.s. .D.i.a.l.o.g. .B.o.x. .w.h.i.c.h. .i.n.d.i.c.a.t.e.s. .y.o.u.r. .i.n.t.e.n.t.i.o.n. .o.f. .c.o.n.s.e.n.t. .(.s.u.c.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ASCII text, with very long lines (831), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):9619
                                  Entropy (8bit):4.882905729208935
                                  Encrypted:false
                                  SSDEEP:192:IEH4Ij3gWxmFSEimGOvD5jnclZ5T2pe6q4hLOb5ns:IE4Ij3gSoievljczjzq
                                  MD5:444963737C29887279F5C1BE1568574E
                                  SHA1:6B3DC1BD54E36D5C1A461106320F9661C9379EEE
                                  SHA-256:EF41F204380577FBEFF14DF28578BA89D10076708EB89A1F8AB33C1959680699
                                  SHA-512:08F7158CC14AA73992C4CA79DDAD4C96191AAE13BECF56BD06776825667E491AA82944AFC9725A16C82352E8138A0BCC209E8F200F93E2E33BC6B1ED6444D4F3
                                  Malicious:false
                                  Reputation:low
                                  Preview:..End-User License Agreement for Brother Software....IMPORTANT-PLEASE READ CAREFULLY BEFORE INSTALLING THE SOFTWARE:....This End-User License Agreement ("EULA") is a legal agreement between you ("you" or "End-user") and Brother Industries, Ltd. ("Brother"), which governs your use of the Brother software described above and any and all associated user manuals and electronic documents ("SOFTWARE"). The SOFTWARE will be installed if you press the "Next" button on this Dialog Box. By installing, reproducing and/or using the SOFTWARE, you agree to be bound by the terms of this EULA. If you do not agree to the terms of this EULA, Brother will not license the SOFTWARE to you and you must stop the installation process now by clicking the ["Cancel"] button below. You should print a copy of this EULA for future reference.....Terms and Conditions...---------------------..1. Grant of License...--------------------....In consideration of you agreeing to abide by the terms and conditions of this
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1104), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):24616
                                  Entropy (8bit):3.4008036755992355
                                  Encrypted:false
                                  SSDEEP:384:e1PdeFliDy2J3iDx+EffFzbFdQeELKEVcNhPfH:1TV+Eff1QeEGEKhPfH
                                  MD5:14024D3E30A47E883785B090315CAB6F
                                  SHA1:A0C806BC456BEE0F746478116BB1F58CA7B69D40
                                  SHA-256:21FADFC4E005880D38532197AA597308026A9C1C712E22264F50D008CFD6DB8D
                                  SHA-512:FDA843120C8C2D5E0F2D47A301ED5CE13EDE116E3A07BABD02578F2D2AFF4A9B411D464BDEC11EAAFFDAB1B6AB53B63437A41A1FB72FDA3D4DAEFFD136C47DF8
                                  Malicious:false
                                  Reputation:low
                                  Preview:..E.n.d.-.U.s.e.r. .L.i.c.e.n.s.e. .A.g.r.e.e.m.e.n.t. .f.o.r. .B.r.o.t.h.e.r. .S.o.f.t.w.a.r.e. .........I.M.P.O.R.T.A.N.T.-. .P.L.E.A.S.E. .R.E.A.D. .C.A.R.E.F.U.L.L.Y.:.........T.h.i.s. .E.n.d.-.U.s.e.r. .L.i.c.e.n.s.e. .A.g.r.e.e.m.e.n.t. .(.".E.U.L.A.".). .i.s. .a. .l.e.g.a.l. .a.g.r.e.e.m.e.n.t. .b.e.t.w.e.e.n. .y.o.u. .a.n.d. .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.".B.r.o.t.h.e.r.".).,. .w.h.i.c.h. .g.o.v.e.r.n.s. .y.o.u.r. .u.s.e. .o.f. .t.h.e. .B.r.o.t.h.e.r. .s.o.f.t.w.a.r.e. .(.i.n.c.l.u.d.i.n.g. .a.s.s.o.c.i.a.t.e.d. .u.s.e.r. .m.a.n.u.a.l.s. .a.n.d. .e.l.e.c.t.r.o.n.i.c. .d.o.c.u.m.e.n.t.s. .s.u.c.h. .a.s. .".h.e.l.p.. .a.n.d. .. r.e.a.d. .m.e.. .f.i.l.e.s.).(.c.o.l.l.e.c.t.i.v.e.l.y.,. .".S.O.F.T.W.A.R.E.".). .t.h.a.t. .w.i.l.l. .b.e. .i.n.s.t.a.l.l.e.d. .i.f. .y.o.u. .p.r.e.s.s. .a. .b.u.t.t.o.n. .o.r. .c.h.e.c.k. .a. .b.o.x. .o.n. .t.h.i.s. .D.i.a.l.o.g. .B.o.x. .w.h.i.c.h. .i.n.d.i.c.a.t.e.s. .y.o.u.r. .i.n.t.e.n.t.i.o.n. .o.f. .c.o.n.s.e.n.t. .(.s.u.c.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (1092), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):11868
                                  Entropy (8bit):5.279745446211106
                                  Encrypted:false
                                  SSDEEP:192:Aw/KDepeFGZvI1nTjNGP3Pu7zm9FAb2matHk+2Yhsc7OAdF:X9w6IVT4P3P2SlY+2SPOAdF
                                  MD5:517A1A35A4D3084F861F1F58029FC6EF
                                  SHA1:892DB86E55B4864B09C56AF53C85066163CE49D8
                                  SHA-256:BB174165687411B6886B023806A7873EA5ED87080A6BDD7FB17A971B15FE0B5F
                                  SHA-512:55311120E99E00DDAD3B345CB063C80D8657E33935F2656086C1CBD3D5893C060A85CBA30EAF26C8B1F395611759D58FE20F1CFFE04415E72C69C99171928B26
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Tho.a thu..n C..p ph.p Ng...i d.ng Cu..i cho Ph..n m..m Brother..-----------------------------------------------....QUAN TRO.NG - XIN .O.C KY. TR...C KHI C.I ...T PH..N M..M:..--------------------------------....Tho.a thu..n C..p ph.p Ng...i d.ng cu..i (End-User License Agreement - "EULA") n.y l. m..t tho.a thu..n ph.p ly. gi..a ba.n ("Ba.n" ho..c "Ng...i d.ng cu..i") v. Brother Industries, Ltd. ("Brother"), theo .. quy .i.nh vi..c ba.n s.. du.ng ph..n m..m Brother ....c m. ta. .. tr.n v. b..t c../mo.i h...ng d..n ng...i d.ng v. t.i li..u .i..n t.. n.o li.n quan ("PH..N M..M"). PH..N M..M se. ....c c.i ...t n..u ba.n b..m n.t "T..i" tr.n H..p thoa.i n.y. B..ng c.ch c.i ...t, t.i c.i ...t v./ho..c s.. du.ng PH..N M..M, ba.n ...ng y. bi. r.ng bu..c b..i c.c .i..u khoa.n cu.a EULA n.y. N..u ba.n kh.ng ...ng y. v..i c.c .i..u khoa.n cu.a EULA n.y, Brother se. kh.ng c..p ph.p PH..N M..M cho ba.n v. ba.n pha.i d..ng qu. tri.nh c.i ...t ngay b..ng c.ch nh..n v.o n.t ["Hu.y bo."] d...i ..
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (1106), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):26254
                                  Entropy (8bit):4.031837588321802
                                  Encrypted:false
                                  SSDEEP:192:w9UwC5dodVIlaiKtlLwuApjv8vvBlGgpI+Xn5GaQL00r7ntKzHny:neuhKtZYpjkX6g6CGv0Y7ntcy
                                  MD5:431670A6E1D20314EFF71846530BF66C
                                  SHA1:55846F626562B37C3E2BAE83F9C458ED071FABCA
                                  SHA-256:2CA20F56C3C9CB539E30A5CA952E49052DE549D54B7E8A87BACBCCF0D04122B3
                                  SHA-512:BF991AC072EE58353C52B1E7CC64E829EBEF3F0B9C6EEACD2947017425EECD6F501C02B2E534F0AAE5D58EB9FF7B3FD1374E9FB8345CCA077FEA1B9D8921B180
                                  Malicious:false
                                  Reputation:low
                                  Preview:..T.h...a. .t.h.u...n. .C...p. .p.h...p. .N.g.....i. .d...n.g. .C.u...i. .c.h.o. .P.h...n. .m...m. .B.r.o.t.h.e.r. .........Q.U.A.N. .T.R...N.G. .-. .V.U.I. .L...N.G. .....C. .T.H...T. .K...:.........T.h...a. .t.h.u...n. .C...p. .p.h...p. .N.g.....i. .d...n.g. .c.u...i. .n...y. .(.. E.U.L.A.. ). .l... .m...t. .t.h...a. .t.h.u...n. .p.h...p. .l... .g.i...a. .b...n. .v... .B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d... .(.".B.r.o.t.h.e.r.".).,. .n.h...m. .q.u.y. .....n.h. .v.i...c. .b...n. .s... .d...n.g. .p.h...n. .m...m. .B.r.o.t.h.e.r. .(.b.a.o. .g...m. .c...c. .h.....n.g. .d...n. .s... .d...n.g. .l.i...n. .q.u.a.n. .v... .c...c. .t...i. .l.i...u. ...i...n. .t... .n.h... .c...c. .t...p. .t.i.n. .. t.r... .g.i...p.. .v... .. r.e.a.d. .m.e.. ). .(.g...i. .c.h.u.n.g. .l... .. P.H...N. .M...M.. ). .m... .s... .......c. .c...i. .....t. .n...u. .b...n. .n.h...n. .m...t. .n...t. .h.o...c. .c.h...n. .m...t. .h...p. .t.r...n. .H...p. .t.h.o...i. .n...y. .c.h.o. .t.h...y. ... .....n.h. .....
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ISO-8859 text, with very long lines (421), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1284
                                  Entropy (8bit):5.156075993577742
                                  Encrypted:false
                                  SSDEEP:24:gRV+HssPNjdLvSAZI45n1dRN6In5dSC/6tTKmUe+BUeB6w2jvzPWjv+CE04XDC:gRV+dPbS4V1XNfgw2mmUzBUNJytEnC
                                  MD5:0D4DC45B09653ABD2B708AA537AE5381
                                  SHA1:8AAD945297472B986B7C092E57F4827C2A49F3D3
                                  SHA-256:A83177830CD23932F681B5962DFD95579023728C251618772356B73741F6A9B9
                                  SHA-512:97E6DC60416864BB5BF22AAFB7ACB4D608B76BB8CA52E1D4F500A9097A35CC8BB1E8E6A86C6CB357ACD3787D1357E29BE2D7F055321F5E2A007525CFACE1E415
                                  Malicious:false
                                  Reputation:low
                                  Preview:........ .... Brother Industries, Ltd. ("Brother") .... Google Analytics. ..... ....... ..... .... ...... .... Google, Inc. ("Google") .. ...... (.....) Brother ....... ..... .... ("........"). .... .... Google Analytics ...... ...... ........ "..... ..... ........". ....... ........ ....... ...... .... ..... ....... ........ .... ..... ...... ... .... .. ......... ... ..... ...... Google ......... .... ...... ... ..<http://www.google.com/analytics/learn/privacy.html>............. Google Analytics. .... .... Brother ...... ...... ... ....... ....... ... ..... ("...... ......") ... .... .... Brother ..... .. ...... ........ ....... .... ......... ........ .... Brother ...... ...... ... ...... ..... ........ .. .. ....../..... .... ..... ..... Brother. ...... .../..... .... Brother. ...... ...... .. .. ..... .... ... ... ..... ..... .... Brother........ ..... ... ..... ...... ...... ..... .... Brother .Google .. .... Google Analutics. .... ..... .... ....... ".... ........." ...... ..
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (572), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1551
                                  Entropy (8bit):4.941334620768722
                                  Encrypted:false
                                  SSDEEP:48:omodYxxqz3I6c0b5YuZeNQTGeQUnb80iPVMrvU1oDodgoGCF2AO:gdYxAzY6c05NQPUb8diwu0dDlO
                                  MD5:BD7164B345786235B1CE04ADB96CE45F
                                  SHA1:27B6119B714EC12B9B6A86018D29F6431A9C5F4E
                                  SHA-256:249797E42E87573E3E0E48F4712D78F60BDA0C7AB2903F24E596246E247C341F
                                  SHA-512:AA9EEE98C146A7F15539D72E4E551BD1C137DE772B7AEDE4AF608E45D55E14644F689BCFDE87A4AFA359AC3332199F845DF11CDD864247DAE0C067766957142A
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd. (.Brother.) ........ Google ...... . ... ...... .. ......., ............ .. Google Inc. (.Google.), . ............. ....... .. Brother (........). Google ...... ...... ..... .. ....... . ....... .. ........... ......... ..... .. ......... .. ...... . ...... .......... ... .......... ......... .. ...... .......... ... Google ......... ...... ..... ..... ..<http://www.google.com/analytics/learn/privacy.html>................ Google ......, Brother ...... ..... .. ......., ..... .. ............. ..... .............. .......... (...... .. ........), .... ........ ...... .. ...... .......... .. Brother . ......, .. ..... .......... . .. ........... .. ......... Brother .. ........ ....... .. ....... .... . ... ........... .. ........ ... ..... ......../...... .. Brother . .. ...... ............/............... ........, ......... .. ........ ... ..... ........, ........ ... ........ .. ......... ...... .......... .. ......... .. Brother........ ... ........ .. .
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ISO-8859 text, with very long lines (314), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):835
                                  Entropy (8bit):6.319021977012975
                                  Encrypted:false
                                  SSDEEP:24:oCC90jYy2G2o+qZjhd6K0R9NF5fF3T7bxkQyJH1ARaVRvBt+:oD9/7G2o+q30KO9N7fNfbuJJHaalt+
                                  MD5:E76126FE60167330F94132BEE6EE9A96
                                  SHA1:8DC462C1F148C3854495AFBD95B56EF35B8B6336
                                  SHA-256:B11063603BB8A098AD74D03C7941AB254FC4FFB92CBEF0EFBFE970C3391BFD30
                                  SHA-512:29E6A7A0A6E62C3C5DF44733D36B50FB09A865EF3074EDD194E5D160937EDBAB9678AB9285603C1204F0422486B35FE976D8909C22D5B1F9125D48ECFDC6279F
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd..........Brother.................................... Google, Inc..........Google........ Web ..........Google Analytics.. Google Analytics .....Cookie.............. ................................................. ... Google ........................... ..<http://www.google.com/analytics/learn/privacy.html>......Brother .... Google Analytics ...................................................................... Brother ................... Brother .........../............/........................... Brother ....................... Google Analytics .. Brother .. Google ....................................... .................................... .........................................
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ISO-8859 text, with very long lines (331), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1032
                                  Entropy (8bit):6.293362087604292
                                  Encrypted:false
                                  SSDEEP:24:oXqVV34Y2a6jmcKAYQGD/dJdatpTCMy57/5s46bpHjJ09A2+HkCkXdTi0Qwmteo:oXqf34Zasm7AjaUtpTCMy5NsXbpHjJqK
                                  MD5:9351CAE106E12AFBAD4EE3948E6969C9
                                  SHA1:7B12D5BD0C424556FB73FD3B8DCC20AFFBAA1A29
                                  SHA-256:1BAEA579914E4D1525274B2D37F704855959AC1E5FA6C482D7EB2FF618E1D2CB
                                  SHA-512:4EDE658EBAFF882F63AB6AB360115B2B582D5BEEA0B839543AE60AABDAD765706C7790FD7DEEEBB5FD42F274FE529F09C9405A70486FFB4A0A50E85E5236CF5E
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd..].H.U..uBrother.v.^.b.W.z..C.. Brother .n..].H.U..u.n..v.^...... Google, Inc..].H.U..uGoogle.v.^............R.A.. Google Analytics.C Google Analytics .|... ..cookies.. ....R.y.q...C .........|.....R.A.H..U....[.F..z.....n.....C .... Google .p..B.z.z....T....h..T.A...\..<http://www.google.com/analytics/learn/privacy.html>.C....Brother ... Google Analytics ........y.q.....D..H.i..O..T (.H.U..u.y.q...v).A..p.z.... Brother ..m.....B.....n.....A.H..z.b...n...........C Brother ......y.q..T......n... Brother .......L...~/.A..BBrother ....P/..s....B...~.W......q.. Brother ........L........C.....p.G.z.P.N.z.L Google Analytics ....z...y.q.... Brother .M Google.A....U...u..e..T.v.......C .p.G.z........z...y.q...A............C .Y..z........z...y.q...A...i.H.....n...U...\..C .p.G.z...U.........A..L......w..b.z..m.W...n......N.@......P.N....
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (515), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1510
                                  Entropy (8bit):4.591758255968861
                                  Encrypted:false
                                  SSDEEP:24:or5zwCMpw+Xl4TixhMmBuNe0dSAXTDq3iv/LYbUMHJ29K5nnqLgcIrY7wdic1yKp:or5zgpw0l4T6hYTsG3qS/LsxHJWunqMz
                                  MD5:DAD847C584AFD7013138E6DA3265D921
                                  SHA1:AE99CE35F32EAC030CC75AECC40641C7E107777B
                                  SHA-256:FDD923B851E84420C9C25944FA85077990E46CE7ED74EE35130D7B37543A09EA
                                  SHA-512:0231C83D5A8D112D57AFAFF700B0885F186294EED1961B9AE19915612ADEFF4E53501419D9337E59EDF59AB702E822DC81945C2FEA176DFE96F44634E8057823
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd. (.Brother.) upotrebljava Google Analytics, mre.nu analiti.ku uslugu koju pru.a tvrtka Google Inc. (.Google.), u navedenom softveru tvrtke Brother (.softver.). Usluga Google Analytics prikuplja podatke o prometu slu.e.i se .kola.i.ima.. Prikupljeni podatci upotrebljavaju se za analizu i pomo. u boljem razumijevanju na.ina upotrebe softvera. Za vi.e informacija o tome kako tvrtka Google obra.uje va.e podatke pogledajte ..<http://www.google.com/analytics/learn/privacy.html>.....Putem usluge Google Analytics tvrtka Brother prikuplja podatke o prometu koji ne omogu.uju osobnu identifikaciju (.podatci o prometu.), kao .to je model ure.aja tvrtke Borther kojim se slu.ite te kako upotrebljavate softver i njime navigirate. Tvrtka Brother rabit .e podatke o prometu kako bi pobolj.ala softver ili sve ostale proizvode/usluge tvrtke Brother, marketin.ke/istra.iva.ke aktivnosti, planiranje proizvoda ili ostale povezane aktivnosti, a sve u korist svojih korisnika.....Ako p
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (558), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1507
                                  Entropy (8bit):4.9119234323995595
                                  Encrypted:false
                                  SSDEEP:24:lB7ro/w1Tj75ROKQR15jGldEqVVE3kRkw1BzKKK9FFe5o7T3a4sBnlR0UYdrfNAB:lB7ro/OTj75RDQBS2qVVaqj219FFP7jY
                                  MD5:D0CF74140FFA74C9FA76B65D0CFC7600
                                  SHA1:BF5E34C53A1F9E4D5072B241232BB307865ACCE8
                                  SHA-256:799721DBE6B0F76DE62E7ED45D8D29AA441ECEA15B4C7BAFB9F249256ABDFFE6
                                  SHA-512:5F81A0ECDAB1049A2DE1BB34E2CA273D56FB8F48667FD7B100AFDCE98591FBC4C4A1A0812C61DDE183777DA647C24ED78789EFA7A70183175C668A2495ACD64E
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Spole.nost Brother Industries, Ltd. (.Brother.) v programu Brother pou..v. Google Analytics, slu.bu webov. anal.zy, kterou poskytuje spole.nost Google, Inc. (.Google.). Google Analytics shroma..uje data o webov.m provozu pomoc. soubor. cookies. Shrom.d.n. data n.m slou.. k anal.ze a lep..mu porozum.n. tomu, jak program pou..v.te. V.ce informac. o tom, jak Google nakl.d. s va.imi informacemi, viz ..<http://www.google.com/analytics/learn/privacy.html>.....Pou..v.n.m slu.by Google Analytics spole.nost Brother sb.r. data o webov.m provozu, kter. nejsou osobn. identifikovateln. (.provozn. data.), jako nap..klad model va.eho za..zen. Brother a jak program pou..v.te a proch.z.te j.m. Spole.nost Brother provozn. data bude pou..vat v.hradn. k zlep.ov.n. programu .i jin.ch produkt./slu.eb Brother, sv.m marketingov.m/v.zkumn.m aktivit.m, pl.nov.n. produkt. .i jak.mkoliv p..buzn.m aktivit.m, kter. prosp.vaj. z.kazn.k.m spole.nosti Brother.....Jestli.e souhlas.te s poskytov.n.m provozn.ch dat p
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (547), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1520
                                  Entropy (8bit):4.556455352621959
                                  Encrypted:false
                                  SSDEEP:24:obzwdmwfakIhTueOBMU+4dXdGukDOB+WxH9GXHOokfrC1ztF5u2RwKxjKUKa3hsb:obzUrfHIlhOBMU+OAvDORHU+9frGZFIn
                                  MD5:EF7507D576EC845BEB0A2D5180A400C4
                                  SHA1:2CD86FCD0F1C68027FF3B5D0BC0A253F63AA1E9A
                                  SHA-256:5B6036F2B1B9A79CD60282229D5E948DF72330F90E9B9647EE7BDE2F1C30103B
                                  SHA-512:BAA5FCC71C9DB3023C26EA9F388690CBB50EB2134546136F1EBC3ADD8DF81F37019002A015FFDA9B6D388715F1CACFD291D9EEC27B0CC2C329B1797D8A8ECA90
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd. (.Brother.) bruger Google Analytics, en webanalysetjeneste, som stilles til r.dighed af Google, Inc. (.Google.), i den Brother-software, der er angivet ovenfor (.Software.). Google Analytics indsamler trafikdata ved hj.lp af .cookies.. De data, der indsamles, bruges til analyser og til bedre at forst., hvordan du bruger Softwaren. Du kan finde flere oplysninger om, hvordan Google h.ndterer dine oplysninger, p. ..<http://www.google.com/analytics/learn/privacy.html>.....Ved hj.lp af Google Analytics indsamler Brother trafikdata, der ikke er personligt identificerbare oplysninger (.Trafikdata.) som f.eks. din Brother-enhedsmodel, og hvordan du bruger og navigerer i Softwaren. Brother vil udelukkende bruge Trafikdataene til at forbedre Softwaren eller eventuelle andre af Brothers produkter/tjenester, Brothers markedsf.rings-/forskningsaktiviteter, produktplanl.gning eller andre relaterede aktiviteter til fordel for Brothers kunder.....Hvis du vil give dit samtyk
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ISO-8859 text, with very long lines (605), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1726
                                  Entropy (8bit):4.402438992116717
                                  Encrypted:false
                                  SSDEEP:48:oRjbs8rsxQLnZ/alrwYIckVRvksnmaQG0ahNgKWnjLg+:RKgQLZ/all87p1/a5
                                  MD5:659B9FAEBBB2FDA935023A5558D0CC86
                                  SHA1:B00C3A55092EBEBCBF281129C66E464284F80459
                                  SHA-256:A1BC918889A766C491C3DD390EF59625CF934695AA5E38E2F10BDCAE0DAEDA9F
                                  SHA-512:BD9EE19509DE89A9EF796A7765567C5B2688281C465F2AD9D6E4BCEB32C4E3445B128732F0B53DC54F1FA6187C7A60A8229F31865E40615F67C8B0EFF41E70F8
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd. ("Brother") gebruikt Google Analytics, een dienst voor internetanalyse van Google, Inc. ("Google") in de software van Brother ("Software") die hiervoor is gespecificeerd. Google Analytics verzamelt informatie over dataverkeer met behulp van "cookies." De verzamelde gegevens worden gebruikt om te analyseren hoe u de Software gebruikt en ons te helpen beter te begrijpen hoe u met de Software omgaat. Zie ..<http://www.google.com/analytics/learn/privacy.html> voor meer informatie over de manier waarop Google uw gegevens verwerkt.....Met behulp van Google Analytics verzamelt Brother gegevens over dataverkeer die niet tot personen kunnen worden herleid ("Verkeersgegevens"), bijvoorbeeld het apparaatmodel van Brother dat u gebruikt, de Software die u gebruikt en hoe u door die Software navigeert. Brother zal de Verkeersgegevens uitsluitend gebruiken voor het verbeteren van de Software of andere producten/diensten van Brother, voor marketing-/researchactiviteiten va
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ISO-8859 text, with very long lines (522), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1467
                                  Entropy (8bit):4.576010999284282
                                  Encrypted:false
                                  SSDEEP:24:oRYQwEXYFyh5HWkWqdy0wHRGBpx4C60dgZd21GJOa4It7L9dicKwejMWIWDi+:oRYQxXgyvZWqPKax4XIg8Gdt7ItXJ
                                  MD5:EACD8BFDD63FDC7E3D67FD0BD3D445AD
                                  SHA1:4782FD46B0860FCA5B8ABC7EAFDF30449FDAB38B
                                  SHA-256:587A38DF5576D6BD1EF29CB1EAC1E6BE00415C4A63B4626373051E5EC8B1FC5F
                                  SHA-512:FC752610F3DE84EE154815C7C41B30AA09B8EAAE6E7A0BB8C2D750BA60111AAF3882BBA072B490DAC24A40F5A1E6BE59F733B7B14486DEF9C3CF4DF28B10B21D
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd. (..Brother..) uses Google Analytics, a web analytics service provided by Google, Inc. (..Google..) in the Brother software(s) that is/are specified above (..Software..). Google Analytics collects traffic data using ..cookies... The data collected is used to analyze and better understand how you use the Software. For more information about how Google handles your information, please see ..<http://www.google.com/analytics/learn/privacy.html>.....By using Google Analytics, Brother collects traffic data that are non-personally identifiable information (..Traffic Data..) such as your Brother device model and how you use and navigate through the Software. Brother will use the Traffic Data solely for the improvement of the Software or any other products/services of Brother, and Brother..s marketing/research activities, product planning or any other related activities for the benefit of Brother..s customers.....If you agree to provide your Traffic Data to Brother an
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (497), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1488
                                  Entropy (8bit):4.481533510670617
                                  Encrypted:false
                                  SSDEEP:24:obiMuK6MYoOgCA0nBx9+QiRgdZVKdiQkdHbatoksp8d5kvekMQwytx6UPViCq9mo:obtl/OgmH9+QiRgTVKdydHWt9sp9v7Md
                                  MD5:ABC398E2D7D0A924948C7006FCF8571D
                                  SHA1:C0D3E700B25335DDBA3334B9D73807EC9019262D
                                  SHA-256:88A349F96EBEB95C3A7706B5A8DA7316333B9793E7603F0F9F9734FCE36EA99C
                                  SHA-512:5C14B93B29BAA9CC05198B8FD2204291327281C6171D454F0B0F86ABFCC367AE1FB4DC804B0976701BB20B0AD17DAE189FCFFE9CB0B348608B407E8A907BE3C4
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd. (.Brother.) k.ytt.. edell. m..ritetyiss. Brother-ohjelmistoissa (.Ohjelmisto.) Google Analyticsi., joka on Google, Inc:n (.Google.) tarjoama Internet-analysointipalvelu. Google Analytics ker.. tietoliikennetietoja k.ytt.m.ll. .ev.steit.. Ker.ttyjen tietojen avulla analysoidaan Ohjelmiston k.ytt..si, ja ne auttavat ymm.rt.m..n sit. paremmin. Jos haluat lis.tietoja siit., miten Google k.sittelee tietojasi, katso: ..<http://www.google.com/analytics/learn/privacy.html>.....K.ytt.m.ll. Google Analyticsi. Brother ker.. tietoliikennetietoja, joita ei voi tunnistaa henkil.kohtaisesti (.Tietoliikennetiedot.), kuten Brother-laitteesi mallin ja sen, miten k.yt.t Ohjelmistoa ja siirryt siin.. Brother k.ytt.. Tietoliikennetietoja yksinomaan Ohjelmiston tai muiden Brotherin tuotteiden/palveluiden parantamiseen sek. Brotherin markkinointi- ja tutkimustoimintoihin, tuotesuunnitteluun tai mihin tahansa muihin liittyviin toimintoihin, jotka hy.dytt.v.t Brotherin asiakkaita..
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (590), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1684
                                  Entropy (8bit):4.521584712168758
                                  Encrypted:false
                                  SSDEEP:48:oWGjaqJBxTN/OeUFK07qednbE2lbM5ISaFPHPH6N3HHU7uAtf:zqTN/F8dnb1b+naFPmmuAN
                                  MD5:7CE6689034FF4B174A19AC2C59EF330F
                                  SHA1:DB4448EEC4AC8819C213FE00666F3B0EE119FA04
                                  SHA-256:8BD9A36D41B5DC2A5C2D2CBF4B00FEE052FC731C125CAF1DFE6FC001DF348FD6
                                  SHA-512:1F47D5BFEC3BBEEA1A25049D1E1EFA7823EB197435325C3F15DF63E7FABAAE648B74CBB88C4033CF4D8640CEC3BF4B1B074BA342BFFAA3EA472F0B45332E8DC4
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd. (..Brother..) utilise Google Analytics, un service de donn.es analytiques en ligne fourni par Google, Inc. (..Google..) dans le logiciel Brother sp.cifi. ci-dessus (..le logiciel..). Google Analytics r.cup.re les donn.es de navigation gr.ce aux ..cookies... Les donn.es r.cup.r.es sont utilis.es pour analyser et mieux comprendre comment vous utilisez le logiciel. Pour plus d.informations sur la mani.re dont Google traite vos informations, rendez-vous sur la page ..<http://www.google.com/analytics/learn/privacy.html>.....En utilisant Google Analytics, Brother collecte des informations incapables de vous identifier personnellement (..donn.es de trafic..), comme le mod.le d.appareil Brother que vous utilisez, la mani.re dont vous utilisez le Logiciel et la mani.re dont vous naviguez dans ce dernier. Brother utilisera uniquement les donn.es de trafic dans le but d.am.liorer le Logiciel ou tout autre produit/service de Brother, nos activit.s marketing/de recherche
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (610), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1608
                                  Entropy (8bit):4.627270863996797
                                  Encrypted:false
                                  SSDEEP:48:or9m+dF7DxxiYWToqSo25dLbVmdLLCzwA/bmuyg9bnN2bzrlG+w0:KCYWonP+A/fp9x2nrm0
                                  MD5:56104B80325C1F8B37A0564D9D6167AE
                                  SHA1:9948DD7BBAD7B8FFBA018B2CD4E82959563D9E7B
                                  SHA-256:1D302E59960147D154D907F5970D6F4866ED9BE5E5B1A9E28B21AC3F865093C9
                                  SHA-512:370ABE1ED415C344758B6E476E8324DC3B3421E23227D63308C67BA4CF98ACF23376B90BD661420084016C4349003EBA1C60570A1475F98ACB490D6F255BD4C5
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd. (.Brother.) verwendet in der oben genannten Brother Software (.Software.) den Webanalyse-Service Google Analytics von Google, Inc. (.Google.). Google Analytics zeichnet Informationen zu Verbindungsdaten mithilfe von .Cookies. auf. Diese aufgezeichneten Daten werden analysiert, damit wir besser verstehen, wie Sie die Software nutzen. Weitere Informationen zur Verwendung Ihrer Daten durch Google finden Sie unter ..<http://www.google.com/analytics/learn/privacy.html>.....Mit Google Analytics zeichnet Brother nicht-personenbezogene Informationen (.Verbindungsdaten.) auf, z..B. das Modell Ihres Brother-Ger.ts und die Art und Weise, wie Sie die Software nutzen und wie Sie in der Software navigieren. Brother setzt die Verbindungsdaten ausschlie.lich zum Verbessern der Software oder anderer Produkte/Services von Brother, der Marketing-/Forschungsaktivit.ten, der Produktplanung oder .hnlicher Aktivit.ten von Brother ein, die den Kunden von Brother zugutekommen.....We
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (411), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1090
                                  Entropy (8bit):5.173167251157596
                                  Encrypted:false
                                  SSDEEP:24:ldmkUnwcpODSLD+ofPJdlwHo+o34vuoowoXUeAtwUXiQ3dilJXD:ldDUn/OWL9Jv4F/owoXUeAth/A
                                  MD5:4D8A65608B79401416C98CF14DF0AB4B
                                  SHA1:E36E1B1CEDE685214D042B2F6586C9A6A350906B
                                  SHA-256:CD85E4249FE9752B0683725DB396F76D021AA53D8A147176384C9DC7171A7263
                                  SHA-512:966229FD3A2FC25697247C6B3E274E7CF296F2C6D841154D3152B523000C4DE7ABE0CC5AE14F8A5B10B485B63885C04E514B7EC1D808D3B598A0EE096A469FA7
                                  Malicious:false
                                  Reputation:low
                                  Preview:..... .-Google Analytics..Brother Industries, Ltd... (.Brother.) ...... .-Google Analytics, ..... ..... ....... ...... ..-... Google, Inc... (.Google.) ...... Brother P-touch Editor (......). Google Analytics ..... ..... ...... ....... ..... cookie. ....... ....... ...... ..... ........ ... ..... .. .... ...... ... ....... ..... .... .... .... .... ... Google ..... ..... ..., ... <http://www.google.com/analytics/learn/privacy.html>........ ..... .-Google Analytics, .... Brother ..... .... ..... .... .... ....., .... .... ... P-touch .. ......, .... ...... ... ...... ..... ...... ... ....... .... Brother ..... ..... .. ... ... ..... ...... .. ....../....... ..... .. Brother, ........ ....../.... ...., ..... ...... .. .. ...... ..... .... ....... Brother ..... .... ............ ... ..... .... .. ..... ....... .......... ... .-Brother .-Google ... Google Analytics, ... .. .... ...... "... ....". .. ..... .. ..... .. ..... ...... ..., .. .... .. ...... .. .. .. .... .. .... ......, .....
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (524), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1590
                                  Entropy (8bit):4.817812279832157
                                  Encrypted:false
                                  SSDEEP:48:Zrn9KK7vpXhKWBWor51TkMM//YROeGh5wG2QQtNM9Qwj:z58OWoTGIGPCC
                                  MD5:D5917E3353076561DA08A9BCBCE86CA6
                                  SHA1:5390D687C84283A5E8F33B44ED368E530DB3887E
                                  SHA-256:E44064B6D7084BD9CF07CDAD1F205041C8A57659C9040AA6D55639E506028D27
                                  SHA-512:D1DF767744FBB9262BABA92085F02E98F1DE878241798A4F034882B23EA8461C7305A8E0DA8A89BF64007FDB1385AC80BDAB23CA613AC9A6D554C3B18A2B7A0B
                                  Malicious:false
                                  Reputation:low
                                  Preview:..A Brother Industries, Ltd. (.Brother.) a Google, Inc. (.Google.) Google Analytics nev. webes elemz.szolg.ltat.s.t haszn.lja a fent eml.tett Brother szoftver(ek)ben (.Szoftver.). A Google Analytics .cookie-k. seg.ts.g.vel gy.jt forgalmi adatokat. Az .sszegy.jt.tt adatokat arra haszn.ljuk fel, hogy elemezz.k .s jobban meg.rts.k, hogyan haszn.lj.k a felhaszn.l.k a Szoftvert. Ha tov.bbi inform.ci.t szeretne kapni arr.l, hogyan haszn.lja a Google az adatait, keresse fel a k.vetkez. oldalt: ..<http://www.google.com/analytics/learn/privacy.html>.....A Google Analytics haszn.lat.val a Brother szem.lyazonos.t.sra alkalmatlan forgalmi adatokat gy.jt (.Forgalmi adatok.), .gy p.ld.ul adatokat az .n .ltal haszn.lt nyomtat.modellr.l, a Szoftver haszn.lati m.dj.r.l, valamint a Szoftverben t.rt.n. navig.ci.r.l. A Brother kiz.r.lag a Szoftver fejleszt.s.re haszn.lja fel a Forgalmi adatokat, illetve a Brother egy.b olyan term.keihez/szolg.ltat.saihoz, marketingtev.kenys.geihez/kutat.saihoz vagy kapcs
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ISO-8859 text, with very long lines (581), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1614
                                  Entropy (8bit):4.419395401773712
                                  Encrypted:false
                                  SSDEEP:48:oRMjckdyeKpLIzIwKfgRSN3dhynQcDQywWRVW/yX2DP:SLIagMWnFVwWPWTL
                                  MD5:40FC14BD9A99DA50AC570DD7BA7AC5A9
                                  SHA1:6A2DF16ABCA7D4DD74ACD05A655247A27AE43E48
                                  SHA-256:7CD65D91B546F788F16A01F84BEAB7F6663E66C3245A5214A470FBFE9EB996BD
                                  SHA-512:638496266A07411069FBD9727D1D3E7AF154C8803DD40A18BDA324846A121B1A4CD31A37BD02957AEC71CC1B9CC6A01BE9A3EE981A2B79ADC84982B13F0199D4
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd. ("Brother") utilizza Google Analytics, un servizio Web Analytics fornito da Google, Inc. ("Google") nei software Brother sopra specificati ("Software"). Google Analytics raccoglie i dati sul traffico mediante i "cookie". I dati raccolti vengono utilizzati per analizzare e comprendere meglio l'uso del Software da parte dell'utente. Per ulteriori informazioni su come Google gestisce le informazioni, consultare ..<http://www.google.com/analytics/learn/privacy.html>.....Utilizzando Google Analytics, Brother raccoglie i dati sul traffico costituiti da informazioni non d'identificazione personale ("Dati sul traffico"), come il modello di dispositivo Brother e le modalit. di utilizzo e navigazione nel software. Brother utilizzer. i Dati sul traffico esclusivamente per il miglioramento del Software o di qualsiasi altro prodotto/servizio di Brother, le attivit. di marketing/ricerca di Brother, la pianificazione dei prodotti o qualsiasi altra attivit. correlata a vant
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (469), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1361
                                  Entropy (8bit):5.90170112081144
                                  Encrypted:false
                                  SSDEEP:24:a11x9jKMTXfRIzmTvgoWbFdTb4pm4qzNG30jPowgOxAyKQ8ra098:a11x8QIKTgFpcqo30swgOxAN9ra0a
                                  MD5:0B12831118475D5C17A1086D827F50DB
                                  SHA1:01B3BE45B1AD1819618BF7CCF31AFD3A2AE63585
                                  SHA-256:1503360F5E8D47D37F1B70C9C10CB3CC3891B4D8367DD91EBA60672704D5E8C2
                                  SHA-512:40AC347F0B3114082EF1E7143B543694B7A128769A2D443AAEAB344CBF51B9A495CC051126E5382BDA382C4D74E9CEFDDA03C5A9B2A69F416FE3AD94AE1B6293
                                  Malicious:false
                                  Reputation:low
                                  Preview:...u...U.[.H........i....A.u.u...U.[.v.j..AGoogle, Inc..i....A.uGoogle.v.j ........E.F.u...T.[.r.X.uGoogle Analytics.v....L.\.t.g.E.F.A.i....A.u.{.\.t.g.E.F.A.v.j.......g.p.........BGoogle Analytics ..A.N.b.L.[(cookie)...t...A...q.l..g...t.B.b.N.f.[.^.....W.........B...W.....f.[.^..A...q.l....{.\.t.g.E.F.A....p............g.p.......BGoogle .....q.l.......................AGoogle ..E.F.u.T.C.g(...LURL).............B..<http://www.google.com/analytics/learn/privacy.html>.....u...U.[..AGoogle Analytics ...p.........q.l...g.p....@.....f.....A.{.\.t.g.E.F.A....p...@.A.....{.\.t.g.E.F.A...........A..l.............i....A.u.g.p...v...v.j.....W......B.u...U.[..A...W.....g.p...v....{.\.t.g.E.F.A.y........u...U.[...i.E.T.[.r.X.....A.}.[.P.e.B...O.y................i......q...l..........g.p......B.....u...U.[.y.. Google .... Google Analytics .......g.p...v......W....................
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ISO-8859 text, with very long lines (404), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1182
                                  Entropy (8bit):5.934295398012529
                                  Encrypted:false
                                  SSDEEP:24:oeyx/Wn2/WUaI81Gdk5nFi/CnDr5IinREHcQ9X/l0pZeLXB12C2llQTetSiQrHf4:oDx/Wn2/WvG65nFi/CnnWin5iX/6pZKS
                                  MD5:DD210E5BBFDA32BE2267242623FEBC53
                                  SHA1:942A15EDD102668D7FDC82BCD0C5DB7BF9783C80
                                  SHA-256:EBFD11A5825E8CCC5547977F4C0D78524B1750171E9242C39A907B48267267A4
                                  SHA-512:03E79C049A1F9184DA935948574A00EC9C273709C4D7ED9CBE6CB677D92CFF0A906C9FB7716D5C68A5031E55A993A38F7DB5DCE58B7DE6B97C9C7A7AA734800B
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd.(...., "Brother").. ... .... Brother .........(...., ".........").... Google, Inc. (...., ..Google..).. ....... .. ... ...... Google Analytics.. ........ Google Analytics.. "...".. ..... ..... ....... ......... ...... ....... ......... ... .... ..... ..... .... .... ....... Google.. .... ... .... .... ..... ...... ..<http://www.google.com/analytics/learn/privacy.html>.. ...... ..........Brother.. Google Analytics.. .... ....... ... .., ... ..., ......... ... ... .. ...... ..... .. .... ....("..... ......").. ......... Brother.. ...... ...... ...... .. ... ......... ... ..... ... .../...... ...., ....../..... ..., ... .... ... .... ....... ....... ..... ....... ............Google Analytics.. .... ..... ....... Brother .. Google ....... ....... ... ..... ".... ...." ...... .... ...... ..... ........ ...... ...... ... ... ...... ......... ..... ....... ........ .....
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ISO-8859 text, with very long lines (491), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1446
                                  Entropy (8bit):4.553422891764758
                                  Encrypted:false
                                  SSDEEP:24:oRwcwdWH1Ueud5jTOfwHbhFuidRe+d3EejI9gLOauVvf3LJjzdbuK2RwjqcuuHWc:oRlUW1UeuddTV7hFui++tEec9au5fbBr
                                  MD5:5BA8481F22D4CB83C6E9051AA020D43C
                                  SHA1:444B59990A9DAEBFD15FBF911ED68A6CAD35286C
                                  SHA-256:2BD59D3866152EE98E6C9D772D1D6A86B8A710F58B7630E76FE3BF258900F312
                                  SHA-512:0C71D6AC1BEEF7D42056C96B302B7AA4FBD34E6865BDA870EF444029FE4D1635E6DF47B083BD06FEB47F18554D61385DDCC2135C624D34B9AFE142BE20329407
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd. ("Brother") bruker Google Analytics, en webanalysetjeneste fra Google, Inc. ("Google"), i Brother P-touch Editor -programvaren ("Programvaren"). Google Analytics samler inn trafikkdata ved hjelp av informasjonskapsler ("cookies"). De innsamlede dataene brukes til . analysere og .ke forst.else av hvordan du bruker Programvaren. Hvis du vil ha mer informasjon om hvordan Google h.ndterer informasjonen din, se ..<http://www.google.com/analytics/learn/privacy.html>.....Ved . bruke Google Analytics samler Brother inn "trafikkdata", dvs. informasjon som ikke er personlig identifiserbar, for eksempel din Brother-enhetsmodell og hvordan du bruker og navigerer gjennom Programvaren. Brother vil bare bruke trafikkdataene til . forbedre Programvaren eller andre av Brothers produkter/tjenester, v.r markedsf.rings- og forskningsvirksomhet, produktplanlegging eller andre tilknyttede aktiviteter til fordel for Brothers kunder.....Hvis du godtar . gj.re dine trafikkdata tilgj
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (578), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1723
                                  Entropy (8bit):4.800351710723063
                                  Encrypted:false
                                  SSDEEP:48:drrvN8XfscGRZGttn+uBPbas2OWBpYortq5YyV+s42F+9VfvR01:GZmu6RrG1w2F+DRa
                                  MD5:234CBEBE03159F4EC377B5C5F79D26AF
                                  SHA1:C1623A331F67512AC8A6F2FFE7F738D80CBB2B59
                                  SHA-256:FB108710020612665C05729DE1591510A31A6E109757245EB7EAFA90B5469A7F
                                  SHA-512:04A62133BE543336C4232A28DCC30ED8213427256B73F92474E97066D67FAEE8EE81008B799DF247E928BBA94584C357366DD58FA6248C8F2F3154562152BB76
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Firma Brother Industries, Ltd. (.Brother.) korzysta z Google Analytics, internetowej us.ugi analitycznej udost.pnianej przez Google, Inc. (.Google.) w opisanym powy.ej oprogramowaniu Brother (.Oprogramowanie.). Us.uga Google Analytics gromadzi informacje o ruchu przy u.yciu plik.w .cookies.. Zgromadzone dane s. wykorzystywane w celu analizy i lepszego zrozumienia, w jaki spos.b u.ytkownik u.ywa Oprogramowania. Aby uzyska. wi.cej informacji o tym, jak Google obchodzi si. z informacjami o u.ytkowniku, odwied. stron. ..<http://www.google.com/analytics/learn/privacy.html>.....Korzystaj.c z oprogramowania Google Analytics, firma Brother gromadzi dane o ruchu internetowym, kt.re stanowi. informacje nieosobowe (.Dane o ruchu.), np. model urz.dzenia Brother i spos.b, w jaki u.ytkownik korzysta z Oprogramowania i si. w nim porusza. Firma Brother wykorzystuje takie Dane o ruchu wy..cznie w celu ulepszenia Oprogramowania lub wszystkich innych produkt.w/us.ug firmy Brother, czynno.ci firmy Brot
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (564), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1630
                                  Entropy (8bit):4.571529268528805
                                  Encrypted:false
                                  SSDEEP:48:ZmikGOTx3TKTOcOnxV3haqMRUbDjFHhOOhRv4RsbvEOf:RPG3+TOxVMqVRvEsrh
                                  MD5:A2C246B44D51137E482A66ED2AE863FF
                                  SHA1:9F3476205CC0AEA64E9A2CB2B987311693F4653A
                                  SHA-256:E79ADD03359231AE1B3FDADC84B2653C1D338C40A2C563032CDB5AAA1384C026
                                  SHA-512:681C4E7C7CD2CE9C3ABFD54C866F8FAF60747793316BB5EAC8AA407427AA48486862CB2F98F8606B862BD95B2950BCD860F75F23775DF576E5113F3DB539F464
                                  Malicious:false
                                  Reputation:low
                                  Preview:..A Brother Industries, Ltd. (.Brother.) utiliza o Google Analytics, um servi.o de an.lise de p.ginas Web fornecido pela Google, Inc. (.Google.) no(s) software(s) da Brother especificado(s) acima (.Software.). O Google Analytics recolhe dados sobre tr.fego atrav.s de .cookies.. Os dados recolhidos s.o utilizados para analisar e compreender melhor a forma como utiliza o Software. Para obter mais informa..es sobre o modo como a Google processa as suas informa..es, consulte ..<http://www.google.com/analytics/learn/privacy.html>.....Ao utilizar o Google Analytics, a Brother recolhe dados de tr.fego que constituem informa..es n.o pessoalmente identific.veis (.Dados de tr.fego.), como o modelo do seu dispositivo Brother e a forma como utiliza e navega atrav.s do Software. A Brother apenas utilizar. os Dados de tr.fego para a melhoria do Software ou de quaisquer outros produtos/servi.os da Brother e para as atividades de marketing/investiga..o, planeamento de produtos ou quaisquer outras ati
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ISO-8859 text, with very long lines (539), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1529
                                  Entropy (8bit):4.547400417023268
                                  Encrypted:false
                                  SSDEEP:24:ZR4wn3ecTks9RFM9dXwEV3YLzau8YyKS6dclLRYQfKrsHe+nzkw5jDn+iu7IInWO:ZR4G3ecTks/FM9pxV3iaufyKCxJKrsH6
                                  MD5:23DB08748BA96A7F1228DCF1F324CFC0
                                  SHA1:B444A259F0F28ECE3D0E0B5F0D5DE487D2CDE4E9
                                  SHA-256:1C84A58BC2C014BF56F6CB14E9FC5CD67E46454EE277D60284A9DA46E6602522
                                  SHA-512:35061216C26F9BA13EE79E0CD3244959FD65BE362B63CF6436DBF28DC13F3D39BB8E7A64815C78BFCEEEF0AD30BFD0C4CD82DB1313A32167DB654644FC5679C7
                                  Malicious:false
                                  Reputation:low
                                  Preview:..A Brother Industries, Ltd. ("Brother") usa o Google Analytics, um servi.o de an.lise da Web fornecido pela Google, Inc. ("Google") nos softwares Brother especificados acima ("Software"). O Google Analytics coleta dados de tr.fego usando "cookies". Os dados coletados s.o usados para analisar e entender melhor como voc. usa o Software. Para saber mais sobre como a Google lida com as suas informa..es, consulte ..<http://www.google.com/analytics/learn/privacy.html>.....Usando o Google Analytics, a Brother coleta dados de tr.fego que n.o informa..es que constituem informa..es n.o pessoalmente identific.veis ("Dados de Tr.fego"), como o modelo de seu dispositivo Brother e como voc. usa e navega pelo Software. A Brother usar. os Dados de Tr.fego somente para a melhoria do Software ou de quaisquer outros produtos/servi.os da Brother e atividades de marketing/pesquisa, planejamento de produto ou outras atividades relacionadas da Brother para o benef.cio dos clientes da Brother.....Se voc. co
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (549), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1611
                                  Entropy (8bit):4.587265618553102
                                  Encrypted:false
                                  SSDEEP:48:orTjqynr39QBbSfHPH48wOP+KHLIEq3W0NhHGfg+WU8YiF0mMfZXxyj:6nrNQQHPH48wNEqG4ZWdq0mKZXxU
                                  MD5:58D71C164D58B31811360762AC96B5A5
                                  SHA1:6C715AB7D79370122C02D2BBF0B3ACC07173E9BF
                                  SHA-256:C760AFEB86CA14B19FF2E8FF6A1FC64A035C19D8977FAFEB35B390C9D537D3EC
                                  SHA-512:CA64D180AF35965E81AECDE43CB23ECACD869CE916C26DDDDE3441167F2281E74F15CB34854B2D11E143F925B452CF6961E420BAC0A25D1CB403124A859AACE5
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd. (.Brother.) folose.te Google Analytics, un serviciu de analiz. web furnizat de Google Inc. (.Google.) .n cadrul software-ului Brother specificat mai sus (.Software.). Google Analytics colecteaz. date despre trafic folosindu-se de .cookies.. Datele colectate sunt utilizate pentru a analiza .i a .n.elege modul de utilizare a Software-ului. Pentru informa.ii suplimentare privind modul .n care Google gestioneaz. informa.iile dvs., consulta.i <http://www.google.com/analytics/learn/privacy.html>.....Prin utilizarea serviciului Google Analytics, Brother colecteaz. date despre trafic care reprezint. informa.ii de identificare non-personale (.Date de trafic.), cum ar fi modelul dispozitivului Brother .i modul .n care utiliza.i .i naviga.i prin Software. Brother va utiliza Datele de trafic numai pentru .mbun.t..irea Software-ului sau a oric.ror altor produse/servicii Brother, iar activit..ile de marketing/cercetare ini.iate de Brother, planificarea produselor sau oric
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (578), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1736
                                  Entropy (8bit):5.159311569565567
                                  Encrypted:false
                                  SSDEEP:48:IAwBCHPHE/beFxlXtKS/80W3He1zHJBIlIhKonWuOILCoO:oWXtN00xlo/I29
                                  MD5:A84C0FAB08969D12EC3BA417BF3736F8
                                  SHA1:862848FE570CC4B1BBC42366F8034D7FE6E6F7D7
                                  SHA-256:BA6939023264E8A416399386B69AA333E5243632478F314AFAEC7132CDEDE3BD
                                  SHA-512:60AFBA8F2F23BDFE6CACD14883FC4C341477E724078355FCDB2AEC497893063CF84CDDA806A3CC6203C6B54A1318A76F4D3BFACDB9BA38D1669D5241140DB2EB
                                  Malicious:false
                                  Reputation:low
                                  Preview:... ............ .... ........... ........... Brother (..... ........... ...........) ........ Brother Industries, Ltd. (..... Brother) .......... ...... ...-......... Google Analytics, ....... ............... ......... Google, Inc. (..... Google). ...... Google Analytics .......... ..... cookie ... ..... ...... . ........ .. ...... ....... .......... ........ .. ........, ... ............ ........ . ........... ............. .............. ........ . ..., ... ........ Google ............ .......... .........., ... .. ........ ..<http://www.google.com/analytics/learn/privacy.html>........ ............. Google Analytics ........ Brother ........ ...... . ......., ....... .. ..... ................... ........ (..... ...... . .......), ........ ...... ............. .......... Brother, ...... ............. ............ ........... . ......... . .... ........ Brother .......... ...... . ....... ............. ... ......... ............ ........... ... ...... ......... . ..... Brothe
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (523), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1544
                                  Entropy (8bit):4.501554383262707
                                  Encrypted:false
                                  SSDEEP:48:omiBjYYCSir5wJKytP5I10IHb3xrgMdGzeiz:aane1mndGzR
                                  MD5:5F55A2F8341FDDE3EE20609F0203685A
                                  SHA1:F1682CD8F80F0A353AC08E6C0F8AB0D3D3701DDB
                                  SHA-256:82326B8560536DA46AA8C66164B6271C1F57293BDC5A57853AF80E6A2593D334
                                  SHA-512:8FCEBD62E266C7158944218C4C05C098399F507B27FE0F46BED82B457AC75A095A5748526894E579FC9729876D8A5E15BB931AC5F3D773760D3EAFA47DF86C02
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd. (.Brother.) utiliza Google Analytics, un servicio de an.lisis web proporcionado por Google, Inc. (.Google.) en el software de Brother especificado arriba (.Software.). Google Analytics recopila datos de tr.fico mediante .cookies.. Los datos recopilados se emplean para analizar y comprender mejor el modo en que utiliza el Software. Para obtener m.s informaci.n sobre c.mo Google gestiona su informaci.n, consulte ..<http://www.google.com/analytics/learn/privacy.html>.....Al utilizar Google Analytics, Brother recopila datos de tr.fico que no identifican a nadie personalmente (.datos de tr.fico.), como el modelo de su dispositivo Brother, y c.mo utiliza el Software y navega por .l. Brother utilizar. los datos de tr.fico con fines exclusivos de mejora del Software o de cualquier otro producto/servicio de Brother, para nuestras actividades de marketing/investigaci.n, para planificaci.n de productos o para cualquier otra actividad que redunde en beneficio de los cli
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (575), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1648
                                  Entropy (8bit):4.911388480717791
                                  Encrypted:false
                                  SSDEEP:48:l2rTbCUJ3FWBt0Ma2JmXdW5IPa+5cawfxZnD2qdIexgbasOL:lWst7QC9+JIP2quexgOs2
                                  MD5:4FDB16A6A701B9A7843F4BE94EEFE21A
                                  SHA1:BD50F0D950577F7D883E73B96CBACCAD4B55B957
                                  SHA-256:037E08FDC4C57B304A62D895D0641F5FB306A175BBBB15E8BB8FA07E262182FB
                                  SHA-512:ADC5FE8769AAAFF8BDAD547671BABA878D57BE453AAE3A392CE7840AAAD94FAF926AFD68FE56F03996A1EA643032F60FBB85EFFC4D9CA02C32BFFC6751B081C9
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Spolo.nos. Brother Industries, Ltd. (.Brother.) vyu..va Google Analytics, slu.bu webovej anal.zy poskytovan. spolo.nos.ou Google Inc. (.Google.), v.programoch Brother uveden.ch vy..ie (.softv.r.). Slu.ba Google Analytics zhroma..uje prenosov. .daje prostredn.ctvom s.borov cookie. Zhroma.den. .daje sa vyu..vaj. pri anal.zach a pom.haj. n.m lep.ie porozumie. tomu, ako vyu..vate Softv.r. Viac inform.ci. o tom, ako spolo.nos. Google pracuje s va.imi inform.ciami, n.jdete na adrese..< http://www.google.com/analytics/learn/privacy.html>.....Pomocou slu.by Google Analytics spolo.nos. Brother zhroma..uje prenosov. .daje, ktor. nie s. identifikovate.n. osobn. inform.cie (.prenosov. .daje.), napr.klad model zariadenia Brother a sp.sob pou..vania a navig.cie v r.mci softv.ru. Spolo.nos. Brother bude prenosov. .daje vyu..va. v.lu.ne na vylep.ovanie softv.ru alebo in.ch produktov/slu.ieb spolo.nosti Brother a.marketingov.ch a.v.skumn.ch .innost. spolo.nosti Brother, pl.novanie produktov alebo ak
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (601), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1677
                                  Entropy (8bit):4.527774446968275
                                  Encrypted:false
                                  SSDEEP:48:zpLDtZlRzqIwSgJFaTpCEpOjLLvAANE9ACqSVVFkA1:TpqIw9fK2Ah9ACqS/Fkw
                                  MD5:B06625537147CF93D5DAEAAC1C49BBEA
                                  SHA1:A38E254DF1142F84D9D3F9F279E6DAA5DB0BEE55
                                  SHA-256:A7F85F85918902DE6CEFCD5533C445D3A048B81A9F9D7EE31ACDC6FF114C8DCF
                                  SHA-512:79B1B0015C14ED89C2BF51A10D9F7F65DD92BCEC3942D1025B3D4BFB34083AC0B15CEFBA8B7EA451419D564CD33186ED20DB17A56FD39559CCF7B3A0DCF9BACE
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Podjetje Brother Industries, Ltd. (.podjetje Brother.) uporablja v zgoraj navedeni programski opremi Brother (.programska oprema.) storitev za spletno analitiko Google Analytics, ki jo zagotavlja podjetje Google Inc. (.podjetje Google.). Storitev Google Analytics zbira podatke o prometu s .pi.kotki.. Zbrani podatki se uporabljajo za analiziranje in bolj.e razumevanje uporabe programske opreme. Za ve. informacij o obravnavi va.ih informacij s strani podjetja Google glejte ..<http://www.google.com/analytics/learn/privacy.html>.....Z uporabo storitve Google Analytics podjetje Brother zbira podatke o prometu, s katerimi ni mogo.e prepoznati oseb (.podatki o prometu.), na primer model naprave Brother in va.o uporabo ter premikanje po programski opremi. Podjetje Brother bo podatke o prometu uporabljajo izklju.no za izbolj.ave programske opreme ali katerih koli drugih izdelkov/storitev podjetja Brother, za tr.ne/raziskovalne dejavnosti podjetja Brother, za na.rtovanje izdelkov ali za kater
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (497), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1497
                                  Entropy (8bit):4.542680319242005
                                  Encrypted:false
                                  SSDEEP:24:obUwj25WTtoCxvfrXdzWpbKWMLXgk9HXIO6JCQMubIWENyyoaaFYdYRfYl8KkgZN:obUE25WTaCRdWpbKWMLFRBaCqFEboa0O
                                  MD5:F9C833AF9EE2AD1113AAA011F8727594
                                  SHA1:5F2F35A2CA82CFEAF9986E110AB184B1950ED58D
                                  SHA-256:D7D81B4EF6AE62842CCB87798F6DCFE04145343C420359AF2C28D9991D5033E3
                                  SHA-512:9EF361783CBFE934E79DD29F9B358BC7A22CB183BA63F74475D513A6BAC52297FB44B4C5B6470FB87DBF1A19562D73CF99C30A32AE32E5C764DDB202AFB3F1CF
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd. (.Brother.) anv.nder Google Analytics, en webbanalystj.nst som tillhandah.lls av Google, Inc. (.Google.), i programvaran eller programvarorna fr.n Brother (.programvaran.) som anges ovan. Google Analytics samlar in trafikdata med hj.lp av .cookies.. Insamlade data anv.nds f.r att analysera och b.ttre f.rst. hur du anv.nder programvaran. Mer information om hur Google hanterar din personliga information finns p. ..<http://www.google.com/analytics/learn/privacy.html>.....Med hj.lp av Google Analytics samlar Brother in data om trafiken som inte kan anv.ndas till att identifiera dig personligen (.trafikdata.), till exempel vilken Brother-enhet du anv.nder och hur du anv.nder och navigerar i programvaran. Brother anv.nder sig enbart av trafikdata i syfte att f.rb.ttra programvaran eller andra produkter/tj.nster fr.n Brother, samt f.r Brothers marknadsf.rings-/utvecklingsverksamhet, produktplanering och liknande verksamhet som .r till nytta f.r Brothers kunder.....
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (554), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1554
                                  Entropy (8bit):5.791034918980901
                                  Encrypted:false
                                  SSDEEP:48:omECU1OnBii1eLQsvut8FSzffFoKm3FKJDZfkxaF26F4mFVJw:Ho38W3oh8a1XRw
                                  MD5:F7DC320E4EE75F9A1F8C0BE0524FB6C1
                                  SHA1:14DE1BDAAD089DA11A74E54EFE58DDEEA44828AA
                                  SHA-256:3D3E5418043F6B66F8C923F7AEB72B73C74ACC6C3FA09E14329C4B777B20FEAF
                                  SHA-512:D9493CE920740ED70E25FAC4F7051E89DE3890EC6E6AB60E9FA8655B3BEC610CCE8D489725A70CDDFCF95D43D56B0619BC71DE6F63F0627465F5565804F2A26D
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd. (.Brother.) ... Google Analytics ................................. Google, Inc. (.Google.) ........... .. Brother ................ (.........) Google Analytics ................................. ...... .......................................................................... ............................... Google ............... ........ ..<http://www.google.com/analytics/learn/privacy.html>.....Brother ... Google Analytics ................................................................ (.....................) .. ......... Brother .................................................. Brother ..................................................../....... ...... Brother ......./.............. Brother ............. ........... ............................... Brother .........
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (494), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1532
                                  Entropy (8bit):4.669601313700157
                                  Encrypted:false
                                  SSDEEP:24:oJk3v90knszsKmwo7C2PfsbuidEf9BJTTYicojNLOVCiH3dzKI9kujNEsL3sBX4e:om31JsIK7z2Pf+7af9BJ4N2NC8iHtzKV
                                  MD5:74C520687143FBC0C3BD387A2953F069
                                  SHA1:A6D3E69833ED83686996D56878A69DC7E1E71099
                                  SHA-256:49583CD8C26396546835D9E6932380A6DB3DCA950741EE62BCDE5D5D8AD69CB4
                                  SHA-512:5B2A7C7311D3E687050B995CC7957957EB1D22F05AA55A01B83701ADE89C390C09C4E210828C1DC51D4723586942AB349EEF6AA07D2854F51C86BFBAAF1867F4
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd. (.Brother.), yukar.da (.Yaz.l.m.) olarak belirtilen Brother yaz.l.mlar.nda, Google, Inc. (.Google.) taraf.ndan sa.lanan bir web analiz hizmeti olan Google Analytics.ten faydalan.r. Google Analytics ..erezleri. kullanarak trafik verilerini toplar. Toplanan veriler Yaz.l.m. kullan.m .eklinizin analiz edilmesi i.in ve taraf.m.zdan daha iyi anla..lmas.n. sa.lamak .zere kullan.l.r. Google..n bilgilerinizi i.leme alma .ekli hakk.nda daha fazla bilgi i.in l.tfen ..<http://www.google.com/analytics/learn/privacy.html> adresine bak.n.....Brother, Google Analytics.i kullanarak, Brother ayg.t.n.z.n modeli ve Yaz.l.m. nas.l kulland...n.z ve gezindi.iniz gibi ki.isel olmayan tan.mlanabilir bilgi (.Trafik Verileri.) olan trafik verilerini toplar. Brother Trafik Verilerini yaln.zca Yaz.l.m.n veya di.er Brother .r.nlerinin/hizmetlerinin geli.tirilmesi i.in ve Brother..n pazarlama/ara.t.rma faaliyetleri, .r.n planlama veya Brother..n m..terilerinin yaralanabilece.i di.er ilgi
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (520), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1453
                                  Entropy (8bit):4.541602831738816
                                  Encrypted:false
                                  SSDEEP:24:oJkYwEXY9yk4TykWqdy0wHROsgpx4C60dgq21GJOa4ItIL9dicKweY5WIWDi+:omYxX8ykSNWqPKux4XIg3Gdt2I2yJ
                                  MD5:D674BC740FBFED67E2BC5361F3FAE6A4
                                  SHA1:550B4E4B043BE7DFEB274A8DD3390DC49896D7B4
                                  SHA-256:40F14D3F3E5DE23740F244A953A0D6731823B3FFB312545CE55CBEDD2D7776CA
                                  SHA-512:82A1EFA85B06BBD1FC887CD4893FEB5D3717A1BC49B01F08716A152C69D2C7CD872A2825F36138DD2A8082E768CC36298CD798C5677EA5036040737DE30929BD
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd. (.Brother.) uses Google Analytics, a web analytics service provided by Google, Inc. (.Google.) in the Brother software(s) that is/are specified above (.Software.). Google Analytics collects traffic data using .cookies.. The data collected is used to analyze and better understand how you use the Software. For more information about how Google handles your information, please see ..<http://www.google.com/analytics/learn/privacy.html>.....By using Google Analytics, Brother collects traffic data that are non-personally identifiable information (.Traffic Data.) such as your Brother device model and how you use and navigate through the Software. Brother will use the Traffic Data solely for the improvement of the Software or any other products/services of Brother, and Brother.s marketing/research activities, product planning or any other related activities for the benefit of Brother.s customers.....If you agree to provide your Traffic Data to Brother and Google thr
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (520), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1453
                                  Entropy (8bit):4.541602831738816
                                  Encrypted:false
                                  SSDEEP:24:oJkYwEXY9yk4TykWqdy0wHROsgpx4C60dgq21GJOa4ItIL9dicKweY5WIWDi+:omYxX8ykSNWqPKux4XIg3Gdt2I2yJ
                                  MD5:D674BC740FBFED67E2BC5361F3FAE6A4
                                  SHA1:550B4E4B043BE7DFEB274A8DD3390DC49896D7B4
                                  SHA-256:40F14D3F3E5DE23740F244A953A0D6731823B3FFB312545CE55CBEDD2D7776CA
                                  SHA-512:82A1EFA85B06BBD1FC887CD4893FEB5D3717A1BC49B01F08716A152C69D2C7CD872A2825F36138DD2A8082E768CC36298CD798C5677EA5036040737DE30929BD
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd. (.Brother.) uses Google Analytics, a web analytics service provided by Google, Inc. (.Google.) in the Brother software(s) that is/are specified above (.Software.). Google Analytics collects traffic data using .cookies.. The data collected is used to analyze and better understand how you use the Software. For more information about how Google handles your information, please see ..<http://www.google.com/analytics/learn/privacy.html>.....By using Google Analytics, Brother collects traffic data that are non-personally identifiable information (.Traffic Data.) such as your Brother device model and how you use and navigate through the Software. Brother will use the Traffic Data solely for the improvement of the Software or any other products/services of Brother, and Brother.s marketing/research activities, product planning or any other related activities for the benefit of Brother.s customers.....If you agree to provide your Traffic Data to Brother and Google thr
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Non-ISO extended-ASCII text, with very long lines (656), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1811
                                  Entropy (8bit):4.955084925890567
                                  Encrypted:false
                                  SSDEEP:48:omY5yyvsHQlxKIRN7dax165Mz5KxT5AkxKf37iDXHMHzHTHEvwmdmjs/dPD1yvgK:w7vzN7UWMzM92iDkgjdmjs/dL03
                                  MD5:EB33F6279375A58BF416B98755A4324B
                                  SHA1:71D7A5B4D41D40BE44E1F44A53CC1EC468627F69
                                  SHA-256:BBD0B07B18520230725EADEE8A5969E461AC03967E2956B1CD2407D0F081821A
                                  SHA-512:F2A6ED94CB1EEE9969A170F68E74E8F9467FDB63CF3ED090906DD44132FD4A54BCC5130CE7990D7E08C6BB14B5EE4CBAA30B5D5E37DE8808DC39807078C14FEA
                                  Malicious:false
                                  Reputation:low
                                  Preview:..Brother Industries, Ltd. (.Brother.) s.. du.ng Google Analytics, m..t di.ch vu. ph.n t.ch web ....c cung c..p b..i Google, Inc. (.Google.) trong ph..n m..m cu.a Brother ....c quy .i.nh .. tr.n (.Ph..n m..m.). Google Analytics se. thu th..p d.. li..u l.u l...ng b..ng c.ch s.. du.ng .cookie.. C.c d.. li..u thu th..p ....c d.ng ... ph.n t.ch v. hi..u ro. h.n v.. c.ch th..c ba.n s.. du.ng Ph..n m..m. ... bi..t th.m th.ng tin v.. c.ch Google x.. ly. th.ng tin cu.a ba.n, xin vui lo.ng xem ..<http://www.google.com/analytics/learn/privacy.html>.....B..ng c.ch s.. du.ng Google Analytics, Brother thu th..p c.c d.. li..u truy c..p l. nh..ng th.ng tin kh.ng th.. nh..n da.ng c. nh.n (.D.. li..u l.u l...ng.) v. du. nh. model thi..t bi. Brother cu.a ba.n cu.ng nh. c.ch th..c ba.n s.. du.ng v. .i..u h...ng th.ng qua Ph..n m..m. Brother se. chi. s.. du.ng D.. li..u L.u l...ng cho vi..c ca.i thi..n Ph..n m..m ho..c b..t c.. sa.n ph..m/di.ch vu. n.o kh.c cu.a Brother, cu.ng nh. c.c hoa.t ...ng ti..p t
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):1874096
                                  Entropy (8bit):6.424610598143618
                                  Encrypted:false
                                  SSDEEP:49152:qvLtvAG9QP5297I+c8YXGw7o/b98NlzajnF2y+jbMTHEPCqUwEGYDpi:oZQP5297IqYx7o/b9OlzajnyjEHEPCqP
                                  MD5:CDDFE6FF78C9EF7667321A1EBB9D8F33
                                  SHA1:D9511E2760670229DE9A8BAC12C3C50F8E06FE30
                                  SHA-256:8DBD5D676FD21F0B7AB88DED8759F97FF25B0F6531D505C384472F54B3C109CA
                                  SHA-512:B49E7935CCFFF35D6FE347870C6E8FFAAB1FC5141DB890F3F4C85A3C74BDE61F57B8D5029155119AA61AD03AD96B7714D14379985AE3BFE3A227BC23BF1024B4
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........3..R...R...R...*...R...*...R......R......R......S...*...R...R...Q......R......R......R..Rich.R..........................PE..L......Z.....................t.............. ....@.......................... ......w.....@.....................................|.......p............|.......`.......-..................................@............ ...............................text...|........................... ..`.rdata..D.... ......................@..@.data...|........h..................@....rsrc...p............0..............@..@.reloc..T....`......................@..B........................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):17912
                                  Entropy (8bit):3.820754628386777
                                  Encrypted:false
                                  SSDEEP:192:Xv9QqVfnnI/mV06/yCD07/yCTgi4yv8IblWZBlYnZhKdMWIhpa60T5buSDbMKb3S:AkIlSJjtFH+LuE
                                  MD5:90FA7EFC856128BC4798E0FC75BD1307
                                  SHA1:1A779D4226900F58728305EEDB836364C68BFB03
                                  SHA-256:48B91FB5AAC76064740180F67CC264C0C52983BC9618FA74E91490B0504BD097
                                  SHA-512:91318C8227811899DF40125B2CEFFB8ED63F323F41229587623493979030D8BEAF5E02F6112694B0D8CBC6DBAF9F5FD126CD2C57BCA756B2DC6D8181CAD76CA0
                                  Malicious:false
                                  Reputation:low
                                  Preview:....=.=.=.=.=.=. .I.n.s.t.a.l.l.M.a.n.a.g.e.r...)...). .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.....[.V.e.r.s.i.o.n.].....V.e.r.=.0...0...4.7...........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....[.C.o.m.m.o.n.]......."..0.0.T_.....".k0r.S_Y0.0.0.0L0X[(WW0j0D04X.To0.0.0.0.0.0.0(u.0.SgqY0.0.0....U.R.L.U.s.e.r.R.e.g.=.".h.t.t.p.:././.w.w.w...b.r.o.t.h.e.r...c.o.m./.r.e.g.i.s.t.r.a.t.i.o.n./.i.n.d.e.x...h.t.m.l.".....U.R.L.U.s.e.r.R.e.g._.J.P.N.=.".h.t.t.p.s.:././.m.y.p.o.r.t.a.l...b.r.o.t.h.e.r...c.o...j.p./.".....U.R.L.U.s.e.r.R.e.g._.C.H.T.=.".h.t.t.p.:././.w.w.w...b.r.o.t.h.e.r...c.o.m...h.k./.e.n./.w.a.r.r.a.n.t.y./.w.a.r.r.a.n.t.y._.r.e.g.i.s.t.r.a.t.i.o.n...h.t.m.l.".....U.R.L.U.s.e.r.R.e.g._.C.H.S.=.".h.t.t.p.:././.w.w.w...r.e.g...b.r.o.t.h.e.r.-.c.n...n.e.t./.".....U.R.L.U.s.e.r.R.e.g._.K.O.R.=.".h.t.t.p.:././.w.w.w...b.r.o.t.h.e.r...c.o.m...h.k./.e.n./.w.a.r.r.a.n.t.y./.w.a.r.r.a.n.t.y._.r.e.g.i.s.t.r.a.t.i.o.n...h.t.m.l.".....U.R.L.U.s.e.r.R.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):133462
                                  Entropy (8bit):4.315497849702671
                                  Encrypted:false
                                  SSDEEP:1536:Mj0nj0NhjS+kp2T4m48U0Un2w2MlFdQda71j0Ib4Zs3YQG51/vaUWVj4:I0j0Nhm+kp2wnr70Ib4Zs3Y8dVE
                                  MD5:E60A61DF7B972276A8073907A8419F72
                                  SHA1:786D2C8022FE93D4942F442C35CF560319B0DB2A
                                  SHA-256:B21C55BF57A2E6735524512D92D00F118595E650507A8BA68A4DD8BDBB13AB8D
                                  SHA-512:7905B09A289F7D5C5A9238021DCF2734DA8198EB4285CD46BE03F66469F00AC94A9015632DE4F33F9E275DE052B2FB4B120D026F8F011F446B8D77FB59480E11
                                  Malicious:false
                                  Reputation:low
                                  Preview:....=.=.=.=.=.=.=.=.=.=.=.=. .I.n.s.t.a.l.l.M.a.n.a.g.e.r...l.a.n.g. .=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.=.....[.V.e.r.s.i.o.n.].....V.e.r.=.0...0...4.9.........[.A.p.p.N.a.m.e.].....M.a.k.e.r.=.B.r.o.t.h.e.r.....P.t.e.d.i.t.5.0.=.P.-.t.o.u.c.h. .E.d.i.t.o.r. .5...0.....P.t.e.d.i.t.5.1.=.P.-.t.o.u.c.h. .E.d.i.t.o.r. .5...1.....P.t.e.d.i.t.5.2.=.P.-.t.o.u.c.h. .E.d.i.t.o.r. .5...2.....P.t.e.d.i.t.5.0.L.E.=.P.-.t.o.u.c.h. .E.d.i.t.o.r. .5...0. .L.E.....A.d.B.o.o.k.1.1.=.P.-.t.o.u.c.h. .A.d.d.r.e.s.s. .B.o.o.k. .1...1.....A.d.B.o.o.k.1.2.=.P.-.t.o.u.c.h. .A.d.d.r.e.s.s. .B.o.o.k. .1...2.....A.d.B.o.o.k.1.3.=.P.-.t.o.u.c.h. .A.d.d.r.e.s.s. .B.o.o.k. .1...3.....U.p.S.o.f.t.=.P.-.t.o.u.c.h. .U.p.d.a.t.e. .S.o.f.t.w.a.r.e.....V.M.1.0.0.=.V.i.s.t.e.r. .a.n.d. .M.a.n.a.g.e.m.a.n.t. .P.a.k.a.g.e.....P.r.i.n.t.S.e.t.T.o.o.l.=.P.r.i.n.t.e.r. .S.e.t.t.i.n.g. .T.o.o.l.....B.R.A.d.m.i.n.L.=.B.R.A.d.m.i.n. .L.i.g.h.t.....S.C.E.d.i.t.=.S.t.a.m.p. .C.r.e.a.t.o.r.....P.t.T.e.m.p.l.S.e.t.T.o.o.l.=.".P.
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):11275
                                  Entropy (8bit):5.113825257067873
                                  Encrypted:false
                                  SSDEEP:96:JAvpBFOpQu1jlRO/jumpuyuKmAOgizEaoVo4Vic2RH/Tv8Z8knAUgay4KQ5bci6c:JLpdHwuPcmAOgeIQay4KQ5wTgJ
                                  MD5:B3FF13B0A8ECB2093FAE395FE82E00E0
                                  SHA1:6FBBF334EBAA662932839DF4940F905130584525
                                  SHA-256:40BFADCE280322ED52DBF097932BE06FE7353D5E8502C286D9C1B6C092DA5D9D
                                  SHA-512:847099A3A792BC6EE0515FC053C36C2148D859DD6876E335459E0EE3FF81EFD99A7475366F256570BFC67F85E4D4A86022A8BC55353C1AC49ED6AEF748DD8BC7
                                  Malicious:false
                                  Reputation:low
                                  Preview:; uninst.iss Version 1.0.1....;-- P-touch Editor 5.0 ---------------------------------..[{DF9A6075-9308-4572-8932-A4316243C4D9}-DlgOrder]..Dlg0={DF9A6075-9308-4572-8932-A4316243C4D9}-SprintfBox-0..Count=2..Dlg1={DF9A6075-9308-4572-8932-A4316243C4D9}-SdFinish-0..[{DF9A6075-9308-4572-8932-A4316243C4D9}-SprintfBox-0]..Result=1..[{DF9A6075-9308-4572-8932-A4316243C4D9}-SdFinish-0]..Result=1..bOpt1=0..bOpt2=0....;-- AddressBook 1.1 ------------------------------------..[{B2023017-DEE4-44F7-8A71-CA6084BF534C}-DlgOrder]..Dlg0={B2023017-DEE4-44F7-8A71-CA6084BF534C}-SprintfBox-0..Count=2..Dlg1={B2023017-DEE4-44F7-8A71-CA6084BF534C}-SdFinish-0..[{B2023017-DEE4-44F7-8A71-CA6084BF534C}-SprintfBox-0]..Result=1..[{B2023017-DEE4-44F7-8A71-CA6084BF534C}-SdFinish-0]..Result=1..bOpt1=0..bOpt2=0....;-- P-touch Editor 4.2 ------------------------------------..[{003447F5-0058-4B77-9C1E-50488F77C4A7}-DlgOrder]..Dlg0={003447F5-0058-4B77-9C1E-50488F77C4A7}-SprintfBox-0..Count=2..Dlg1={003447F5-0058-4B77-9C1E-5
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Microsoft Cabinet archive data, many, 69003546 bytes, 103 files, at 0x2c +A "\CableLabelTool\ADE\US\AccessDatabaseEngine.exe" +A "\CableLabelTool\CableLabel.msi", ID 12345, number 1, 2219 datablocks, 0x1 compression
                                  Category:dropped
                                  Size (bytes):69003546
                                  Entropy (8bit):7.999804180281638
                                  Encrypted:true
                                  SSDEEP:1572864:8OYUcVPEl9WVSVD1NYE2j2IVknfDLOvkpNjL1R0:8O/JTB5YvkrLpL1R0
                                  MD5:9DEC373C5A191E5C7522A699E06667D5
                                  SHA1:439E3819164A15326E25A8691B1B619A50BA0664
                                  SHA-256:C5DB4AFFE7174611C46A3B764E974CE62986F1026789F8ABCB9018E50DBD56B2
                                  SHA-512:779828DEED9FD17D0C4DEACBFF79DB6586D1CD6547D5B958AF2D7B0E37B17CF1D4A0BB483A76F3FD9D9D8DF46BE4BBAABD63BCF56197D1054E9AFA02094A6755
                                  Malicious:false
                                  Reputation:low
                                  Preview:MSCF............,...........g...90..........h.........LB]. .\CableLabelTool\ADE\US\AccessDatabaseEngine.exe..l~.h......L. .\CableLabelTool\CableLabel.msi.H...h.....RI.. .\CableLabelTool\dotNetFx40_Full_setup.exe.. ....%...#K. .\InstallManager\EULA\ARE\LICENSE.TXT..R..~3%...oK.. .\InstallManager\EULA\ARE\LICENSE_U.txt..%....%...#K. .\InstallManager\EULA\BGR\LICENSE.TXT..g..'.%...#K. .\InstallManager\EULA\BGR\LICENSE_U.txt.....E.&...#K. .\InstallManager\EULA\CHS\LICENSE.TXT......'&...#K. .\InstallManager\EULA\CHS\LICENSE_U.txt......F&...#K. .\InstallManager\EULA\CHT\LICENSE.TXT.....|\&...#K. .\InstallManager\EULA\CHT\LICENSE_U.txt..%..B{&...#K. .\InstallManager\EULA\CRO\LICENSE.TXT.Lc...&...#K. .\InstallManager\EULA\CRO\LICENSE_U.txt..&....'...#K. .\InstallManager\EULA\CZE\LICENSE.TXT..a...*'...#K. .\InstallManager\EULA\CZE\LICENSE_U.txt..*..o.'...#K. .\InstallManager\EULA\DAN\LICENSE.TXT.>e..1.'...#K. .\InstallManager\EULA\DAN\LICENSE_U.txt..-..o.(...#K. .\InstallManager
                                  Process:C:\Users\user\Desktop\download\cltw10100a.exe
                                  File Type:Generic INItialization configuration [Dialog1001]
                                  Category:dropped
                                  Size (bytes):5310
                                  Entropy (8bit):4.906222669572779
                                  Encrypted:false
                                  SSDEEP:96:Kq2orCnavjFYCac5ENA3jOpAWaMd1ZcMeJgocuEaegn:KopxYRcuU2NaM9eJ4aegn
                                  MD5:CFAEC980A3639A6B33704C0DB20CB812
                                  SHA1:E9402B1DEB9293D51EA7A45FF5AEA0F5BFF1EA8F
                                  SHA-256:55023B00E2C2401272D0AD7B4B633814869483B6D939C5D4910E4FF18EEEEE6C
                                  SHA-512:72BB65180098C195EA74C7DACF24500D98BBD872149E4247BDC98B3A12FABD2FD6846A61B7D30E610748D49348C347A1CEC5939276E3A0B30703AEEB591017B2
                                  Malicious:false
                                  Reputation:low
                                  Preview:[Dialog1000]..100=Welcome to the InstallShield Wizard for %s..101=The InstallShield Wizard(TM) will help install %s on your computer. To continue, click Next.....[Dialog1001]..0=License Agreement..1=Please read the following license agreement carefully...121=I &accept the terms in the license agreement..122=I &do not accept the terms in the license agreement....[Dialog1002]..0=Location to Save Files..1=Where would you like to save your files?..101=Please enter the folder where you want these files saved. If the folder does not exist, it will be created for you. To continue, click Next...102=&Save files in folder:..103=&Change.......[Dialog1003]..0=Password..1=This package has been password protected...106=&Password:..107=Enter the password required to run this package. Please note that passwords are case sensitive. Click Next to continue.....[Dialog1004]..0=Overwrite Protection..2=Cancel..109=&Yes..110=&No..111=Y&es to All..112=N&o to All..113=The following file is already on yo
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):107392
                                  Entropy (8bit):5.976686564124204
                                  Encrypted:false
                                  SSDEEP:1536:XDEbW8/KCWYxcnGP48IA2h+k3ZLZwyzHoAoS5RQjKRyVCUA:XDEKrScnS4rAI+wnHoAoS5RT2A
                                  MD5:B83D2774CDAF5016CD8765A630FA1150
                                  SHA1:50B7F86488926C6B06322AF6A5176E4C7786058D
                                  SHA-256:4935372DAA99F6C10033ACCF0CD6403B6F7061477500C1EB65D7CA2DEDBCBFD8
                                  SHA-512:90FD6C47D658491ACFD54A1CB7D76BB01C3E6F58B4DF4466998411D73E497A305DAC13798182448289052F836C92958CA42B69BB14549D51AEA4A0F92E665727
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......,0.hQ..hQ..hQ..a)..&Q..a)..bQ..a)..CQ..O...iQ..O...gQ..hQ...Q..a)..kQ..v...iQ..a)..iQ..RichhQ..........PE..d...F=VL..........#..................}.........@....................................e%.......................................................V..........`............................................................................................................text...~........................... ..`.rdata..rb.......d..................@..@.data....*...p.......R..............@....pdata...............j..............@..@.rsrc...`............z..............@..@................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
                                  Category:dropped
                                  Size (bytes):265080
                                  Entropy (8bit):7.943414176526729
                                  Encrypted:false
                                  SSDEEP:6144:4w2aRHD/ToBCIqR8qJsDW9L4yR3OSc27xbOuU0j+2zu:4iPG3DWqyR3a27x6un+Ou
                                  MD5:3795427182D2DC8CE5609A342BC65313
                                  SHA1:0E53A85D991526A9191D3B0F3007363B3649FAF0
                                  SHA-256:F82E52E2A5176C01312F95B300B66AB1D2A0B0BC2556500C8F42A61390CC49CD
                                  SHA-512:6C3669B38B67EE37D99F452AD6B0F58102FD0DB952E9F146B8E0EC409CE5BC61052D4CDB23C2EED4183B18BAF529C86AC95BAE420A90908D58D5F4399B0E1B76
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.yo...<...<...<...<...<p..<...<...<...<U..<...<=..<...<d..<...<..<...<8.2<...<..<...<...<...<=..<X..<..<...<...<...<Rich...<........PE..L....=VL...........!.....p..........(6.......................................`......xH.......................................3..........................x....P.......................................................................................text...................PEC2MO...... ....rsrc....@.......2.................. ....reloc.......P......................@...................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:Generic INItialization configuration [f1]
                                  Category:dropped
                                  Size (bytes):383
                                  Entropy (8bit):5.215002152375616
                                  Encrypted:false
                                  SSDEEP:6:sWCVUxKPoXndnp7pGQjocnPQIyG43mKQjKLUJye1OIdOwbbQ1O2YXUIR3yMp4RWd:sWCV4Cotnp7I4ocnP/R43KjpJpOIdOw/
                                  MD5:A35C6D0BC085AFA759A0095C55C60F06
                                  SHA1:931F401780192FE72AF0F5C4A4446C736F4479C3
                                  SHA-256:09EE280169F041A5F85E408DD0F04DB6C455BD93309B5CA499B94DE12A4C081C
                                  SHA-512:4FFF6092ABF4717143A84EEEA8215D5DDC0B49B9BC34875250BA5E6B7850FA577ED2A85FAEEC70AB134680ABE8B5EE0E0571A39C93E086D7C5781B635CB998C0
                                  Malicious:false
                                  Reputation:low
                                  Preview:[SetupDefaults]..LangID=1033..ProductCode={7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}..TempPathGuid={30874103-0688-43A5-9E3B-21A95569093A}..[f1]..Function=AfterFontsData..[f2]..Function=BeforeFontsData..[f3]..Function=DelJPNFontsReg..[f4]..Function=DelRegData..[f5]..Function=DelShortCutFiles..[f6]..Function=SetRegData..[f8]..Function=SetShortCutFiles..[f7]..Function=TransPropertyData..
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (332), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):175920
                                  Entropy (8bit):3.6527040423465094
                                  Encrypted:false
                                  SSDEEP:1536:2ujBLJ6/K41VBrChTHx8IdK2hWA/z+wKZU6rPsHnQvvOuyMJice1VOL27p5:2SLm1UTR8AW9toe0
                                  MD5:BB3BB7C1B04B607A292A264B30F568BD
                                  SHA1:1ECF35D483A8B3E30C152F348FE0CDDA9C7E2B7A
                                  SHA-256:EF947B77AE9401CC524D5FF44C52DB830B97692B6BBB368D6754233DF9584900
                                  SHA-512:F22DFA40426338C07D34D644A8BF268A8CBD188DA361A7F199A9266BF27B3B39B163A731FD6E43A436D098360D575BD2A519BEE0DFC44D6C31B5D5ED6353F959
                                  Malicious:false
                                  Reputation:low
                                  Preview:..C.O.M.P.A.N.Y._.N.A.M.E.=.B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d.......D.N._.A.l.w.a.y.s.I.n.s.t.a.l.l.=.A.l.w.a.y.s. .I.n.s.t.a.l.l.....I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.C.O.L.O.R.=.T.h.e. .c.o.l.o.r. .s.e.t.t.i.n.g.s. .o.f. .y.o.u.r. .s.y.s.t.e.m. .a.r.e. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.O.S.=.T.h.e. .o.p.e.r.a.t.i.n.g. .s.y.s.t.e.m. .i.s. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.P.R.O.C.E.S.S.O.R.=.T.h.e. .p.r.o.c.e.s.s.o.r. .i.s. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.R.A.M.=.T.h.e. .a.m.o.u.n.t. .o.f. .R.A.M. .i.s. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):553067
                                  Entropy (8bit):4.803761151742621
                                  Encrypted:false
                                  SSDEEP:6144:hhs4d9dcOaOdXGJ3hskkkkknffCp5CrRKlua8AHqPK8:7s4d9dfaOdWxq1qv
                                  MD5:25F79C8F92B15D20D57142D27B43D45B
                                  SHA1:4F9F50EE529EBD0B9E5F81958DFD33A5C3C912BF
                                  SHA-256:90CE1658595EE7EE977D8DCE4F7A070426520F20FA38867B9FF14869AD8EC598
                                  SHA-512:C989C69BE10A560DC725C4433C48C6099DA892B0BA21F90E5F9F4A68CE8C3CB630A9EA548DA9781D6862D2C3408273987764E351598E614DBD6C76A90EA9E0C3
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^..(...{...{...{...{...{,..{J..{...{P..{..{...{,..{...{..{...{Rich...{........PE..L...rQVL...........!.........................................................................................................@..(....P.......................p.......................................................A...............................text...@........................... ..`.rdata........... ..................@..@.data....f.......P..................@....idata.......@....... ..............@....rsrc........P... ...0..............@..@.reloc..q....p... ...P..............@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):264424
                                  Entropy (8bit):7.346265439633612
                                  Encrypted:false
                                  SSDEEP:3072:jtQ0F42UcxJXnO1kOzkheOEdfmsq7vDC7fAE/AJRjoMnE8K91xah5WrsKZLLEXnY:jbF42UcxQ1k3y78KrxCMrTpM/WX
                                  MD5:D18C947B4B9AFDEC7ABB17DE1C52BEFA
                                  SHA1:F52DBD36FE42A71746BF9007556C11C81CD9AA9A
                                  SHA-256:70595A19DA53253C4404CACC3F424AAA40950D5A98B958B5AF6DF3430A191DB5
                                  SHA-512:C7FB1F2DA1BB8188EB0D1D9B2733E36F7936C6DDEC821FE1C91E6D1E7AA244F0464C8E095D6C8E7F92881E23D39703A6A7142A22CCC7A730D9B7AE9ED023F74C
                                  Malicious:false
                                  Reputation:low
                                  Preview:t.,....(... <$.M. .=..........l.............o.c...gWSl..SW..WS[//d.d l$.XX%.......................q.y}a.=mQ.Y]A..M1..-!.)........................................}...m..q]})eMm=U=].E-M.5.=.%.-.............................p...Y......a..(..H....YQQEY.0.o=55.={.gC[..W.....O.So##` ......,..x8........X......]..H.........5MM.5s..gW.CKgCC.....;..TDh..8P@........8.....p.e..Q...| h......%]1II.1....S[wSS.[.G.W.o....L.`H ..D.. ........t....L......ayyIa......s..w!99.!....Gs[K[............T,.0,,......|(.....l...P...yyy!a...........w.o.....W.;o?g..+O.....4.,$\.@....<......l......}uuI}.4..@....!99.!..s.w..3{.SGk.......0.D4\.... H.............4...Ye}!e. ..D....c.w......w3.;#.#C.[.THl....(.<,4p,.$.......a..t...8..L..YQQ=Y...w.{o..`.--..S.w3.7+kk .....$..H8@.X,0...y...........x...H...1miMQ.c4....{%9-%%.-c.sO.....'7?..... @\D.....H................u..au...YmAYY)A.g k.so.Kk......w'.g#+;+[. ..<T....(,.8..$.$.x.....i..Y...d.......IE911.9w.W._GC....._C.o#.[#|h..4l
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):107392
                                  Entropy (8bit):5.976686564124204
                                  Encrypted:false
                                  SSDEEP:1536:XDEbW8/KCWYxcnGP48IA2h+k3ZLZwyzHoAoS5RQjKRyVCUA:XDEKrScnS4rAI+wnHoAoS5RT2A
                                  MD5:B83D2774CDAF5016CD8765A630FA1150
                                  SHA1:50B7F86488926C6B06322AF6A5176E4C7786058D
                                  SHA-256:4935372DAA99F6C10033ACCF0CD6403B6F7061477500C1EB65D7CA2DEDBCBFD8
                                  SHA-512:90FD6C47D658491ACFD54A1CB7D76BB01C3E6F58B4DF4466998411D73E497A305DAC13798182448289052F836C92958CA42B69BB14549D51AEA4A0F92E665727
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......,0.hQ..hQ..hQ..a)..&Q..a)..bQ..a)..CQ..O...iQ..O...gQ..hQ...Q..a)..kQ..v...iQ..a)..iQ..RichhQ..........PE..d...F=VL..........#..................}.........@....................................e%.......................................................V..........`............................................................................................................text...~........................... ..`.rdata..rb.......d..................@..@.data....*...p.......R..............@....pdata...............j..............@..@.rsrc...`............z..............@..@................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
                                  Category:dropped
                                  Size (bytes):265080
                                  Entropy (8bit):7.943414176526729
                                  Encrypted:false
                                  SSDEEP:6144:4w2aRHD/ToBCIqR8qJsDW9L4yR3OSc27xbOuU0j+2zu:4iPG3DWqyR3a27x6un+Ou
                                  MD5:3795427182D2DC8CE5609A342BC65313
                                  SHA1:0E53A85D991526A9191D3B0F3007363B3649FAF0
                                  SHA-256:F82E52E2A5176C01312F95B300B66AB1D2A0B0BC2556500C8F42A61390CC49CD
                                  SHA-512:6C3669B38B67EE37D99F452AD6B0F58102FD0DB952E9F146B8E0EC409CE5BC61052D4CDB23C2EED4183B18BAF529C86AC95BAE420A90908D58D5F4399B0E1B76
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.yo...<...<...<...<...<p..<...<...<...<U..<...<=..<...<d..<...<..<...<8.2<...<..<...<...<...<=..<X..<..<...<...<...<Rich...<........PE..L....=VL...........!.....p..........(6.......................................`......xH.......................................3..........................x....P.......................................................................................text...................PEC2MO...... ....rsrc....@.......2.................. ....reloc.......P......................@...................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:Generic INItialization configuration [f1]
                                  Category:dropped
                                  Size (bytes):383
                                  Entropy (8bit):5.215002152375616
                                  Encrypted:false
                                  SSDEEP:6:sWCVUxKPoXndnp7pGQjocnPQIyG43mKQjKLUJye1OIdOwbbQ1O2YXUIR3yMp4RWd:sWCV4Cotnp7I4ocnP/R43KjpJpOIdOw/
                                  MD5:A35C6D0BC085AFA759A0095C55C60F06
                                  SHA1:931F401780192FE72AF0F5C4A4446C736F4479C3
                                  SHA-256:09EE280169F041A5F85E408DD0F04DB6C455BD93309B5CA499B94DE12A4C081C
                                  SHA-512:4FFF6092ABF4717143A84EEEA8215D5DDC0B49B9BC34875250BA5E6B7850FA577ED2A85FAEEC70AB134680ABE8B5EE0E0571A39C93E086D7C5781B635CB998C0
                                  Malicious:false
                                  Reputation:low
                                  Preview:[SetupDefaults]..LangID=1033..ProductCode={7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}..TempPathGuid={30874103-0688-43A5-9E3B-21A95569093A}..[f1]..Function=AfterFontsData..[f2]..Function=BeforeFontsData..[f3]..Function=DelJPNFontsReg..[f4]..Function=DelRegData..[f5]..Function=DelShortCutFiles..[f6]..Function=SetRegData..[f8]..Function=SetShortCutFiles..[f7]..Function=TransPropertyData..
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (332), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):175920
                                  Entropy (8bit):3.6527040423465094
                                  Encrypted:false
                                  SSDEEP:1536:2ujBLJ6/K41VBrChTHx8IdK2hWA/z+wKZU6rPsHnQvvOuyMJice1VOL27p5:2SLm1UTR8AW9toe0
                                  MD5:BB3BB7C1B04B607A292A264B30F568BD
                                  SHA1:1ECF35D483A8B3E30C152F348FE0CDDA9C7E2B7A
                                  SHA-256:EF947B77AE9401CC524D5FF44C52DB830B97692B6BBB368D6754233DF9584900
                                  SHA-512:F22DFA40426338C07D34D644A8BF268A8CBD188DA361A7F199A9266BF27B3B39B163A731FD6E43A436D098360D575BD2A519BEE0DFC44D6C31B5D5ED6353F959
                                  Malicious:false
                                  Reputation:low
                                  Preview:..C.O.M.P.A.N.Y._.N.A.M.E.=.B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d.......D.N._.A.l.w.a.y.s.I.n.s.t.a.l.l.=.A.l.w.a.y.s. .I.n.s.t.a.l.l.....I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.C.O.L.O.R.=.T.h.e. .c.o.l.o.r. .s.e.t.t.i.n.g.s. .o.f. .y.o.u.r. .s.y.s.t.e.m. .a.r.e. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.O.S.=.T.h.e. .o.p.e.r.a.t.i.n.g. .s.y.s.t.e.m. .i.s. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.P.R.O.C.E.S.S.O.R.=.T.h.e. .p.r.o.c.e.s.s.o.r. .i.s. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.R.A.M.=.T.h.e. .a.m.o.u.n.t. .o.f. .R.A.M. .i.s. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):553067
                                  Entropy (8bit):4.803761151742621
                                  Encrypted:false
                                  SSDEEP:6144:hhs4d9dcOaOdXGJ3hskkkkknffCp5CrRKlua8AHqPK8:7s4d9dfaOdWxq1qv
                                  MD5:25F79C8F92B15D20D57142D27B43D45B
                                  SHA1:4F9F50EE529EBD0B9E5F81958DFD33A5C3C912BF
                                  SHA-256:90CE1658595EE7EE977D8DCE4F7A070426520F20FA38867B9FF14869AD8EC598
                                  SHA-512:C989C69BE10A560DC725C4433C48C6099DA892B0BA21F90E5F9F4A68CE8C3CB630A9EA548DA9781D6862D2C3408273987764E351598E614DBD6C76A90EA9E0C3
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^..(...{...{...{...{...{,..{J..{...{P..{..{...{,..{...{..{...{Rich...{........PE..L...rQVL...........!.........................................................................................................@..(....P.......................p.......................................................A...............................text...@........................... ..`.rdata........... ..................@..@.data....f.......P..................@....idata.......@....... ..............@....rsrc........P... ...0..............@..@.reloc..q....p... ...P..............@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):264424
                                  Entropy (8bit):7.346265439633612
                                  Encrypted:false
                                  SSDEEP:3072:jtQ0F42UcxJXnO1kOzkheOEdfmsq7vDC7fAE/AJRjoMnE8K91xah5WrsKZLLEXnY:jbF42UcxQ1k3y78KrxCMrTpM/WX
                                  MD5:D18C947B4B9AFDEC7ABB17DE1C52BEFA
                                  SHA1:F52DBD36FE42A71746BF9007556C11C81CD9AA9A
                                  SHA-256:70595A19DA53253C4404CACC3F424AAA40950D5A98B958B5AF6DF3430A191DB5
                                  SHA-512:C7FB1F2DA1BB8188EB0D1D9B2733E36F7936C6DDEC821FE1C91E6D1E7AA244F0464C8E095D6C8E7F92881E23D39703A6A7142A22CCC7A730D9B7AE9ED023F74C
                                  Malicious:false
                                  Reputation:low
                                  Preview:t.,....(... <$.M. .=..........l.............o.c...gWSl..SW..WS[//d.d l$.XX%.......................q.y}a.=mQ.Y]A..M1..-!.)........................................}...m..q]})eMm=U=].E-M.5.=.%.-.............................p...Y......a..(..H....YQQEY.0.o=55.={.gC[..W.....O.So##` ......,..x8........X......]..H.........5MM.5s..gW.CKgCC.....;..TDh..8P@........8.....p.e..Q...| h......%]1II.1....S[wSS.[.G.W.o....L.`H ..D.. ........t....L......ayyIa......s..w!99.!....Gs[K[............T,.0,,......|(.....l...P...yyy!a...........w.o.....W.;o?g..+O.....4.,$\.@....<......l......}uuI}.4..@....!99.!..s.w..3{.SGk.......0.D4\.... H.............4...Ye}!e. ..D....c.w......w3.;#.#C.[.THl....(.<,4p,.$.......a..t...8..L..YQQ=Y...w.{o..`.--..S.w3.7+kk .....$..H8@.X,0...y...........x...H...1miMQ.c4....{%9-%%.-c.sO.....'7?..... @\D.....H................u..au...YmAYY)A.g k.so.Kk......w'.g#+;+[. ..<T....(,.8..$.$.x.....i..Y...d.......IE911.9w.W._GC....._C.o#.[#|h..4l
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):107392
                                  Entropy (8bit):5.976686564124204
                                  Encrypted:false
                                  SSDEEP:1536:XDEbW8/KCWYxcnGP48IA2h+k3ZLZwyzHoAoS5RQjKRyVCUA:XDEKrScnS4rAI+wnHoAoS5RT2A
                                  MD5:B83D2774CDAF5016CD8765A630FA1150
                                  SHA1:50B7F86488926C6B06322AF6A5176E4C7786058D
                                  SHA-256:4935372DAA99F6C10033ACCF0CD6403B6F7061477500C1EB65D7CA2DEDBCBFD8
                                  SHA-512:90FD6C47D658491ACFD54A1CB7D76BB01C3E6F58B4DF4466998411D73E497A305DAC13798182448289052F836C92958CA42B69BB14549D51AEA4A0F92E665727
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......,0.hQ..hQ..hQ..a)..&Q..a)..bQ..a)..CQ..O...iQ..O...gQ..hQ...Q..a)..kQ..v...iQ..a)..iQ..RichhQ..........PE..d...F=VL..........#..................}.........@....................................e%.......................................................V..........`............................................................................................................text...~........................... ..`.rdata..rb.......d..................@..@.data....*...p.......R..............@....pdata...............j..............@..@.rsrc...`............z..............@..@................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
                                  Category:dropped
                                  Size (bytes):265080
                                  Entropy (8bit):7.943414176526729
                                  Encrypted:false
                                  SSDEEP:6144:4w2aRHD/ToBCIqR8qJsDW9L4yR3OSc27xbOuU0j+2zu:4iPG3DWqyR3a27x6un+Ou
                                  MD5:3795427182D2DC8CE5609A342BC65313
                                  SHA1:0E53A85D991526A9191D3B0F3007363B3649FAF0
                                  SHA-256:F82E52E2A5176C01312F95B300B66AB1D2A0B0BC2556500C8F42A61390CC49CD
                                  SHA-512:6C3669B38B67EE37D99F452AD6B0F58102FD0DB952E9F146B8E0EC409CE5BC61052D4CDB23C2EED4183B18BAF529C86AC95BAE420A90908D58D5F4399B0E1B76
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.yo...<...<...<...<...<p..<...<...<...<U..<...<=..<...<d..<...<..<...<8.2<...<..<...<...<...<=..<X..<..<...<...<...<Rich...<........PE..L....=VL...........!.....p..........(6.......................................`......xH.......................................3..........................x....P.......................................................................................text...................PEC2MO...... ....rsrc....@.......2.................. ....reloc.......P......................@...................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:Generic INItialization configuration [f1]
                                  Category:dropped
                                  Size (bytes):383
                                  Entropy (8bit):5.215002152375616
                                  Encrypted:false
                                  SSDEEP:6:sWCVUxKPoXndnp7pGQjocnPQIyG43mKQjKLUJye1OIdOwbbQ1O2YXUIR3yMp4RWd:sWCV4Cotnp7I4ocnP/R43KjpJpOIdOw/
                                  MD5:A35C6D0BC085AFA759A0095C55C60F06
                                  SHA1:931F401780192FE72AF0F5C4A4446C736F4479C3
                                  SHA-256:09EE280169F041A5F85E408DD0F04DB6C455BD93309B5CA499B94DE12A4C081C
                                  SHA-512:4FFF6092ABF4717143A84EEEA8215D5DDC0B49B9BC34875250BA5E6B7850FA577ED2A85FAEEC70AB134680ABE8B5EE0E0571A39C93E086D7C5781B635CB998C0
                                  Malicious:false
                                  Reputation:low
                                  Preview:[SetupDefaults]..LangID=1033..ProductCode={7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}..TempPathGuid={30874103-0688-43A5-9E3B-21A95569093A}..[f1]..Function=AfterFontsData..[f2]..Function=BeforeFontsData..[f3]..Function=DelJPNFontsReg..[f4]..Function=DelRegData..[f5]..Function=DelShortCutFiles..[f6]..Function=SetRegData..[f8]..Function=SetShortCutFiles..[f7]..Function=TransPropertyData..
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (332), with CRLF line terminators
                                  Category:modified
                                  Size (bytes):175920
                                  Entropy (8bit):3.6527040423465094
                                  Encrypted:false
                                  SSDEEP:1536:2ujBLJ6/K41VBrChTHx8IdK2hWA/z+wKZU6rPsHnQvvOuyMJice1VOL27p5:2SLm1UTR8AW9toe0
                                  MD5:BB3BB7C1B04B607A292A264B30F568BD
                                  SHA1:1ECF35D483A8B3E30C152F348FE0CDDA9C7E2B7A
                                  SHA-256:EF947B77AE9401CC524D5FF44C52DB830B97692B6BBB368D6754233DF9584900
                                  SHA-512:F22DFA40426338C07D34D644A8BF268A8CBD188DA361A7F199A9266BF27B3B39B163A731FD6E43A436D098360D575BD2A519BEE0DFC44D6C31B5D5ED6353F959
                                  Malicious:false
                                  Reputation:low
                                  Preview:..C.O.M.P.A.N.Y._.N.A.M.E.=.B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d.......D.N._.A.l.w.a.y.s.I.n.s.t.a.l.l.=.A.l.w.a.y.s. .I.n.s.t.a.l.l.....I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.C.O.L.O.R.=.T.h.e. .c.o.l.o.r. .s.e.t.t.i.n.g.s. .o.f. .y.o.u.r. .s.y.s.t.e.m. .a.r.e. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.O.S.=.T.h.e. .o.p.e.r.a.t.i.n.g. .s.y.s.t.e.m. .i.s. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.P.R.O.C.E.S.S.O.R.=.T.h.e. .p.r.o.c.e.s.s.o.r. .i.s. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.R.A.M.=.T.h.e. .a.m.o.u.n.t. .o.f. .R.A.M. .i.s. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):553067
                                  Entropy (8bit):4.803761151742621
                                  Encrypted:false
                                  SSDEEP:6144:hhs4d9dcOaOdXGJ3hskkkkknffCp5CrRKlua8AHqPK8:7s4d9dfaOdWxq1qv
                                  MD5:25F79C8F92B15D20D57142D27B43D45B
                                  SHA1:4F9F50EE529EBD0B9E5F81958DFD33A5C3C912BF
                                  SHA-256:90CE1658595EE7EE977D8DCE4F7A070426520F20FA38867B9FF14869AD8EC598
                                  SHA-512:C989C69BE10A560DC725C4433C48C6099DA892B0BA21F90E5F9F4A68CE8C3CB630A9EA548DA9781D6862D2C3408273987764E351598E614DBD6C76A90EA9E0C3
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^..(...{...{...{...{...{,..{J..{...{P..{..{...{,..{...{..{...{Rich...{........PE..L...rQVL...........!.........................................................................................................@..(....P.......................p.......................................................A...............................text...@........................... ..`.rdata........... ..................@..@.data....f.......P..................@....idata.......@....... ..............@....rsrc........P... ...0..............@..@.reloc..q....p... ...P..............@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):264424
                                  Entropy (8bit):7.346265439633612
                                  Encrypted:false
                                  SSDEEP:3072:jtQ0F42UcxJXnO1kOzkheOEdfmsq7vDC7fAE/AJRjoMnE8K91xah5WrsKZLLEXnY:jbF42UcxQ1k3y78KrxCMrTpM/WX
                                  MD5:D18C947B4B9AFDEC7ABB17DE1C52BEFA
                                  SHA1:F52DBD36FE42A71746BF9007556C11C81CD9AA9A
                                  SHA-256:70595A19DA53253C4404CACC3F424AAA40950D5A98B958B5AF6DF3430A191DB5
                                  SHA-512:C7FB1F2DA1BB8188EB0D1D9B2733E36F7936C6DDEC821FE1C91E6D1E7AA244F0464C8E095D6C8E7F92881E23D39703A6A7142A22CCC7A730D9B7AE9ED023F74C
                                  Malicious:false
                                  Reputation:low
                                  Preview:t.,....(... <$.M. .=..........l.............o.c...gWSl..SW..WS[//d.d l$.XX%.......................q.y}a.=mQ.Y]A..M1..-!.)........................................}...m..q]})eMm=U=].E-M.5.=.%.-.............................p...Y......a..(..H....YQQEY.0.o=55.={.gC[..W.....O.So##` ......,..x8........X......]..H.........5MM.5s..gW.CKgCC.....;..TDh..8P@........8.....p.e..Q...| h......%]1II.1....S[wSS.[.G.W.o....L.`H ..D.. ........t....L......ayyIa......s..w!99.!....Gs[K[............T,.0,,......|(.....l...P...yyy!a...........w.o.....W.;o?g..+O.....4.,$\.@....<......l......}uuI}.4..@....!99.!..s.w..3{.SGk.......0.D4\.... H.............4...Ye}!e. ..D....c.w......w3.;#.#C.[.THl....(.<,4p,.$.......a..t...8..L..YQQ=Y...w.{o..`.--..S.w3.7+kk .....$..H8@.X,0...y...........x...H...1miMQ.c4....{%9-%%.-c.sO.....'7?..... @\D.....H................u..au...YmAYY)A.g k.so.Kk......w'.g#+;+[. ..<T....(,.8..$.$.x.....i..Y...d.......IE911.9w.W._GC....._C.o#.[#|h..4l
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):107392
                                  Entropy (8bit):5.976686564124204
                                  Encrypted:false
                                  SSDEEP:1536:XDEbW8/KCWYxcnGP48IA2h+k3ZLZwyzHoAoS5RQjKRyVCUA:XDEKrScnS4rAI+wnHoAoS5RT2A
                                  MD5:B83D2774CDAF5016CD8765A630FA1150
                                  SHA1:50B7F86488926C6B06322AF6A5176E4C7786058D
                                  SHA-256:4935372DAA99F6C10033ACCF0CD6403B6F7061477500C1EB65D7CA2DEDBCBFD8
                                  SHA-512:90FD6C47D658491ACFD54A1CB7D76BB01C3E6F58B4DF4466998411D73E497A305DAC13798182448289052F836C92958CA42B69BB14549D51AEA4A0F92E665727
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......,0.hQ..hQ..hQ..a)..&Q..a)..bQ..a)..CQ..O...iQ..O...gQ..hQ...Q..a)..kQ..v...iQ..a)..iQ..RichhQ..........PE..d...F=VL..........#..................}.........@....................................e%.......................................................V..........`............................................................................................................text...~........................... ..`.rdata..rb.......d..................@..@.data....*...p.......R..............@....pdata...............j..............@..@.rsrc...`............z..............@..@................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
                                  Category:dropped
                                  Size (bytes):265080
                                  Entropy (8bit):7.943414176526729
                                  Encrypted:false
                                  SSDEEP:6144:4w2aRHD/ToBCIqR8qJsDW9L4yR3OSc27xbOuU0j+2zu:4iPG3DWqyR3a27x6un+Ou
                                  MD5:3795427182D2DC8CE5609A342BC65313
                                  SHA1:0E53A85D991526A9191D3B0F3007363B3649FAF0
                                  SHA-256:F82E52E2A5176C01312F95B300B66AB1D2A0B0BC2556500C8F42A61390CC49CD
                                  SHA-512:6C3669B38B67EE37D99F452AD6B0F58102FD0DB952E9F146B8E0EC409CE5BC61052D4CDB23C2EED4183B18BAF529C86AC95BAE420A90908D58D5F4399B0E1B76
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.yo...<...<...<...<...<p..<...<...<...<U..<...<=..<...<d..<...<..<...<8.2<...<..<...<...<...<=..<X..<..<...<...<...<Rich...<........PE..L....=VL...........!.....p..........(6.......................................`......xH.......................................3..........................x....P.......................................................................................text...................PEC2MO...... ....rsrc....@.......2.................. ....reloc.......P......................@...................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:Generic INItialization configuration [f1]
                                  Category:dropped
                                  Size (bytes):383
                                  Entropy (8bit):5.215002152375616
                                  Encrypted:false
                                  SSDEEP:6:sWCVUxKPoXndnp7pGQjocnPQIyG43mKQjKLUJye1OIdOwbbQ1O2YXUIR3yMp4RWd:sWCV4Cotnp7I4ocnP/R43KjpJpOIdOw/
                                  MD5:A35C6D0BC085AFA759A0095C55C60F06
                                  SHA1:931F401780192FE72AF0F5C4A4446C736F4479C3
                                  SHA-256:09EE280169F041A5F85E408DD0F04DB6C455BD93309B5CA499B94DE12A4C081C
                                  SHA-512:4FFF6092ABF4717143A84EEEA8215D5DDC0B49B9BC34875250BA5E6B7850FA577ED2A85FAEEC70AB134680ABE8B5EE0E0571A39C93E086D7C5781B635CB998C0
                                  Malicious:false
                                  Reputation:low
                                  Preview:[SetupDefaults]..LangID=1033..ProductCode={7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}..TempPathGuid={30874103-0688-43A5-9E3B-21A95569093A}..[f1]..Function=AfterFontsData..[f2]..Function=BeforeFontsData..[f3]..Function=DelJPNFontsReg..[f4]..Function=DelRegData..[f5]..Function=DelShortCutFiles..[f6]..Function=SetRegData..[f8]..Function=SetShortCutFiles..[f7]..Function=TransPropertyData..
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (332), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):175920
                                  Entropy (8bit):3.6527040423465094
                                  Encrypted:false
                                  SSDEEP:1536:2ujBLJ6/K41VBrChTHx8IdK2hWA/z+wKZU6rPsHnQvvOuyMJice1VOL27p5:2SLm1UTR8AW9toe0
                                  MD5:BB3BB7C1B04B607A292A264B30F568BD
                                  SHA1:1ECF35D483A8B3E30C152F348FE0CDDA9C7E2B7A
                                  SHA-256:EF947B77AE9401CC524D5FF44C52DB830B97692B6BBB368D6754233DF9584900
                                  SHA-512:F22DFA40426338C07D34D644A8BF268A8CBD188DA361A7F199A9266BF27B3B39B163A731FD6E43A436D098360D575BD2A519BEE0DFC44D6C31B5D5ED6353F959
                                  Malicious:false
                                  Reputation:low
                                  Preview:..C.O.M.P.A.N.Y._.N.A.M.E.=.B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d.......D.N._.A.l.w.a.y.s.I.n.s.t.a.l.l.=.A.l.w.a.y.s. .I.n.s.t.a.l.l.....I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.C.O.L.O.R.=.T.h.e. .c.o.l.o.r. .s.e.t.t.i.n.g.s. .o.f. .y.o.u.r. .s.y.s.t.e.m. .a.r.e. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.O.S.=.T.h.e. .o.p.e.r.a.t.i.n.g. .s.y.s.t.e.m. .i.s. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.P.R.O.C.E.S.S.O.R.=.T.h.e. .p.r.o.c.e.s.s.o.r. .i.s. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.R.A.M.=.T.h.e. .a.m.o.u.n.t. .o.f. .R.A.M. .i.s. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):553067
                                  Entropy (8bit):4.803761151742621
                                  Encrypted:false
                                  SSDEEP:6144:hhs4d9dcOaOdXGJ3hskkkkknffCp5CrRKlua8AHqPK8:7s4d9dfaOdWxq1qv
                                  MD5:25F79C8F92B15D20D57142D27B43D45B
                                  SHA1:4F9F50EE529EBD0B9E5F81958DFD33A5C3C912BF
                                  SHA-256:90CE1658595EE7EE977D8DCE4F7A070426520F20FA38867B9FF14869AD8EC598
                                  SHA-512:C989C69BE10A560DC725C4433C48C6099DA892B0BA21F90E5F9F4A68CE8C3CB630A9EA548DA9781D6862D2C3408273987764E351598E614DBD6C76A90EA9E0C3
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^..(...{...{...{...{...{,..{J..{...{P..{..{...{,..{...{..{...{Rich...{........PE..L...rQVL...........!.........................................................................................................@..(....P.......................p.......................................................A...............................text...@........................... ..`.rdata........... ..................@..@.data....f.......P..................@....idata.......@....... ..............@....rsrc........P... ...0..............@..@.reloc..q....p... ...P..............@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):264424
                                  Entropy (8bit):7.346265439633612
                                  Encrypted:false
                                  SSDEEP:3072:jtQ0F42UcxJXnO1kOzkheOEdfmsq7vDC7fAE/AJRjoMnE8K91xah5WrsKZLLEXnY:jbF42UcxQ1k3y78KrxCMrTpM/WX
                                  MD5:D18C947B4B9AFDEC7ABB17DE1C52BEFA
                                  SHA1:F52DBD36FE42A71746BF9007556C11C81CD9AA9A
                                  SHA-256:70595A19DA53253C4404CACC3F424AAA40950D5A98B958B5AF6DF3430A191DB5
                                  SHA-512:C7FB1F2DA1BB8188EB0D1D9B2733E36F7936C6DDEC821FE1C91E6D1E7AA244F0464C8E095D6C8E7F92881E23D39703A6A7142A22CCC7A730D9B7AE9ED023F74C
                                  Malicious:false
                                  Reputation:low
                                  Preview:t.,....(... <$.M. .=..........l.............o.c...gWSl..SW..WS[//d.d l$.XX%.......................q.y}a.=mQ.Y]A..M1..-!.)........................................}...m..q]})eMm=U=].E-M.5.=.%.-.............................p...Y......a..(..H....YQQEY.0.o=55.={.gC[..W.....O.So##` ......,..x8........X......]..H.........5MM.5s..gW.CKgCC.....;..TDh..8P@........8.....p.e..Q...| h......%]1II.1....S[wSS.[.G.W.o....L.`H ..D.. ........t....L......ayyIa......s..w!99.!....Gs[K[............T,.0,,......|(.....l...P...yyy!a...........w.o.....W.;o?g..+O.....4.,$\.@....<......l......}uuI}.4..@....!99.!..s.w..3{.SGk.......0.D4\.... H.............4...Ye}!e. ..D....c.w......w3.;#.#C.[.THl....(.<,4p,.$.......a..t...8..L..YQQ=Y...w.{o..`.--..S.w3.7+kk .....$..H8@.X,0...y...........x...H...1miMQ.c4....{%9-%%.-c.sO.....'7?..... @\D.....H................u..au...YmAYY)A.g k.so.Kk......w'.g#+;+[. ..<T....(,.8..$.$.x.....i..Y...d.......IE911.9w.W._GC....._C.o#.[#|h..4l
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):107392
                                  Entropy (8bit):5.976686564124204
                                  Encrypted:false
                                  SSDEEP:1536:XDEbW8/KCWYxcnGP48IA2h+k3ZLZwyzHoAoS5RQjKRyVCUA:XDEKrScnS4rAI+wnHoAoS5RT2A
                                  MD5:B83D2774CDAF5016CD8765A630FA1150
                                  SHA1:50B7F86488926C6B06322AF6A5176E4C7786058D
                                  SHA-256:4935372DAA99F6C10033ACCF0CD6403B6F7061477500C1EB65D7CA2DEDBCBFD8
                                  SHA-512:90FD6C47D658491ACFD54A1CB7D76BB01C3E6F58B4DF4466998411D73E497A305DAC13798182448289052F836C92958CA42B69BB14549D51AEA4A0F92E665727
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......,0.hQ..hQ..hQ..a)..&Q..a)..bQ..a)..CQ..O...iQ..O...gQ..hQ...Q..a)..kQ..v...iQ..a)..iQ..RichhQ..........PE..d...F=VL..........#..................}.........@....................................e%.......................................................V..........`............................................................................................................text...~........................... ..`.rdata..rb.......d..................@..@.data....*...p.......R..............@....pdata...............j..............@..@.rsrc...`............z..............@..@................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
                                  Category:dropped
                                  Size (bytes):265080
                                  Entropy (8bit):7.943414176526729
                                  Encrypted:false
                                  SSDEEP:6144:4w2aRHD/ToBCIqR8qJsDW9L4yR3OSc27xbOuU0j+2zu:4iPG3DWqyR3a27x6un+Ou
                                  MD5:3795427182D2DC8CE5609A342BC65313
                                  SHA1:0E53A85D991526A9191D3B0F3007363B3649FAF0
                                  SHA-256:F82E52E2A5176C01312F95B300B66AB1D2A0B0BC2556500C8F42A61390CC49CD
                                  SHA-512:6C3669B38B67EE37D99F452AD6B0F58102FD0DB952E9F146B8E0EC409CE5BC61052D4CDB23C2EED4183B18BAF529C86AC95BAE420A90908D58D5F4399B0E1B76
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.yo...<...<...<...<...<p..<...<...<...<U..<...<=..<...<d..<...<..<...<8.2<...<..<...<...<...<=..<X..<..<...<...<...<Rich...<........PE..L....=VL...........!.....p..........(6.......................................`......xH.......................................3..........................x....P.......................................................................................text...................PEC2MO...... ....rsrc....@.......2.................. ....reloc.......P......................@...................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:Generic INItialization configuration [f1]
                                  Category:dropped
                                  Size (bytes):383
                                  Entropy (8bit):5.215002152375616
                                  Encrypted:false
                                  SSDEEP:6:sWCVUxKPoXndnp7pGQjocnPQIyG43mKQjKLUJye1OIdOwbbQ1O2YXUIR3yMp4RWd:sWCV4Cotnp7I4ocnP/R43KjpJpOIdOw/
                                  MD5:A35C6D0BC085AFA759A0095C55C60F06
                                  SHA1:931F401780192FE72AF0F5C4A4446C736F4479C3
                                  SHA-256:09EE280169F041A5F85E408DD0F04DB6C455BD93309B5CA499B94DE12A4C081C
                                  SHA-512:4FFF6092ABF4717143A84EEEA8215D5DDC0B49B9BC34875250BA5E6B7850FA577ED2A85FAEEC70AB134680ABE8B5EE0E0571A39C93E086D7C5781B635CB998C0
                                  Malicious:false
                                  Reputation:low
                                  Preview:[SetupDefaults]..LangID=1033..ProductCode={7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}..TempPathGuid={30874103-0688-43A5-9E3B-21A95569093A}..[f1]..Function=AfterFontsData..[f2]..Function=BeforeFontsData..[f3]..Function=DelJPNFontsReg..[f4]..Function=DelRegData..[f5]..Function=DelShortCutFiles..[f6]..Function=SetRegData..[f8]..Function=SetShortCutFiles..[f7]..Function=TransPropertyData..
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (332), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):175920
                                  Entropy (8bit):3.6527040423465094
                                  Encrypted:false
                                  SSDEEP:1536:2ujBLJ6/K41VBrChTHx8IdK2hWA/z+wKZU6rPsHnQvvOuyMJice1VOL27p5:2SLm1UTR8AW9toe0
                                  MD5:BB3BB7C1B04B607A292A264B30F568BD
                                  SHA1:1ECF35D483A8B3E30C152F348FE0CDDA9C7E2B7A
                                  SHA-256:EF947B77AE9401CC524D5FF44C52DB830B97692B6BBB368D6754233DF9584900
                                  SHA-512:F22DFA40426338C07D34D644A8BF268A8CBD188DA361A7F199A9266BF27B3B39B163A731FD6E43A436D098360D575BD2A519BEE0DFC44D6C31B5D5ED6353F959
                                  Malicious:false
                                  Reputation:low
                                  Preview:..C.O.M.P.A.N.Y._.N.A.M.E.=.B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d.......D.N._.A.l.w.a.y.s.I.n.s.t.a.l.l.=.A.l.w.a.y.s. .I.n.s.t.a.l.l.....I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.C.O.L.O.R.=.T.h.e. .c.o.l.o.r. .s.e.t.t.i.n.g.s. .o.f. .y.o.u.r. .s.y.s.t.e.m. .a.r.e. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.O.S.=.T.h.e. .o.p.e.r.a.t.i.n.g. .s.y.s.t.e.m. .i.s. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.P.R.O.C.E.S.S.O.R.=.T.h.e. .p.r.o.c.e.s.s.o.r. .i.s. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.R.A.M.=.T.h.e. .a.m.o.u.n.t. .o.f. .R.A.M. .i.s. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):553067
                                  Entropy (8bit):4.803761151742621
                                  Encrypted:false
                                  SSDEEP:6144:hhs4d9dcOaOdXGJ3hskkkkknffCp5CrRKlua8AHqPK8:7s4d9dfaOdWxq1qv
                                  MD5:25F79C8F92B15D20D57142D27B43D45B
                                  SHA1:4F9F50EE529EBD0B9E5F81958DFD33A5C3C912BF
                                  SHA-256:90CE1658595EE7EE977D8DCE4F7A070426520F20FA38867B9FF14869AD8EC598
                                  SHA-512:C989C69BE10A560DC725C4433C48C6099DA892B0BA21F90E5F9F4A68CE8C3CB630A9EA548DA9781D6862D2C3408273987764E351598E614DBD6C76A90EA9E0C3
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^..(...{...{...{...{...{,..{J..{...{P..{..{...{,..{...{..{...{Rich...{........PE..L...rQVL...........!.........................................................................................................@..(....P.......................p.......................................................A...............................text...@........................... ..`.rdata........... ..................@..@.data....f.......P..................@....idata.......@....... ..............@....rsrc........P... ...0..............@..@.reloc..q....p... ...P..............@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):264424
                                  Entropy (8bit):7.346265439633612
                                  Encrypted:false
                                  SSDEEP:3072:jtQ0F42UcxJXnO1kOzkheOEdfmsq7vDC7fAE/AJRjoMnE8K91xah5WrsKZLLEXnY:jbF42UcxQ1k3y78KrxCMrTpM/WX
                                  MD5:D18C947B4B9AFDEC7ABB17DE1C52BEFA
                                  SHA1:F52DBD36FE42A71746BF9007556C11C81CD9AA9A
                                  SHA-256:70595A19DA53253C4404CACC3F424AAA40950D5A98B958B5AF6DF3430A191DB5
                                  SHA-512:C7FB1F2DA1BB8188EB0D1D9B2733E36F7936C6DDEC821FE1C91E6D1E7AA244F0464C8E095D6C8E7F92881E23D39703A6A7142A22CCC7A730D9B7AE9ED023F74C
                                  Malicious:false
                                  Reputation:low
                                  Preview:t.,....(... <$.M. .=..........l.............o.c...gWSl..SW..WS[//d.d l$.XX%.......................q.y}a.=mQ.Y]A..M1..-!.)........................................}...m..q]})eMm=U=].E-M.5.=.%.-.............................p...Y......a..(..H....YQQEY.0.o=55.={.gC[..W.....O.So##` ......,..x8........X......]..H.........5MM.5s..gW.CKgCC.....;..TDh..8P@........8.....p.e..Q...| h......%]1II.1....S[wSS.[.G.W.o....L.`H ..D.. ........t....L......ayyIa......s..w!99.!....Gs[K[............T,.0,,......|(.....l...P...yyy!a...........w.o.....W.;o?g..+O.....4.,$\.@....<......l......}uuI}.4..@....!99.!..s.w..3{.SGk.......0.D4\.... H.............4...Ye}!e. ..D....c.w......w3.;#.#C.[.THl....(.<,4p,.$.......a..t...8..L..YQQ=Y...w.{o..`.--..S.w3.7+kk .....$..H8@.X,0...y...........x...H...1miMQ.c4....{%9-%%.-c.sO.....'7?..... @\D.....H................u..au...YmAYY)A.g k.so.Kk......w'.g#+;+[. ..<T....(,.8..$.$.x.....i..Y...d.......IE911.9w.W._GC....._C.o#.[#|h..4l
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):107392
                                  Entropy (8bit):5.976686564124204
                                  Encrypted:false
                                  SSDEEP:1536:XDEbW8/KCWYxcnGP48IA2h+k3ZLZwyzHoAoS5RQjKRyVCUA:XDEKrScnS4rAI+wnHoAoS5RT2A
                                  MD5:B83D2774CDAF5016CD8765A630FA1150
                                  SHA1:50B7F86488926C6B06322AF6A5176E4C7786058D
                                  SHA-256:4935372DAA99F6C10033ACCF0CD6403B6F7061477500C1EB65D7CA2DEDBCBFD8
                                  SHA-512:90FD6C47D658491ACFD54A1CB7D76BB01C3E6F58B4DF4466998411D73E497A305DAC13798182448289052F836C92958CA42B69BB14549D51AEA4A0F92E665727
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......,0.hQ..hQ..hQ..a)..&Q..a)..bQ..a)..CQ..O...iQ..O...gQ..hQ...Q..a)..kQ..v...iQ..a)..iQ..RichhQ..........PE..d...F=VL..........#..................}.........@....................................e%.......................................................V..........`............................................................................................................text...~........................... ..`.rdata..rb.......d..................@..@.data....*...p.......R..............@....pdata...............j..............@..@.rsrc...`............z..............@..@................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
                                  Category:dropped
                                  Size (bytes):265080
                                  Entropy (8bit):7.943414176526729
                                  Encrypted:false
                                  SSDEEP:6144:4w2aRHD/ToBCIqR8qJsDW9L4yR3OSc27xbOuU0j+2zu:4iPG3DWqyR3a27x6un+Ou
                                  MD5:3795427182D2DC8CE5609A342BC65313
                                  SHA1:0E53A85D991526A9191D3B0F3007363B3649FAF0
                                  SHA-256:F82E52E2A5176C01312F95B300B66AB1D2A0B0BC2556500C8F42A61390CC49CD
                                  SHA-512:6C3669B38B67EE37D99F452AD6B0F58102FD0DB952E9F146B8E0EC409CE5BC61052D4CDB23C2EED4183B18BAF529C86AC95BAE420A90908D58D5F4399B0E1B76
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.yo...<...<...<...<...<p..<...<...<...<U..<...<=..<...<d..<...<..<...<8.2<...<..<...<...<...<=..<X..<..<...<...<...<Rich...<........PE..L....=VL...........!.....p..........(6.......................................`......xH.......................................3..........................x....P.......................................................................................text...................PEC2MO...... ....rsrc....@.......2.................. ....reloc.......P......................@...................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:Generic INItialization configuration [f1]
                                  Category:dropped
                                  Size (bytes):383
                                  Entropy (8bit):5.215002152375616
                                  Encrypted:false
                                  SSDEEP:6:sWCVUxKPoXndnp7pGQjocnPQIyG43mKQjKLUJye1OIdOwbbQ1O2YXUIR3yMp4RWd:sWCV4Cotnp7I4ocnP/R43KjpJpOIdOw/
                                  MD5:A35C6D0BC085AFA759A0095C55C60F06
                                  SHA1:931F401780192FE72AF0F5C4A4446C736F4479C3
                                  SHA-256:09EE280169F041A5F85E408DD0F04DB6C455BD93309B5CA499B94DE12A4C081C
                                  SHA-512:4FFF6092ABF4717143A84EEEA8215D5DDC0B49B9BC34875250BA5E6B7850FA577ED2A85FAEEC70AB134680ABE8B5EE0E0571A39C93E086D7C5781B635CB998C0
                                  Malicious:false
                                  Reputation:low
                                  Preview:[SetupDefaults]..LangID=1033..ProductCode={7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}..TempPathGuid={30874103-0688-43A5-9E3B-21A95569093A}..[f1]..Function=AfterFontsData..[f2]..Function=BeforeFontsData..[f3]..Function=DelJPNFontsReg..[f4]..Function=DelRegData..[f5]..Function=DelShortCutFiles..[f6]..Function=SetRegData..[f8]..Function=SetShortCutFiles..[f7]..Function=TransPropertyData..
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:Unicode text, UTF-16, little-endian text, with very long lines (332), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):175920
                                  Entropy (8bit):3.6527040423465094
                                  Encrypted:false
                                  SSDEEP:1536:2ujBLJ6/K41VBrChTHx8IdK2hWA/z+wKZU6rPsHnQvvOuyMJice1VOL27p5:2SLm1UTR8AW9toe0
                                  MD5:BB3BB7C1B04B607A292A264B30F568BD
                                  SHA1:1ECF35D483A8B3E30C152F348FE0CDDA9C7E2B7A
                                  SHA-256:EF947B77AE9401CC524D5FF44C52DB830B97692B6BBB368D6754233DF9584900
                                  SHA-512:F22DFA40426338C07D34D644A8BF268A8CBD188DA361A7F199A9266BF27B3B39B163A731FD6E43A436D098360D575BD2A519BEE0DFC44D6C31B5D5ED6353F959
                                  Malicious:false
                                  Reputation:low
                                  Preview:..C.O.M.P.A.N.Y._.N.A.M.E.=.B.r.o.t.h.e.r. .I.n.d.u.s.t.r.i.e.s.,. .L.t.d.......D.N._.A.l.w.a.y.s.I.n.s.t.a.l.l.=.A.l.w.a.y.s. .I.n.s.t.a.l.l.....I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.C.O.L.O.R.=.T.h.e. .c.o.l.o.r. .s.e.t.t.i.n.g.s. .o.f. .y.o.u.r. .s.y.s.t.e.m. .a.r.e. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.O.S.=.T.h.e. .o.p.e.r.a.t.i.n.g. .s.y.s.t.e.m. .i.s. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.P.R.O.C.E.S.S.O.R.=.T.h.e. .p.r.o.c.e.s.s.o.r. .i.s. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.S.S._.L.A.U.N.C.H._.C.O.N.D.I.T.I.O.N._.R.A.M.=.T.h.e. .a.m.o.u.n.t. .o.f. .R.A.M. .i.s. .n.o.t. .a.d.e.q.u.a.t.e. .f.o.r. .r.u.n.n.i.n.g. .[.P.r.o.d.u.c.t.N.a.m.e.].......I.D.P.R.O.P._.E.X.P.R.E.
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):553067
                                  Entropy (8bit):4.803761151742621
                                  Encrypted:false
                                  SSDEEP:6144:hhs4d9dcOaOdXGJ3hskkkkknffCp5CrRKlua8AHqPK8:7s4d9dfaOdWxq1qv
                                  MD5:25F79C8F92B15D20D57142D27B43D45B
                                  SHA1:4F9F50EE529EBD0B9E5F81958DFD33A5C3C912BF
                                  SHA-256:90CE1658595EE7EE977D8DCE4F7A070426520F20FA38867B9FF14869AD8EC598
                                  SHA-512:C989C69BE10A560DC725C4433C48C6099DA892B0BA21F90E5F9F4A68CE8C3CB630A9EA548DA9781D6862D2C3408273987764E351598E614DBD6C76A90EA9E0C3
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^..(...{...{...{...{...{,..{J..{...{P..{..{...{,..{...{..{...{Rich...{........PE..L...rQVL...........!.........................................................................................................@..(....P.......................p.......................................................A...............................text...@........................... ..`.rdata........... ..................@..@.data....f.......P..................@....idata.......@....... ..............@....rsrc........P... ...0..............@..@.reloc..q....p... ...P..............@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):264424
                                  Entropy (8bit):7.346265439633612
                                  Encrypted:false
                                  SSDEEP:3072:jtQ0F42UcxJXnO1kOzkheOEdfmsq7vDC7fAE/AJRjoMnE8K91xah5WrsKZLLEXnY:jbF42UcxQ1k3y78KrxCMrTpM/WX
                                  MD5:D18C947B4B9AFDEC7ABB17DE1C52BEFA
                                  SHA1:F52DBD36FE42A71746BF9007556C11C81CD9AA9A
                                  SHA-256:70595A19DA53253C4404CACC3F424AAA40950D5A98B958B5AF6DF3430A191DB5
                                  SHA-512:C7FB1F2DA1BB8188EB0D1D9B2733E36F7936C6DDEC821FE1C91E6D1E7AA244F0464C8E095D6C8E7F92881E23D39703A6A7142A22CCC7A730D9B7AE9ED023F74C
                                  Malicious:false
                                  Reputation:low
                                  Preview:t.,....(... <$.M. .=..........l.............o.c...gWSl..SW..WS[//d.d l$.XX%.......................q.y}a.=mQ.Y]A..M1..-!.)........................................}...m..q]})eMm=U=].E-M.5.=.%.-.............................p...Y......a..(..H....YQQEY.0.o=55.={.gC[..W.....O.So##` ......,..x8........X......]..H.........5MM.5s..gW.CKgCC.....;..TDh..8P@........8.....p.e..Q...| h......%]1II.1....S[wSS.[.G.W.o....L.`H ..D.. ........t....L......ayyIa......s..w!99.!....Gs[K[............T,.0,,......|(.....l...P...yyy!a...........w.o.....W.;o?g..+O.....4.,$\.@....<......l......}uuI}.4..@....!99.!..s.w..3{.SGk.......0.D4\.... H.............4...Ye}!e. ..D....c.w......w3.;#.#C.[.THl....(.<,4p,.$.......a..t...8..L..YQQ=Y...w.{o..`.--..S.w3.7+kk .....$..H8@.X,0...y...........x...H...1miMQ.c4....{%9-%%.-c.sO.....'7?..... @\D.....H................u..au...YmAYY)A.g k.so.Kk......w'.g#+;+[. ..<T....(,.8..$.$.x.....i..Y...d.......IE911.9w.W._GC....._C.o#.[#|h..4l
                                  Process:C:\Windows\SysWOW64\cmd.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:modified
                                  Size (bytes):104950
                                  Entropy (8bit):2.143147061458814
                                  Encrypted:false
                                  SSDEEP:384:2Bew2DTgHCspz4tm+xe+W3tADA6u2riebH7ezm5xvEsvXheBp9SGZ3gGjjjij2ov:2BeRdqz4tm+xWnsrl75xvlXhpj2oj4Ap
                                  MD5:72C20C3260F51C34F6ABCAB97120633C
                                  SHA1:34ED42C4340577B2899583CA87AC3A02260A4AAF
                                  SHA-256:BD448A1FB71722A44C1248DC44066BE406D637FD2900F4ACE64A73FDB7A60546
                                  SHA-512:7CFE35F8A42901DDC2BB0CF57103BF656D3560E63E23EDBD381BA8B57ED6E0F0A9C89E581809E4E609D825DA975243AA7C9DD21AC1FBC3C2702C74F1CEB2F335
                                  Malicious:false
                                  Reputation:low
                                  Preview:--2024-03-25 14:38:56-- https://download.brother.com/welcome/dlfp100270/cltw10100a.exe..Resolving download.brother.com (download.brother.com)... 23.213.157.19..Connecting to download.brother.com (download.brother.com)|23.213.157.19|:443... connected...HTTP request sent, awaiting response... 200 OK..Length: 69307352 (66M) [application/octet-stream]..Saving to: 'C:/Users/user/Desktop/download/cltw10100a.exe'.... 0K .......... .......... .......... .......... .......... 0% 254K 4m27s.. 50K .......... .......... .......... .......... .......... 0% 759K 2m58s.. 100K .......... .......... .......... .......... .......... 0% 741K 2m29s.. 150K .......... .......... .......... .......... .......... 0% 1.19M 2m5s.. 200K .......... .......... .......... .......... .......... 0% 1.49M 1m49s.. 250K .......... .......... .......... .......... .......... 0% 1.59M 98s.. 300K .......... .......... .......... .......... .......... 0% 1.32M 91s.. 350K .......... ..........
                                  Process:C:\Windows\SysWOW64\wget.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                  Category:dropped
                                  Size (bytes):69307352
                                  Entropy (8bit):7.999793519681112
                                  Encrypted:true
                                  SSDEEP:1572864:uOYUcVPEl9WVSVD1NYE2j2IVknfDLOvkpNjL1Rf:uO/JTB5YvkrLpL1Rf
                                  MD5:9541E83179ABDD1F0CEBCFEFF94BC9A2
                                  SHA1:D82ED9CD232441DFCA8FB55B950DA3DB9C387A86
                                  SHA-256:7785C6434713030F15BC611C222B7D9BABF380EC5356F94CE597CE3C577B82F1
                                  SHA-512:0220C35BA85F260C2902CEFA22C455CC5F799F3F2401D6A91082A908C83BA24C799D7DB2C2AE8A1CB600C13694F7C831B38A1E5FAA78E686C102705D31A4B177
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......d... ... ... .......5...O...(.......4...O...i....../... .......&...*.....!...Rich ...........PE..L...>.J=.................0...0...............@....@.................................q/".....................................hI..........T...........(o!..............................................................@...............................text...6$.......0.................. ..`.rdata.......@... ...@..............@..@.data...dn...`...@...`..............@....rsrc...T...........................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1997 Brother Industries,Ltd.Alaska ExtraboldBoldBrother : Alaska Extrabold : 1997Al
                                  Category:dropped
                                  Size (bytes):50528
                                  Entropy (8bit):6.706338176489582
                                  Encrypted:false
                                  SSDEEP:768:P1HxvPUeq/ftdKsU7P7+EEUaUZbbxNxPHBDep9nHXOZrnvE4ckJq:P/UemFd9pEDzRHvU9nHXWrnDq
                                  MD5:FBEA253EBEE54EF6898B65CE6111612F
                                  SHA1:BB0537157DE0C6F97CA20D022B7DBFFDA963FC04
                                  SHA-256:4DD4F4951CB2C3178DCEC9CD65D820340B96CA853C96FEB5B7F0DA03A8EE9162
                                  SHA-512:9F25741B0C2326B3419E84865DE33F04EB6C24DBBF031FD0A7BE81FB87E210FD6CF99B3D8329D667803BE3A991E763E97144FA0C571A26E96F4F631588C35D7E
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2u.Wz.......Vcmapb......t...lcvt ...l........fpgm..|g........glyfK..C...l....head.*do.......6hhea.......D...$hmtx.2hA...h....loca......t....maxp.L.&...|... name..........Mpost.,........7prep/5.....$...:.................................................................................9.........f..............................BRTH. . .......".q................................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................R...R.@.....~.............1.B.S.a.x.~........ . . . " & 0 : .!"!&"."."."."."."."+"H"`"e%........ .............0.A.R.^.x.}........ . . . & 0 9 .!"!&"."."."."."."."+"H"`"d%........................^...C.i.......................T.j.y.........t.q._./.0.........P.|..............................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1997 Brother Industries,Ltd.AlaskaRegularBrother : Alaska : 1997AlaskaVersion 1.25A
                                  Category:dropped
                                  Size (bytes):50240
                                  Entropy (8bit):6.729269847782935
                                  Encrypted:false
                                  SSDEEP:768:oAx2eo+Q9GTy+GSNO8gT0io5vjKQwQd+a3Qx+nTndVB4f/WeYW8pOua5H+WKIHNe:8dQRkqRz7dVB4fX8ouaVb/4Yy3Gs
                                  MD5:85841F0933B8D840BCE0B39454B1B6E6
                                  SHA1:AD878339CDF408A2143FEDA6C64667D9D46B396D
                                  SHA-256:50F92B31C5FDAA53A97333E46D73982808355C29D155B541DBE50B508045F857
                                  SHA-512:A486132FE5F38F5834AB8379DA0B0303045C366A89EB4BD9407E0B4480D86F95F40E1401AD0E3FD1E147AC9026AFA476474B076D4610C947FE5AA5B9406E64C4
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2u.T........Vcmapb......t...lcvt .,..........fpgmA..!........glyftW."...4...$head..b|...X...6hhea...........$hmtx..q.........loca.c.g........maxp.L.4....... name...j........post.,........7prep/5.........:...................................................................m.............9.........f..............................BRTH.@. ......."..................................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................R...R.@.....~.............1.B.S.a.x.~........ . . . " & 0 : .!"!&"."."."."."."."+"H"`"e%........ .............0.A.R.^.x.}........ . . . & 0 9 .!"!&"."."."."."."."+"H"`"d%........................^...C.i.......................T.j.y.........t.q._./.0.........P.|..............................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "cmap", 24 names, Macintosh, Copyright(c) 1993 Brother Industries,Ltd.Antique OaklandBoldBrother : Antique Oakland Bold : 199
                                  Category:dropped
                                  Size (bytes):44560
                                  Entropy (8bit):6.537869502023098
                                  Encrypted:false
                                  SSDEEP:384:yqbhRK9fx6H7JNinhLqCNbTWnetPHItXx6dThdU50ts7PKFhZj6ixk44X8SovMNX:yJZ6FInh5ekO5UXmerS8RS8GGvwBik71
                                  MD5:D3870C2557A54F744A860148BB24A47F
                                  SHA1:92F13E4FCD81CD2FF583BDA945E36A4396275DCC
                                  SHA-256:6848C9B685CB3FEA52B1C179F478A9C7356222A64B9EF463485D44907BCE23A7
                                  SHA-512:90CB9EFB4A3AC56F4901D4F9508AC1CC1770ECD18B3AB95D92A195669DA0127834992780130A2344C83B88CAB6AE1F008DBB145021E41EDDB8539CED349D721E
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........Pcmapb..........lcvt .......x...Pfpgm...........glyfQL3?...\....head.%.........6hhea...4...T...$hmtxL8.....x....loca@...........maxp.L......... namev.[=........post.....@...9prep(.`...|...<OS/2t.[........V....................................................................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................R...R.@.....~.............1.B.S.a.x.~........ . . . " & 0 : .!"!&"."."."."."."."+"H"`"e%........ .............0.A.R.^.x.}........ . . . & 0 9 .!"!&"."."."."."."."+"H"`"d%........................^...C.i.......................T.j.y.........t.q._./.0.........P.|...................................................................................................................................................b.c...d...e...............f........
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "cmap", 24 names, Macintosh, Copyright(c) 1993 Brother Industries,Ltd.Antique OaklandObliqueBrother : Antique Oakland Oblique
                                  Category:dropped
                                  Size (bytes):40760
                                  Entropy (8bit):6.651263354137682
                                  Encrypted:false
                                  SSDEEP:384:AQt8xcnxGRyXJbSqf2gvfYZuM220NH1brTIY3/ZaKgIOGoEMuZJFdvG/Nj7TBYP6:l8ySyXJZ2GX2W3/Z0GMYnOJQ6
                                  MD5:CF38D7B3225A68E12E4EE961A5BEAD01
                                  SHA1:6DF10EE8A80EC1C3B16EF6AA892EC43BADDD0B90
                                  SHA-256:DB9805A2187E5E810AF3F281490983407B7531421ACD69556232E3AA6901CE82
                                  SHA-512:762180AFBBBDD19963F21F05F1B31BE5ADB79113C3FC6D245ADC3D46F8B9C5C1BBB5AB46BA5BA0C5CF83488B6B151309CF9F7B3BB74089E21777BB72CAF3350E
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........Pcmapb..........lcvt f`sU...x....fpgm[.re.......cglyfs...........head..........6hhea.......T...$hmtx..bj...x....locad.D ........maxp.L......... name..K........post.i....h...9prep..`.......<OS/2sjY'.......V....................................................................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................R...R.@.....~.............1.B.S.a.x.~........ . . . " & 0 : .!"!&"."."."."."."."+"H"`"e%........ .............0.A.R.^.x.}........ . . . & 0 9 .!"!&"."."."."."."."+"H"`"d%........................^...C.i.......................T.j.y.........t.q._./.0.........P.|...................................................................................................................................................b.c...d...e...............f........
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "cmap", 24 names, Macintosh, Copyright(c) 1993 Brother Industries,Ltd.Antique OaklandRegularBrother : Antique Oakland : 1993A
                                  Category:dropped
                                  Size (bytes):43344
                                  Entropy (8bit):6.5539056652587915
                                  Encrypted:false
                                  SSDEEP:768:7xGWjy4mpQ6nw+1PHSXMgdWgbhgvjXtf4IPGWqd8w4BBcl/Pn:Pyly6VSXMgdhbEX+ImIS
                                  MD5:7FB45E4F65C2C24187C9F2D669ADD105
                                  SHA1:A1434CB2A8F329899C54ECF804DCA9DCA24FAA36
                                  SHA-256:8B7A3486ABEE8D3BE375E9E6200710AADB8CA4DF2870EBFF94610ED09656EFCF
                                  SHA-512:646BA12ADF91A2F4DE66AAB5D1AB4F244E284FD347F9A2FDC637501F53615A6DD7A97EC75742EDB5205BD21A458EEA26A4954357053350B605055F513F843F89
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........Pcmapb..........lcvt v..9...x...Xfpgm...........cglyf......4...Lhead..g.......6hhea.O.........$hmtx.A..........loca...t........maxp.L......... name.L9........hpost.........9prep,.`.......<OS/2siYo.......V....................................................................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................R...R.@.....~.............1.B.S.a.x.~........ . . . " & 0 : .!"!&"."."."."."."."+"H"`"e%........ .............0.A.R.^.x.}........ . . . & 0 9 .!"!&"."."."."."."."+"H"`"d%........................^...C.i.......................T.j.y.........t.q._./.0.........P.|...................................................................................................................................................b.c...d...e...............f........
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.AtlantaDemiBrother : Atlanta Demi : 2009Atlanta De
                                  Category:dropped
                                  Size (bytes):37700
                                  Entropy (8bit):6.5221927106161015
                                  Encrypted:false
                                  SSDEEP:768:VKd69LbTtiUCc582Nyg92dWrey+GhNP5l2OB/r:V0cPTwUC+cWLBlrB/r
                                  MD5:984B03B38955872DFC694F6545330FDB
                                  SHA1:A49E65CFAF3485E393DA1EFCB39C61B2C88A446C
                                  SHA-256:9CFBDE62485E1486D4A32807A13FD131598C8EC768AE61834229273DCD0B8260
                                  SHA-512:CF9ECFBBAB1EF61CD24107D508E87363B29A45D53A91CBC5D62E62A511D2FC39204A92745820B03D1FE3DD0E799799C62DD956AF94E55DCCE6C38A32DEED9741
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2teXY.......Ncmap`,.....,...bcvt /-6F........fpgm(..7...4....head...........6hhea...........$hmtx..S.... ....maxp.N."...4... nameF..f...T...)post..VJ.......@prep/5W........:glyf.l........{:loca.!....8.........X.......f.../...f.....f..............................BRTH. . .....R............................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.AtlantaBook ObliqueBrother : Atlanta Book Oblique
                                  Category:dropped
                                  Size (bytes):35024
                                  Entropy (8bit):6.63838053997896
                                  Encrypted:false
                                  SSDEEP:768:fdOxvWwOSjTbSMqYa2/kfpgRvGqX58KWVosh3H0P:FuvISjTbLqa8fpgRX5+og3H0P
                                  MD5:E0D07ADA198892DE4EF92A93FC0CB5A8
                                  SHA1:2A9CED7FD023FD0DFA2E7A151944A873F2ADF81E
                                  SHA-256:238E62CCB15A34736B55F84993FE65C62F9DE93C95ADA2D1969A3F6F335A87D1
                                  SHA-512:89139429D8DAF4DF16C843A9866BEC13CEC135C93232BDAD8145FF746925CCB7CB6FA2DD6B92BA39DCA3D0D9D87E7688DA4BAE691C5B095143E99B4D1FF50E64
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2s~.Z.......Ncmap..T...,....cvt .C'........\fpgmM..=...,...xhead.L.e.......6hhea.{.........$hmtx...........maxp.N......... name..e_...4....post.........@prep/53........:glyf.N:b...<..q.locaaJ.I.......................7./.........f..............................BRTH... %....f............................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~..........................................................................................................*. .....~.....S.a.x.~...... . . . " & 0 : .!"%...... .....R.`.x.}...... . . . & 0 9 .!"%..........^...C.i.....................X.j.......(...............................................................................................................b.c...d...e...............f.........g...........h.......j.i.k.m.l.n...o.q.p.r.s.u.t.v.w...x.z.y.{.}.|.......~.............................f.N.....^.w.......R....
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.AtlantaBookBrother : Atlanta Book : 2009Atlanta Bo
                                  Category:dropped
                                  Size (bytes):38800
                                  Entropy (8bit):6.566909522052321
                                  Encrypted:false
                                  SSDEEP:768:/gtY7+0r8rezN06bly4dkNpG1qC6b/YQU7vO51sTGODa:/gey0YKzN0+lH52/sW5AGz
                                  MD5:0ECD654E40BF61C2BFF6DB0780F9FA8E
                                  SHA1:3103922E4FEA25C3D541F57A36A471A85610281C
                                  SHA-256:0D98D001076412241096634F5D048AB0E9A5DB2981C6F0909430F9F8AB79691A
                                  SHA-512:DC01572E6B10CFBB518D17A75B054E1FA12EECBA0D73DDE65463B09BC70CF7AED674E87BF399513D4A7334FC3A4487DF84C28FBD118F53275BEEBB3CE20E21C4
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2s.V........Ncmap`,.....,...bcvt .. 6.......~fpgmLkx........fhead.j.....x...6hhea.c.........$hmtx..g.........maxp.N......... name/..n.......,post..V....4...@prep/5D....t...:glyfd.J.........locag............................/.........f..............................BRTH.@. .....f............................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.AtlantaDemi ObliqueBrother : Atlanta Demi Oblique
                                  Category:dropped
                                  Size (bytes):34856
                                  Entropy (8bit):6.593861723157344
                                  Encrypted:false
                                  SSDEEP:768:FrfBexVFGrXgugQ3oAHKIJjcxp/+RvwFGHDaOfR2:Fg7WwuL3oARjcxp/+9wFGjaOfR2
                                  MD5:A4605D5F2DAAC4BB9A9B2D80D1398B3A
                                  SHA1:B240A32880A05F775E751A39F418A0420888949A
                                  SHA-256:53748AEF3BC2E68249DE52ADBD69CB694D554FEC4DF9CFF577D4EAA476FB71C4
                                  SHA-512:F092ABFB33C754FFF9F8B933727D9721B06CA15BF0D5754DD8BC3ED38CA56C9F9B44AEC03B7B53CC2D921A1EEF47D9EDC5D860BE62360B2CCA73B3601F6B2DB6
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2s..W.......Ncmap..T...,....cvt ). ........nfpgm.J.R...@....head...........6hhea...........$hmtx...#... ....maxp.N.....4... name..G_...T....post..........@prep/5<.... ...:glyf.......\..p.locaP^n%.............X.........7./.....{...f..............................BRTH.!. %....R............................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~..........................................................................................................*. .....~.....S.a.x.~...... . . . " & 0 : .!"%...... .....R.`.x.}...... . . . & 0 9 .!"%..........^...C.i.....................X.j.......(...............................................................................................................b.c...d...e...............f.........g...........h.......j.i.k.m.l.n...o.q.p.r.s.u.t.v.w...x.z.y.{.}.|.......~.............................R.9.....b.{.......R....
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.BelgiumRegularBrother : Belgium : 2009BelgiumVersi
                                  Category:dropped
                                  Size (bytes):39716
                                  Entropy (8bit):6.638172746878695
                                  Encrypted:false
                                  SSDEEP:768:9FZx/qYa84QY157K4AMvRaPrz9T4h34nPY/34V4D4fGe8fnh:99q84l+4AMvkzx4h34nP24V4D4fGe8fh
                                  MD5:6E09AAC2AF4835CA588A10F123C8BDE6
                                  SHA1:6D92FF44F6C33D8E33CBA954676106401C9560E0
                                  SHA-256:6AEAB8B77C7DCD16143697ECE85C271FC3A4DB4E4172E100D13F3FFEF45FA748
                                  SHA-512:3C88AB0C94E93ACFE3D34482F96D164C771D48D43A51CD83B6A0350B253C17ABB76B6D73F4EF823381B8D4F99743D9C188DCFC8DA3A98BAEC3E24534112DEC65
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2}aX........Ncmap`,.....,...bcvt R.BK........fpgm.c.3...L...`head.J.@.......6hhea...........$hmtx.+Zg........maxp.N......... name......<....post..V(...@...@prep.........<glyfY.+........\loca.......................G.....T.G.....=...f............................BRTH.@. .........p........................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.Bermuda ScriptRegularBrother : Bermuda Script Regu
                                  Category:dropped
                                  Size (bytes):57460
                                  Entropy (8bit):6.9233264218279915
                                  Encrypted:false
                                  SSDEEP:1536:QuSRQIvnF9ktkjlJU8GPDQFyBhPXEqovp:JaRPFy2jlJUPPDQsBhvEqovp
                                  MD5:7627277EE51263113C8B3BD9CAD479D5
                                  SHA1:D8B109EF5558CF29E4C7614A95A4E42A3A8C3171
                                  SHA-256:35E4A1958DCF931BA6DD36AD9E65DA66564536E24C620C24E07838A2A1A6571D
                                  SHA-512:FE882DF447FAB240D2706BF70E72EA6A5E008AE1EDFC67D9866A9BB243A84C1151D2D5C9483FDF41624CB212832E483958AC5C6A879E2804E7A31B9D2D594CB5
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2lSE........Ncmap`,.....,...bcvt f.n.........fpgmLOL....D...fhead..Yo.......6hhea...r.......$hmtx..@.........maxp.N.L....... namet.F....<...wpost..........@prepZ.`.......<glyf.~....0...8loca.8....h...................K...........f..............................BRTH.@. .........]........................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.BrusselsDemiBrother : Brussels Demi : 2009Brussels
                                  Category:dropped
                                  Size (bytes):49240
                                  Entropy (8bit):6.726416598596516
                                  Encrypted:false
                                  SSDEEP:768:S8TljxSqlwJkAkHRKt2vVmQ7PuSPppAKlGLxR1U5iWBEHSZUiJDxqipKSfSlSQ+L:SgD60KtmPB/AKM+iWDfqipo4rnyV1PO
                                  MD5:A3BA19493258A93F2B9FE849E0A6F4A3
                                  SHA1:636570DAC6FD8EC4FF779D8BDAA03559F1460B69
                                  SHA-256:3169022F40D8F57AC96CC493D23A7DCA07D5101D9E31BC23C12B76D7F5807B27
                                  SHA-512:0D4F19FD0857C050CD19AE4DFCB0CCBA1939B0464E5A019D321B55E6B5721E67AD13296504B5343C032ED7F91879346D2844BAD12CC65EAF26730A9FE70A1F13
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2v.T........Ncmap`,.....,...bcvt N.\........Dfpgm<.G........head.ed....l...6hhea...k.......$hmtx..G.........maxp.N.n....... name.........2post..V....0...@prep".`...p...<glyf.ap.........loca.......L.......7.X.......f.......f.....f..............................BRTH. . .....=.(............................................................................................. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.BrusselsLight ItalicBrother : Brussels Light Itali
                                  Category:dropped
                                  Size (bytes):48856
                                  Entropy (8bit):6.799675916791405
                                  Encrypted:false
                                  SSDEEP:768:hI4YmOgFVOLOXfAof7PtJFGU2HCh0VtlcMmLs3tsI0sX3cdM:ZN92L8A27PtJ8HDlcjsds43cdM
                                  MD5:DA939CE24F7FF8950A3C97F03C0D4144
                                  SHA1:A604A1DD60B5786B610471251B74B024AA2D7F29
                                  SHA-256:466A1CA0413E08A937FA0380495E7301FFC07D3AA869A356AD5C69506A4115D2
                                  SHA-512:5A90A12C4F708354621A4DD94461E259CF364AB39154178A4F1A1D1E627895590CF7A7BB1DAC36A3BF47CE42AE3B3C69AE000A3B3947A82C5A235B13E7583D7D
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2t.........Ncmap..T...,....cvt T:L^.......bfpgm.l'S...4...~head.4.r.......6hhea.D.........$hmtx.C..........maxp.N.\...$... name.M.3...D....post.VH........@prep1.`.......<glyf......X...rloca{X...............,.......f.+.....f.....f..............................BRTH... %....=.(............................................................................................. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~..........................................................................................................*. .....~.....S.a.x.~...... . . . " & 0 : .!"%...... .....R.`.x.}...... . . . & 0 9 .!"%..........^...C.i.....................X.j.......(...............................................................................................................b.c...d...e...............f.........g...........h.......j.i.k.m.l.n...o.q.p.r.s.u.t.v.w...x.z.y.{.}.|.......~.............................=.%.........q.......D.y
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.BrusselsLightBrother : Brussels Light : 2009Brusse
                                  Category:dropped
                                  Size (bytes):49568
                                  Entropy (8bit):6.722176769267707
                                  Encrypted:false
                                  SSDEEP:768:ANwKveUCZNVq26pwWxmReeazXV8FCm9fJPi+u8E0UWE:ANvvedXbUky0bi+40UWE
                                  MD5:C10F66D6CF6E27A86D6EE397A5426C01
                                  SHA1:77D4998A36929D0956D0822FAC22524A4B08B491
                                  SHA-256:F296ECE80B747FEC1E76291A66219F4813607DBD504ECD1A77423D32F77506F9
                                  SHA-512:2CD23FF4B4DA68C61D6FDC3D0A32FA0459C8CCC141250E1A9B53DAF91924D85E61515854C1C1D79A205DF3892ACB39BB690BA381418F45BD52BDEAB224587ECF
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2t.R........Ncmap`,.....,...bcvt 9.2.........fpgm..j.........head..........6hhea.......<...$hmtx..H%...`....maxp.N.Z...t... namef..q.......Gpost..V........@prep..`.......<glyf.S.....X...<loca...y.............,.......f.......f.....f..............................BRTH.@. .....=............................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.BrusselsDemi ItalicBrother : Brussels Demi Italic
                                  Category:dropped
                                  Size (bytes):48588
                                  Entropy (8bit):6.791332438906469
                                  Encrypted:false
                                  SSDEEP:768:tthBdOfGgJREAfIKsp1UcN+SuhqOc8irHH/NYvcjRRcQb:HhXWGgk0yJ8SuhoTWvM9b
                                  MD5:80AA12FD0BA66BB865C872EF9A1D2F83
                                  SHA1:C4F8682A75FE2201332A1497EAF9BA1BD186CC22
                                  SHA-256:CD83930731288612DEA86EAC2434EE9285D0FBFA2B7C7828DC5186653624E8C0
                                  SHA-512:01BAD9844288AA2A0E5CA612D3EE0450DFE26143126DF190724EDB711F353F4A831F065D9D5C83A0B5EAF775B2555F31DEF0D0B73AF0A36CEAC377870A90FD30
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2u..u.......Ncmap..T...,....cvt d.i<.......pfpgmn.....@....head...........6hhea... .......$hmtx......,....maxp.N.Z...@... name.......`....post.VH........@prep8.`...,...<glyf..T....h...XlocaFlq............N.X.......f.+...........f..............................BRTH.!. %....=.(............................................................................................. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~..........................................................................................................*. .....~.....S.a.x.~...... . . . " & 0 : .!"%...... .....R.`.x.}...... . . . & 0 9 .!"%..........^...C.i.....................X.j.......(...............................................................................................................b.c...d...e...............f.........g...........h.......j.i.k.m.l.n...o.q.p.r.s.u.t.v.w...x.z.y.{.}.|.......~.............................=.%.........q.......F..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.ConnecticutItalicBrother : Connecticut : 2009Conne
                                  Category:dropped
                                  Size (bytes):47180
                                  Entropy (8bit):6.769794049901884
                                  Encrypted:false
                                  SSDEEP:768:F3hPAkg7pTE5YHH6+/N0K/R6uYy6Mmd+CoZVym0IzJRtH+dlrw8QCm6:FtxeEP++K//YyOAVv0IvtH+dlvQL6
                                  MD5:32CDF28756988B09608CF3AE9CFCB831
                                  SHA1:32CEC4F448EE0A1C0113267FAFF116C92342AFA5
                                  SHA-256:687CD583FB4B4686267C5FF4BD3BED7F363CBF0BA9EAB50C7C171C84E25CBB14
                                  SHA-512:A8865BDC0A10ECE702CD15204225DCC1EB71292C262C9195FA8C80E86BE90630AF6485D967240E832FF83650DA2F1C36D440B381937E88FDF91E385D83D78943
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2t;Q........Ncmap`,.....,...bcvt <.B........Xfpgm..eo.......`head.......H...6hhea.p.Z.......$hmtx..9.........maxp.M.6....... name...........;post."U........@prep,.`...T...<glyf............locab..$...@.....................7.........f..............................BRTH... ...........>......................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "cmap", 24 names, Macintosh, Copyright(c) 1993 Brother Industries,Ltd.PT Dingbats 1RegularBrother : PT Dingbats 1 : 1993PT Di
                                  Category:dropped
                                  Size (bytes):62348
                                  Entropy (8bit):6.782668224610636
                                  Encrypted:false
                                  SSDEEP:1536:YVIUIVKTRdAFqFoASOHZve4IRNwyVgCSGBAKitNiG1:0oKdt7BHZve155Y
                                  MD5:AF1430CD7DAD12B579AB93ACA7E46D8B
                                  SHA1:9435CF4DB2BC65798448D3959B28BDEF1E03CC13
                                  SHA-256:625AEF564D5B7895718BBD4C138A7A24DD2B2CFDC8D0F46E00AA7C84550A0D40
                                  SHA-512:5DCBF958342FF4BDB7349DFDF2EADCA5A0999CF3AA36EB106B90D4E195C768690BDF5D05533D974620426C08785CBB5402E308ABF20C1CE04992BADFA5E7237F
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........Pcmap...........rcvt ..%L........fpgm..lJ...\...Sglyf._........head.......H...6hhea..........$hmtx.0.......loca5......4....maxp.<......... name.Wg.... ...Ppost\.Y....p....prep7..........=OS/2ap....4...V....................................................................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a....................................................................................................................................X...........~....... .......................................................................... .!.".#.$.%.&.'.(.).*.+.,.-.../.0.1.2.3.4.5.6.7.8.9.:.;.<.=.>.?.@.A.B.C.D.E.F.G.H.I.J.K.L.M.N.O.P.Q.R.S.T.U.V.W.X.Y.Z.[.\.].^._.`.a.......................................................................................................................................".........v.L.G.'.....r.j.......m.H.D...........z.u.f.N.>.=.5.3.&.%..................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1995-1998 Brother Industries,Ltd.PT Dingbats 2RegularBrother : PT Dingbats 2 : 1998
                                  Category:dropped
                                  Size (bytes):56836
                                  Entropy (8bit):6.7656854547928615
                                  Encrypted:false
                                  SSDEEP:1536:bpBeHvFPRyQKHmvImvZez01uEIa+tywl9V4rVc:bnuvImRwIMttywlX4rq
                                  MD5:1EEC2E879D36DB6ECFCF8970B1267777
                                  SHA1:D463C5FDCC8E3959508021E6158AD8C61877D3D9
                                  SHA-256:17156B5CF86429C704CABDE9B11F53E724A35CEE1059B74C4A8A5220992F9DE7
                                  SHA-512:4570C3B91BF48D972DB50E9A54DBDB076E754620497F3179BDFBBA508B3A474C46EA4E6D0510AE2A5CB95FB280395E9C37156C8621E55A8ACF8834C1D7B6FD9C
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2`.V$.......Ncmap...;...l....cvt ...9........fpgm<.z.......hglyfS:.o...`....head......x...6hhea.%........$hmtx..........4locaH.x.........maxp.&.j...... name..........\postz.m.... ....prep7..........=...................................................................4.......................f..............................BRTH.@. ..................................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a....................................................................................................................................x...........~....... .......................................................................... .!.".#.$.%.&.'.(.).*.+.,.-.../.0.1.2.3.4.5.6.7.8.9.:.;.<.=.>.?.@.A.B.C.D.E.F.G.H.I.J.K.L.M.N.O.P.Q.R.S.T.U.V.W.X.Y.Z.[.\.].^._.`.a............................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 14 names, Macintosh, Copyright(c) 1995-1998 Brother Industries,Ltd.PT Dingbats 3Regular1.000;BRTH;PTDingbats3PT Dingb
                                  Category:dropped
                                  Size (bytes):63404
                                  Entropy (8bit):6.462242427438352
                                  Encrypted:false
                                  SSDEEP:768:0W/0B0qPWbbvZpw90QOBKrOKhoJuKOfi4kVzMN8s36+ip7JG9xFl1R7F3Xw+/xII:0W/0B0y+BKzaROfxEzaGUDlDP
                                  MD5:92E709F9E9C68A3533411D9CBAE36716
                                  SHA1:554476B46B8550ADCB5C8C1E99BCB92486D411BC
                                  SHA-256:CECB620591ECD938692FB9CF10A7244B7B9C4F1C77628A30C43C9847883BFD40
                                  SHA-512:4CFBA772AAC0E9338F542AF9A1B4E00B631114BE074FA649BA078ADA9265A9CD19D973F92BD2C0D1A8079BBB0AF920A1F114D5CF40CBA8B99BF69F919B1A8738
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2h......X...`cmap.~..........cvt ...)...,... fpgm.Y.7.......sglyf...=...L....head...........6hhea...%.......$hmtxqW.........Ploca..A....0....maxp...%...8... name...<........post..W........prep......................._.<...................................................................................@...@...............................................2..............................BRTH............R.H............... .....................=...................=...\......./.../.......................2...2.....3.g...?...................L.........................3.%...........................................R.......\.......3...........q...H...........B...........2.............f............./...........p....... .......).......q.......=.......b...?...m...........w...q...........................m...............................p...h.{...............f.....=...................=...\......./.../.......................2...2.....3.g...?...................L.........................3.%
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 16 names, Macintosh, Copyright(c) 1993 Brother Industries,Ltd.PT Dingbats 4Regular1.000;BRTH;PTDingbats4PT Dingbats 4
                                  Category:dropped
                                  Size (bytes):97916
                                  Entropy (8bit):6.497651448081117
                                  Encrypted:false
                                  SSDEEP:1536:xAwRuV85hJSJkgtayh8PakRnzhqjJYLz/K+bvlEVbu+otkl2:xnRuVGhJSJvta28PpzhqlYK+jligtq2
                                  MD5:996B8ED321BE35A48424AB955F8F9196
                                  SHA1:FDD8A65B5EB67B0647D0731C1CA6C6BAF6C682CC
                                  SHA-256:200E5A88C21C5A4BA51FC625382A2E3C4C4F5D31772ADC949F0233FC5ED7AF85
                                  SHA-512:E21A21B321E93546FEC5149CF1784D22E4727C99872841220D7C2B459860A29DB2C06A69E715201BE8066537FFC2819FD0B5B3CE5E39CEF0E86FDFE566139103
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2h......X...`cmap.Y..........cvt ...........*fpgm.Y.7.......sglyfr.E.......k.head...........6hhea...o.......$hmtxy.|.......\locah....t.....maxp.......8... name^....vp....post..8...yT...%prep.......................<_.<....................3.....7...............................7.............................................................................2..............................BRTH............R.H............... .....................`...d...................f...o...........s.......f...............I.......0...............h.......q...s...........d.......3...b...y...z.......w...................H.......K.................................................................3.......f.........................h...f.........................................................f.{...........\...~...%.....f.H.f.............J.........f.%.............................f.....`...d...................f...o...........s.......f...............I.......0...............h.......q...s...........d....
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.GermanyRegularBrother : Germany : 2009GermanyVersi
                                  Category:dropped
                                  Size (bytes):54876
                                  Entropy (8bit):6.804625066167344
                                  Encrypted:false
                                  SSDEEP:1536:VYzyp9B9PlBqZzGBkRkjch1NC9IFR5t+hqj:VDEMcP5Uqj
                                  MD5:551A8481081FD4EEACC80AB67CCD5A25
                                  SHA1:2B51313DFCD08079E2AAF42687A0C5B2599C1F72
                                  SHA-256:0B58D39BAAB1C26EF1AF2B9FA3742B9820CA6B6434178514B66F62556DF3C341
                                  SHA-512:1BFD0F8EBFD152B11F2E491E2BB90AA7C54E1F52B96818A479E5B3C65E236D0AFDD6F6EEC63CFBAFA14B658D779F31EE2F23472565C12BE4F9491943622D7983
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2yb^........Ncmap`,.....,...bcvt P.T2.......Tfpgm#..F.......rglyf.......X....head.R.....@...6hhea.......x...$hmtx)e*-.......loca.v.........maxp.N.w...... name............post.ePJ.......@prep*.... ...<...........................f..............................BRTH.@. .........\.)......................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.HelsinkiBoldBrother : Helsinki Bold : 2009Helsinki
                                  Category:dropped
                                  Size (bytes):39148
                                  Entropy (8bit):6.495775517523093
                                  Encrypted:false
                                  SSDEEP:768:OwJWD3tEBUJLkqAqnr07uFmPzn10Nrg+AkL5CwmhG7jWvO:O0MdEm2vq47dzn10NnzNCwQO
                                  MD5:AD0A5536C51C523B279E9AD07CFCC940
                                  SHA1:FEDF09F917E568371E24090AD9EA0FDB31EE354D
                                  SHA-256:386EC548756425E428960DA29DF2AB55D5D5D99CD367938AF3ECE401E5F34F51
                                  SHA-512:0C88F33195F1A95B8AA41C749667A979DF4D35AF767013E4AC5D5BAA94A520D74D49DB04C506AEA4A6DF31704CF760C523D35E4A8204C89B06797DF9AE1418D3
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2uKX........Ncmap`,.....,...bcvt 5.,.........fpgm.......@....head...}.......6hhea.O.........$hmtx..Xw...4....maxp.N.....H... name!......h...8post..V(.......@prep/5\........:glyfFz.5........loca}............................+.........f..............................BRTH. . .....f.(.\........................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.HelsinkiObliqueBrother : Helsinki Oblique : 2009He
                                  Category:dropped
                                  Size (bytes):37012
                                  Entropy (8bit):6.614281507653077
                                  Encrypted:false
                                  SSDEEP:768:XPc88YLZpPTyc6497SZaPgez1EZJ7SBbPwXtoCb3DHG9SwPijREim:X7HPXxJxEQPw/9w6jC
                                  MD5:E684952D13D3C4E193C490B72C27079E
                                  SHA1:0E322B6D3A00E47A2CB45FEF024C86C8C34CFD8E
                                  SHA-256:FEB780DE809DC52C256B3B54692CA7F8881A89F620406A2104827676746FBE0A
                                  SHA-512:AD4BB8052E53E390CBEBC3D33EBDEFB874F03F55C70592612E019110A6F82CCEC39AB8B5680311C23DDADBD1BD28AB5FC1426AA685989B1F12BB8378FC7248B1
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2s=X3.......Ncmap`,.....,...bcvt +.&g.......ffpgm..$.........head.&.........6hhea...........$hmtx............maxp.N......... name...........\post..V(...p...@prep..h.......<glyf.'4......x.locab0.........................?.+.........f..............................BRTH... ...).f...H........................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 14 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.HelsinkiRegularBrother : Helsinki Regular : 2009He
                                  Category:dropped
                                  Size (bytes):45504
                                  Entropy (8bit):6.597319139454672
                                  Encrypted:false
                                  SSDEEP:768:behrr96v0VI9e8NHczhNIyoXn8FkL00192r:bAcv0Ge8dczc78iLfP2r
                                  MD5:46E37C905FEB952C3D456E1AB0B81761
                                  SHA1:0E6F8E15BE671F75037BEE8A423E03DF3B3BF1B2
                                  SHA-256:24F2E02A10999D21C92D5AC86D35F9B0B2E2F6AE26CD9C5CADBDD6E2DB96AB46
                                  SHA-512:32380357D4E876A0E4EB988A694BA9845D5562320D181AFDCE4377E4185475FDAA72C0FE1816CC51A9EF8914671388C99CF04BA4E73B9039C991674D5390F865
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........`OS/2s=U........Ncmap`,.....<...bcvt :62.........fpgmx.i_...L....hdmx%o./........head...C..#....6hhea.e....#....$hmtx..d...#.....maxp.N....(.... name<|w<..(0...Gpost..V(..,x...@prep..`.......<glyf..*.........loca|............................+.........f..............................BRTH.@. ...).f...H........................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N..............................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.HelsinkiBold ObliqueBrother : Helsinki Bold Obliqu
                                  Category:dropped
                                  Size (bytes):35152
                                  Entropy (8bit):6.571321052746113
                                  Encrypted:false
                                  SSDEEP:768:ydsul/SdQHQZT/DuC59cLiMUD9GVTjmAeOWuby8doXTUajLo:J9LZuC590i/D9LJO/y8Wdo
                                  MD5:11F6A96B6422ABCDDA060F0866694656
                                  SHA1:C0A2996128A8119CCD4BF2DB25F3E3518FC99AD0
                                  SHA-256:208912D569DF8B47D49357E6A0793AAB267D7EF8EF9490160EB590406E1596C2
                                  SHA-512:46097BAB20137841D6FD4FE3BB92014614315113CE8D37A327FC9BB9B1C4F155576369886FEC8F69D7B3DA1C94A9E2014AF4B30E88F9ADB8EE8C7A48762FD849
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2uJ.{.......Ncmap..T...,....cvt )M ........vfpgm.M....H....head.../.......6hhea...........$hmtx..6...4....maxp.N.....H... name.:.....h....post.|H........@prep/5@....@...:glyf..s....|..q.locar......D...................?.+.........f..............................BRTH.!. %....f.(.\........................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~..........................................................................................................*. .....~.....S.a.x.~...... . . . " & 0 : .!"%...... .....R.`.x.}...... . . . & 0 9 .!"%..........^...C.i.....................X.j.......(...............................................................................................................b.c...d...e...............f.........g...........h.......j.i.k.m.l.n...o.q.p.r.s.u.t.v.w...x.z.y.{.}.|.......~.............................f.N.....=.V.......R....
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.Helsinki NarrowBoldBrother : Helsinki Narrow Bold
                                  Category:dropped
                                  Size (bytes):37532
                                  Entropy (8bit):6.481877485217689
                                  Encrypted:false
                                  SSDEEP:768:Z0PoLu1+cwl71vvhFSbx/Wv7G7z/WcepcAIHOo3ZPH1mp:Z8Q4I71XSbFWSpQc3OcMp
                                  MD5:D0F600828A54A3306F956A91588D4725
                                  SHA1:253866380421F1BD01B20B7D7D8FE4B82DDE1A58
                                  SHA-256:3A0A578206905FA2939DF32FD98306E1110D1802C6210E49C0F1DC561F56C786
                                  SHA-512:E32A5585B27684F70DF21EAB0DE003157D88CA2E5523C5472974519000A7B6D5707F7FBC494978580F7C36CB5498911A09804B805E1F1569826F09468B1731A8
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2tKT........Ncmap`,.....,...bcvt 3A*.........fpgm.5.Z...@....head.".........6hhea...........$hmtx..H.... ....maxp.N.....4... name.O.#...T....post..V(.......@prep/5\....8...:glyf"w.....t..z.loca.S.w...........#.............+.........f..............................BRTH. . .....f.(.\........................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.Helsinki NarrowObliqueBrother : Helsinki Narrow Ob
                                  Category:dropped
                                  Size (bytes):35216
                                  Entropy (8bit):6.594110096578363
                                  Encrypted:false
                                  SSDEEP:768:Fq5dYa/s+rON5KYrBK5jlSSTBQt1fB1IUH/esqPR/TLw:F+X/GN5hijXTBQt1JODsqPxTU
                                  MD5:51802A62A6D16F6024FA5D2984E16EA9
                                  SHA1:DC9F632206C3FA6A29B2CAA6D22DB516C820FD54
                                  SHA-256:E2EA880B67CCEC0FB0F0F5FDD74029E1D9C24A73DB93D50415920498CECA653A
                                  SHA-512:2994B64C2E0249EB4461D2EBB2CBD8BA864E9B872477153249B6181984B8DD8B4DAEA31F211FF0B6DE377DEE4582028ABE15421944BCD799D3B7EC2A9DDA501C
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2s=U`.......Ncmap`,.....,...bcvt %. ........bfpgmR.........xhead...O...l...6hhea...........$hmtx..j........maxp.N......... name.R.u........post..V(.......@prep/56........:glyfN7.\...@..qDloca\.z........................3.+.........f..............................BRTH... .....f.(.H........................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.Helsinki NarrowRegularBrother : Helsinki Narrow :
                                  Category:dropped
                                  Size (bytes):38712
                                  Entropy (8bit):6.539009416810921
                                  Encrypted:false
                                  SSDEEP:768:RwBBawQayBZrrrWIQZtDd8kd5AvXH4j4/VnBbW6:RS2vVWIQHDfd5eYc5VW6
                                  MD5:C7B38A6127C1FBED7F6F8ADB98E18C51
                                  SHA1:A436D2DE93CEE76CA86A2FC573AA3AE886FA584D
                                  SHA-256:A96AED4C1FD9ACB4406B2AF412A0D4F51FD536BDBCB620A34C8125E6D42BE6D4
                                  SHA-512:D7F83FEEA20D9DC22441F25E402133B1C9C2EFCCAB8A2C9429FF71A8DE71AF82F86C7E4DD902C8E3184982D51ADC1CA2B8785C1BBD236D6DA0BC8D5B13358F4A
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2s=S~.......Ncmap`,.....,...bcvt 2.5.........fpgm..*....8...~head...........6hhea...........$hmtx..R.........maxp.N.....(... name...O...H....post..V(.......@prep..`.......<glyf#..N...D..~.loca? `u...,.....................+.........f..............................BRTH.@. ...).f...H........................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.Helsinki NarrowBold ObliqueBrother : Helsinki Narr
                                  Category:dropped
                                  Size (bytes):34748
                                  Entropy (8bit):6.551438731431993
                                  Encrypted:false
                                  SSDEEP:768:4yYgPzHNWKoP8KOQnJMU9JSKQc3t2q7LXf/iL:sP8cJM3KZ3fiL
                                  MD5:A84713630166CD7F0C54FAA453B4E352
                                  SHA1:7012E83297776BD67D20E1D72764850BC18E1A8C
                                  SHA-256:09B35C5CC37F00970FD95CC9559F5569246CFBE83696BE0F857EC3A0BA28B6B4
                                  SHA-512:A0B5433B8EB0448BB09342D6FF8E6888CD16EA678E496C96C151D98C283BE51B025A9822DE4E9B781C04BFBC879A42FBC9628F8C3D0311DC636E17755FAC8BF0
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2tJ.........Ncmap..T...,....cvt )M ........vfpgm.......H....head...........6hhea...........$hmtx......(....maxp.N.....<... name.d.{...\....post.|H....\...@prep/5@........:glyff..y......o.loca..K}...........#...........3.+.........f..............................BRTH.!. %....f.(.\........................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~..........................................................................................................*. .....~.....S.a.x.~...... . . . " & 0 : .!"%...... .....R.`.x.}...... . . . & 0 9 .!"%..........^...C.i.....................X.j.......(...............................................................................................................b.c...d...e...............f.........g...........h.......j.i.k.m.l.n...o.q.p.r.s.u.t.v.w...x.z.y.{.}.|.......~.............................f.N.....=.V.......D....
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.IstanbulRegularBrother : Istanbul : 2009IstanbulVe
                                  Category:dropped
                                  Size (bytes):39988
                                  Entropy (8bit):6.57145739152893
                                  Encrypted:false
                                  SSDEEP:768:FoXmKLTJ69zz/ChFQ4tiBjqb2djQ0kGoKcvLgvifHW/6MsUT:F6fkf/C/tiBjqbcjMZ/Hv8HT
                                  MD5:6A2A123EADE0C2973E7452273E5A590D
                                  SHA1:858EDAD163BEF182C25A129116A6B5AB75479B28
                                  SHA-256:88C131C2F7E0828CA000FCAE21A317C5F7736682551BE280B54C3EFF85E2B6EA
                                  SHA-512:D42EC297A0274EE4D6E48B6438B02FF7F5527CD78725DCDB4D5BB213FEA9F35B28030FFFA4BAEBDAF7555DAEFB8BC15E2B9DBA35FA4288CEF2F5A71CFCF0F69B
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2w.\........Ncmap`,.....,...bcvt edn.........fpgm2.Z.........head.g.K.......6hhea.../.......$hmtxt0E.........maxp.N.*....... name..=Y........post..V_...0...@prep..`...p...<glyf...........zloca.L./...(...............G.....W.G.....9.V.f............................BRTH.@. ..................................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 14 tables, 1st "OS/2", name offset 0x4ac6c8
                                  Category:dropped
                                  Size (bytes):4902144
                                  Entropy (8bit):6.150569642443665
                                  Encrypted:false
                                  SSDEEP:49152:uGZutI4wlth5nMrFtsBwrR3fT4p6R0KZCa1qyq0Vp:NZMhGBwrNAa
                                  MD5:834FFE6DE6F5F2975C6997D49908B382
                                  SHA1:1A4DDF6552C59C3ADF26EA323BBA241C9F0BADAC
                                  SHA-256:4901DDE65030E2F657A20BECC04E816E4C4A1B68DB3C7D0BEDEBB4F0B2A03CE9
                                  SHA-512:58FED6E51B2FF16A91A06B0D76F805C902AD42D2294989B706B9A6788E87609739067C1A4E36B166C0358070522E77CE9816588B5F35E5499643147D7E95C674
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........`OS/2db[d.......Vcmap..:....t..*.cvt 2L....,P....fpgm.T....-....`glyfy6:k..3\.I..head....I>8...6hhea.x3..I>p...$hmtxAF.<.I>.....locaYu...J......maxp9+...J.... mort ....J......name.M...J......post...2.J.... prepU..J.....<...........................................................X.X.....X.X.....2..............................BRTH.@. ...p...K.p.x................................................................................................. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.b...............................cdefghijklmnopqrstuvwxyz{|}~......................................................................)....l.....l.~.................Q . & 3 ;!.!.!!!+!i!y!.!."."." "."5"="R"a"k".".".#.$s%.%B%K%.%.%.%.%.&.&B&o0.0.0.0.0.22292.3.3.3.3+363;3Q3W3~3.3.3.3.N.N!NENONbNsN.N.N.O.O.O.O=OGO^OiOvO.O.O.O.O.O.P-P9PIPPP\PePxP.P.P.P.P.P.P.P.P.Q.Q.Q.Q!Q*Q2QTQ\Q.Q.Q.Q.Q.R.R.R;RORVR^RjRuR.R.R.S.S.S$S*S3S`SiS.S.S.S.S.S.S.S.T.T T.TQT_TjT.T.T.T.T.T.T.U.U.U3U9UFUWU]
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.Letter GothicBoldBrother : Letter Gothic Bold : 20
                                  Category:dropped
                                  Size (bytes):38500
                                  Entropy (8bit):6.45521406992536
                                  Encrypted:false
                                  SSDEEP:768:ARrX0/llOugodWLtascrMpK+7FnlokwMmpEgX7cz:A90dku1dWBRK+5nlok9m6grk
                                  MD5:A3B926CEAA3A72AC30D9B228A68FD7A9
                                  SHA1:F93B1821A6B68D770CC3DD33DC8DBAA67C25EA1D
                                  SHA-256:3F332069A08A3A374182F41D186A702029CEEF31FDBD230B5462751963E6BAE8
                                  SHA-512:16CF871768938FAF6ED1E656694BF8CE9795387D67080518C887652C1356341AF506A8700B2DCF412FEA8F57D5BAD5AC93DC9B981705DD434759E9DDF10C85BF
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2tYV........Ncmap`,.....,...bcvt B.4.........fpgm..`u.......{head.y.........6hhea.......4...$hmtx..x....X....maxp.M."...l... name.AJ........}post.2U........@prep/5|....L...:glyf.J.M......}.loca..$q...X.....................'.........f..............................BRTH. . .....o.E............................................................................................. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.Letter GothicObliqueBrother : Letter Gothic Obliqu
                                  Category:dropped
                                  Size (bytes):34572
                                  Entropy (8bit):6.569378900367101
                                  Encrypted:false
                                  SSDEEP:768:wDmmJhFPPgU2/V5MyxQLTr3uewofG3S382KKOLxz:wym9Ho5Mu+3dwofG3S3u
                                  MD5:74455E96AF330D6CC69C6208E33329A4
                                  SHA1:B96016248994B2E2C06CFFC9ECFC050C6943ED4B
                                  SHA-256:1C8164CC4F0B93226329752EF70AB52699C90EF07D5E4037EC61F014BB1D0173
                                  SHA-512:71CAF8F90AA7F07ABE3EEF512E6133DF0B67FB124C23B35DF9053096170844E211494A2B3BCE16E9FCE85B67C520965C9C0833F44E42AC5A7A8616CF1D82214E
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2sNU........Ncmap`,.....,...bcvt ?D8.........fpgm...k...h...`glyf.........n.head.....yL...6hhea...1..y....$hmtx.<m...y.....loca..]..}.....maxp.M......... name.lo........post.&U........@prep/5p........:...............j.'.....r...f..............................BRTH... .....o.E...!......................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.Letter GothicRegularBrother : Letter Gothic : 2009
                                  Category:dropped
                                  Size (bytes):38692
                                  Entropy (8bit):6.501015074355093
                                  Encrypted:false
                                  SSDEEP:768:C+rETHGj2p+cAUMcaYg4TtnZKfjre7qSwSOhPM3almhroTm7HuJ:C+Cmj2zFdTtyjre7DwSOhPCcm7u
                                  MD5:5B61A454F8756C22961E1EF92E546930
                                  SHA1:D82576BE1CE8D1E7A9E1E40E43D88DF693B7BF13
                                  SHA-256:8AFEF931633FA3FF60FAE6BB0F8CD6D7FE2DB420EB45CDCF4626E9AE55AF9C5F
                                  SHA-512:95E389265F6A755837B207818879676E45FB030319592777EBEAAE9E175B85FD59FFA44996BDFC6CFCE76D0A7E3E702557F6D5492BD29EF157F2552FD5DD871D
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2sNT........Ncmap`,.....,...bcvt 4k;.........fpgmw+`....t...ohead...........6hhea...........$hmtx...?...@....maxp.M.....T... name..-....t...Vpost.2U........@prep/5w........:glyfi7z....H..~.loca,.M..........................'.........f..............................BRTH.@. .....o.E...!......................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 14 tables, 1st "OS/2", name offset 0x304bf4
                                  Category:dropped
                                  Size (bytes):3166800
                                  Entropy (8bit):6.6363379655182335
                                  Encrypted:false
                                  SSDEEP:24576:esc8vmUSdCyYE78A+mrA6zfZGcpBH77MTmjfUU0pZXRlJxRvpLHtgQZWTJhsYAwH:efImhdugr7OmDuFObviL560+8GO+
                                  MD5:3914B18E6E93194FF48FA7E9B71CA1B4
                                  SHA1:A420E89BC043927A18144211A70B3D4079AAD2B4
                                  SHA-256:E71B3071DAAF1A216452690F8A544FBD726A8B5C179484864F726703C57826B3
                                  SHA-512:4ED3CC104B9DF943C4F96934A0FFF0A23FC7E00B52CB7E4024A20DC07C92C2AD24E61F15B9D571E20D68436D543C4D2F792E9A3B62319BD127836B8916DCBF17
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........`OS/2dvds.......Vcmap..:....t..*.cvt UcW...,P...Hfpgm~.].........glyf. .l..4L....head......d...6hhea.U3.......$hmtxAA.X........loca.2.../......maxp9*.F.0I.... mort ....0I.....name.2NT.0K.....post...H.0Q.... prep.*.{.0R....?...........................................................X.X.....X.X.....H..............................BRTH.@. ...p...K.p.x................................................................................................. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.b...............................cdefghijklmnopqrstuvwxyz{|}~......................................................................)....l.....l.~.................Q . & 3 ;!.!.!!!+!i!y!.!."."." "."5"="R"a"k".".".#.$s%.%B%K%.%.%.%.%.&.&B&o0.0.0.0.0.22292.3.3.3.3+363;3Q3W3~3.3.3.3.N.N!NENONbNsN.N.N.O.O.O.O=OGO^OiOvO.O.O.O.O.O.P-P9PIPPP\PePxP.P.P.P.P.P.P.P.P.Q.Q.Q.Q!Q*Q2QTQ\Q.Q.Q.Q.Q.R.R.R;RORVR^RjRuR.R.R.S.S.S$S*S3S`SiS.S.S.S.S.S.S.S.T.T T.TQT_TjT.T.T.T.T.T.T.U.U.U3U9UFUWU]
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 14 tables, 1st "OS/2", name offset 0x2d44f8
                                  Category:dropped
                                  Size (bytes):2968396
                                  Entropy (8bit):6.715953544576457
                                  Encrypted:false
                                  SSDEEP:49152:KanafXwagrOdxqinrURRywj/RaD80InrGycFm:KansbfAinrURswbR6iGpFm
                                  MD5:7F3D397B856EFA83A9020C6D5D645C41
                                  SHA1:B6C5943F1D3B0A0BEE047819E13AD7EAAB324586
                                  SHA-256:93F5F5BD77C62BC687F382F72B7A6C99ED29E92A00889FF6C598ABAF52A9566F
                                  SHA-512:DAC46B07F1FD03458F82E868C38990A962F51BA47C6DE09FCE68495BD7AE795D9EF561F9767F1CF16FF2BE404704573B0CB28D169EC665B0279CDE582360B15C
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........`OS/2dk_].......Vcmap..:....t..*.cvt "..^..,P....fpgm.= c..-h...xglyf..r...2..+..head..N..+.h...6hhea.p3..+.....$hmtxAB...+......loca.E...,......maxp9,.~.-B.... mort ....-B.....nameU].X.-D.....post...2.-J.... prep...-K....<...........................................................X.X.....X.X.....2..............................BRTH.@. ...p...K.p.x................................................................................................. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.b...............................cdefghijklmnopqrstuvwxyz{|}~......................................................................)....l.....l.~.................Q . & 3 ;!.!.!!!+!i!y!.!."."." "."5"="R"a"k".".".#.$s%.%B%K%.%.%.%.%.&.&B&o0.0.0.0.0.22292.3.3.3.3+363;3Q3W3~3.3.3.3.N.N!NENONbNsN.N.N.O.O.O.O=OGO^OiOvO.O.O.O.O.O.P-P9PIPPP\PePxP.P.P.P.P.P.P.P.P.Q.Q.Q.Q!Q*Q2QTQ\Q.Q.Q.Q.Q.R.R.R;RORVR^RjRuR.R.R.S.S.S$S*S3S`SiS.S.S.S.S.S.S.S.T.T T.TQT_TjT.T.T.T.T.T.T.U.U.U3U9UFUWU]
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 14 tables, 1st "OS/2", name offset 0x2d01a4
                                  Category:dropped
                                  Size (bytes):2951160
                                  Entropy (8bit):6.72816750881009
                                  Encrypted:false
                                  SSDEEP:24576:zQdiFMPoRfER9os1s/M1xmhDUL/6Pj6dXsyuHYutDHAThDRATCPE6b2sEWjnx9bJ:ztqPZ/BjHiOmydOqF/jj1M4GcQ6MqrX
                                  MD5:9A8D43A6BA3C5A66D8DB928F815C966B
                                  SHA1:3D4CCD2C60BAD1924C3FEB27A47B7A226A017932
                                  SHA-256:CD0593D1486729DB9EC27391E9A874F952C8C707D5577F518A35F8D95FF87F55
                                  SHA-512:711D5EB5D69A4AE5510F6204C5BC35D139E0D8732F7F794C3D52DD02D0EBF48A5B4D3B829D53D1D4DA3148CB97166EEE617C0173AE0CBD980F770AE6FFA77D1A
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........`OS/2dpbg.......Vcmap..:....t..*.cvt (.$...,P...ffpgmC..{..-.....glyfL.....3..+Evhead..li.+y....6hhea.n3..+yL...$hmtxADC..+yp....loca..c..,<x....maxp9*...,..... mort ....,......nameZa.a.-......post...<.-..... prep3..-.....<...........................................................X.X.....X.X.....<..............................BRTH.@. ...p...K.p.x................................................................................................. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.b...............................cdefghijklmnopqrstuvwxyz{|}~......................................................................)....l.....l.~.................Q . & 3 ;!.!.!!!+!i!y!.!."."." "."5"="R"a"k".".".#.$s%.%B%K%.%.%.%.%.&.&B&o0.0.0.0.0.22292.3.3.3.3+363;3Q3W3~3.3.3.3.N.N!NENONbNsN.N.N.O.O.O.O=OGO^OiOvO.O.O.O.O.O.P-P9PIPPP\PePxP.P.P.P.P.P.P.P.P.Q.Q.Q.Q!Q*Q2QTQ\Q.Q.Q.Q.Q.R.R.R;RORVR^RjRuR.R.R.S.S.S$S*S3S`SiS.S.S.S.S.S.S.S.T.T T.TQT_TjT.T.T.T.T.T.T.U.U.U3U9UFUWU]
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 14 tables, 1st "OS/2", name offset 0x5093cc
                                  Category:dropped
                                  Size (bytes):5282252
                                  Entropy (8bit):6.1201887983496865
                                  Encrypted:false
                                  SSDEEP:49152:4wC7qEFb2dwhCjbGBoYN8HBaebAkDzS+Acrlpyo6eLnq2Z1uJjAX734yFUWy:NWF2w/NRomHcxpTWZZm34WNy
                                  MD5:36F47E6C2F655BF805778F7CA86647AC
                                  SHA1:E3E6417B10FC5328CED33131BDEA8BC20E5573C7
                                  SHA-256:409E0A0592EB48E3E1BAA122A7AA1D441CE180C7E9BCA6413BC27086AF8C5803
                                  SHA-512:94249BB57D13D4115D32A604981927A161C2E7E49615F18C4A35A5DC50129E2732E4EF898F3C81863EB75A6F158FB6533CFCA1C280A099D84E8538850FE7E9A1
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........`OS/2e`db.......Vcmap..:....t..*.cvt >.6...,P....fpgm.h.;.......`glyfL.9...3p.N..head...C.O.<...6hhea.x3..O.t...$hmtxAN...O......loca..r.O.....maxp9%...P..... mort ....P......name.....P......post...2.P.p... prep/5.=.P.....:...........................................................X.X.....X.X.....2..............................BRTH.@. ...p...K.p.x................................................................................................. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.b...............................cdefghijklmnopqrstuvwxyz{|}~......................................................................)....l.....l.~.................Q . & 3 ;!.!.!!!+!i!y!.!."."." "."5"="R"a"k".".".#.$s%.%B%K%.%.%.%.%.&.&B&o0.0.0.0.0.22292.3.3.3.3+363;3Q3W3~3.3.3.3.N.N!NENONbNsN.N.N.O.O.O.O=OGO^OiOvO.O.O.O.O.O.P-P9PIPPP\PePxP.P.P.P.P.P.P.P.P.Q.Q.Q.Q!Q*Q2QTQ\Q.Q.Q.Q.Q.R.R.R;RORVR^RjRuR.R.R.S.S.S$S*S3S`SiS.S.S.S.S.S.S.S.T.T T.TQT_TjT.T.T.T.T.T.T.U.U.U3U9UFUWU]
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 14 tables, 1st "OS/2", name offset 0x4d5da4
                                  Category:dropped
                                  Size (bytes):5071796
                                  Entropy (8bit):6.199954559580379
                                  Encrypted:false
                                  SSDEEP:98304:LKpzUk+iisBFMu3NDxMnMP5GZoRZygOQLngr:L4zkJaFV3NDxI4hRZA
                                  MD5:BFA4281CEF57ACC186A3285E46B9AF24
                                  SHA1:AC0891D3E03526450F621958C50E0890A316634A
                                  SHA-256:C64FF8ECA178D8F7F1482F50F227D40BE2DEC5E6BAD335B73EF996F304C961AA
                                  SHA-512:3474766887A0376785ADEFE8D55E0E5710E9B35AD2E9759AF1D9721AD56B0159FB4B31FDDD68F41A033ADAED16355BEF772B5E1107052D2D367C769AC6DEDDF1
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........`OS/2eS`G.......Vcmap..:....t..*.cvt 1.2...,P....fpgm.......8...`glyf,.-..3..K.|head....K.....6hhea..3..K.L...$hmtxAK...K.p....loca..\..L.x....maxp9(...M[.... mort ....M[.....name..)6.M].....post.....Mc\... prep.#z].Mc|...8...........................................................X.X.....X.X....................................BRTH.@. ...p...K.p.x................................................................................................. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.b...............................cdefghijklmnopqrstuvwxyz{|}~......................................................................)....l.....l.~.................Q . & 3 ;!.!.!!!+!i!y!.!."."." "."5"="R"a"k".".".#.$s%.%B%K%.%.%.%.%.&.&B&o0.0.0.0.0.22292.3.3.3.3+363;3Q3W3~3.3.3.3.N.N!NENONbNsN.N.N.O.O.O.O=OGO^OiOvO.O.O.O.O.O.P-P9PIPPP\PePxP.P.P.P.P.P.P.P.P.Q.Q.Q.Q!Q*Q2QTQ\Q.Q.Q.Q.Q.R.R.R;RORVR^RjRuR.R.R.S.S.S$S*S3S`SiS.S.S.S.S.S.S.S.T.T T.TQT_TjT.T.T.T.T.T.T.U.U.U3U9UFUWU]
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.San DiegoRegularBrother : San Diego : 2009San Dieg
                                  Category:dropped
                                  Size (bytes):63568
                                  Entropy (8bit):6.599606200369174
                                  Encrypted:false
                                  SSDEEP:768:OHOFtYt2SYBU0z07WKQJ304RD9SUAoUhbS5BWwN42b3jcvZPNDQIX9RMaqpFEDm+:q9wSYBjSQdjDgx1sWwXBs9ROpF6mYqo
                                  MD5:216365270FC6BF25567F4AEEBCF6FC1C
                                  SHA1:69A43766C7508AB4CFCB03652C8C46B29D7E6527
                                  SHA-256:24498B1C1EBEB6D23354051DFED82CCCBAEB4E61CE99A89255200647D80BA613
                                  SHA-512:D9751F4C53DD647C088BE3D1AED1CA653EB1F3B75F131DB806192F8CA80590F12975D0AD247519799FFD1CA5B42AF54FF418BAF3EDAA3FB0D014F2316E02A805
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2r.Q........Ncmap`,.....,...bcvt ...-........fpgm.IF........xhead...E.......6hhea.V.........$hmtx.v\.........maxp.N......... name../........#post..U....@...@prepB........<glyf...O.......loca&.b,...D...............................f..............................BRTH.@. ..................................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 14 tables, 1st "OS/2", name offset 0x3f19c8
                                  Category:dropped
                                  Size (bytes):4137048
                                  Entropy (8bit):6.8086616663196
                                  Encrypted:false
                                  SSDEEP:49152:7fBOIw91xjwhWIsUJfXCrrr+SqdGxRQXzHkrX61slDnrnbBvp3ktvcuEeMX3b:7fB/wnNmrJfyrrV4ErX61AOBWeMb
                                  MD5:AD40A92F1A3038B1CA4A4B6744320545
                                  SHA1:7A797D1199DC7A65F4D3D86617A43942455C646E
                                  SHA-256:94960C2C7A3A53C446F902CD1A139B3AE108A147A74AFE01249DD7E39C5DAC6E
                                  SHA-512:216D880E48211FABC93962C6FAAEF9B317814E487C1C5D8618754A4B19E4E31AAD231F2C7ADE85D533A2701F292D3938C49A889A237A4670B0CD5E39C810F34A
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........`OS/2do_g.......Vcmap..:....t..*.cvt 3.;!..,P....fpgmuZI+.......xglyf:.3...3..=].head..gE.=.8...6hhea..3..=.p...$hmtxH./.=......locaQ<.b.>T.....maxp9,...?..... mort ....?......name2....?.....2post...2.?..... prepa..? ....<...........................................................X.X.....X.X.....2..............................BRTH.@. ...p...K.r.x................................................................................................. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.b...............................cdefghijklmnopqrstuvwxyz{|}~......................................................................)....l.....l.~.................Q . & 3 ;!.!.!!!+!i!y!.!."."." "."5"="R"a"k".".".#.$s%.%B%K%.%.%.%.%.&.&B&o0.0.0.0.0.22292.3.3.3.3+363;3Q3W3~3.3.3.3.N.N!NENONbNsN.N.N.O.O.O.O=OGO^OiOvO.O.O.O.O.O.P-P9PIPPP\PePxP.P.P.P.P.P.P.P.P.Q.Q.Q.Q!Q*Q2QTQ\Q.Q.Q.Q.Q.R.R.R;RORVR^RjRuR.R.R.S.S.S$S*S3S`SiS.S.S.S.S.S.S.S.T.T T.TQT_TjT.T.T.T.T.T.T.U.U.U3U9UFUWU]
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.USRomanBrother : US Roman : 2009US RomanVersion 3.
                                  Category:dropped
                                  Size (bytes):49180
                                  Entropy (8bit):6.688710864447759
                                  Encrypted:false
                                  SSDEEP:768:9R/Kfee8f2eZaA82xmZmoSd5+0VlvCVXOE+WL4ssq1OBCWr3wOoWlkq:95KQfRGZmoSdEalvCVTmqMBD3w4lP
                                  MD5:D685F2F210145EF28779E1A68E4B91A1
                                  SHA1:EA0A47DABD6664629AD60F957FB20DA66C680370
                                  SHA-256:8AA0D3014D64A86D3A286CD97A6C927E6B73D180C6BC4EC7D5C75D76886ABE4A
                                  SHA-512:52C96018B378F84794888EFB49AD65814D8646732FC7BC1115CD80CD3B2702D46816C015598C149DA00E4B4A7795BADA314A23AE541125C8936BB1B0B3E0351C
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2{_Mr.......Ncmap`,.....,...bcvt 4.9o........fpgm..#.........head.{S....D...6hhea.......|...$hmtx3.D.........maxp.N.P....... name...........post..U........@prep.........<glyfP......L....loca...`...................................f..............................BRTH.@. ...........H......................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.UtahBoldBrother : Utah Bold : 2009Utah BoldVersion
                                  Category:dropped
                                  Size (bytes):36900
                                  Entropy (8bit):6.478923939629456
                                  Encrypted:false
                                  SSDEEP:768:YDOGte9FSp6ofYZz5BDL2WQq7Cm9xGIUypENDHKTV5sd4Ip:YqGtokEuYZlFttCmvGJypE4TVO
                                  MD5:E4B486559A91CFD8423238054F0BF1BD
                                  SHA1:B725F0C9206618FBA47FC152B1BEF5BFADDBA1E4
                                  SHA-256:B799A70E4B4BD8FE051EAE8F9364342F716D4732CF1A7B3254C61F0AE044E307
                                  SHA-512:70724D9E43494F13A57DB31810722FBB378BDD83AC736947E96A243A69AFBC3CAB25A7E0A2F732A892FCEAB47141DC877C858391016C9E99D41E317CC9F139E0
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2uOWn.......Ncmap`,.....,...bcvt 10&.........fpgm..vD...D....head...........6hhea...........$hmtx .. ...,....maxp.N.....@... name...2...`....post.2U....`...@prep/7_........:glyf.V........x:locaQ.q....................................f..............................BRTH. . ..................................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.UtahObliqueBrother : Utah Oblique : 2009Utah Obliq
                                  Category:dropped
                                  Size (bytes):33784
                                  Entropy (8bit):6.632568463600335
                                  Encrypted:false
                                  SSDEEP:384:S1T+zAP69uHM8mfOX6N3pz60KzcULnyMBMh2L5EuEWNR0cGyviWCSCAwHdTVE:SEsPhqWXk3OLyB0L51PXGy0SCAwpm
                                  MD5:A94B9AF9C17ED600957AD3C230D3E369
                                  SHA1:2D85740A3DD6B14D1B0C1B53633A8F0A99F80FC7
                                  SHA-256:4064F0E39CD832C771D1263A3FA5A763246F6809C72999D4144106E43579208C
                                  SHA-512:D001F38E644BA0D416E6C8FAC1000F03968EC1A8688F492B576EA99AD180CE1EB63635AEA77D819FD78CA12844E3F39E4E0719CB7918F90495B3E2966F6AC732
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2s#Wz.......Ncmap`,.....,...bcvt .~ .........fpgm.j:....4...xhead..........6hhea...........$hmtx.JI.........maxp.N......... nameF._....<... post.!.....\...@prep/7W........:glyf..........l.loca...+...............................}...f..............................BRTH... ..................................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.UtahRegularBrother : Utah : 2009UtahVersion 3.2Uta
                                  Category:dropped
                                  Size (bytes):35872
                                  Entropy (8bit):6.5134257842591285
                                  Encrypted:false
                                  SSDEEP:384:B1s6SJnqbFn9ytbUkRW+hd6Zed5PuZV7ZaF5oupgFi1W9FWoJhLw2Cae7njauvN3:BPa4y7ld6U9u3AF5zCeoBxe7jRYQPUu
                                  MD5:0F061D9487EED3F25EA1B1D29B5DB832
                                  SHA1:31248B770E06091F53AE32688E8C008DCA8DDDC0
                                  SHA-256:C34A9F48BE9FCE574830F979BDD051C75CE6FC53C8BE3CB2F35C5672C2B0A856
                                  SHA-512:67095BBD26AE9A42F96B91FDCD6CE172D6DC3AC4FE16CDA2BB1701E9FFE993D2C57A2829863BE42D0D031B1BF3D1C909D3B5C19AC59C1F67A214FCA26632B3B1
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2s V........Ncmap`,.....,...bcvt +Q#.........fpgm..g....H...xhead..........6hhea...........$hmtx..w........maxp.N.....0... name.e.....P....post.2U....,...@prep/7a....l...:glyfMh........tjloca...[...................................f..............................BRTH.@. ..................................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.UtahBold ObliqueBrother : Utah Bold Oblique : 2009
                                  Category:dropped
                                  Size (bytes):33296
                                  Entropy (8bit):6.59158894570541
                                  Encrypted:false
                                  SSDEEP:768:YOBvbhrRCYc3EoUabCMrEAYm2YMU42k8Y:/CYnorWMrLT2k6l
                                  MD5:C18E0550DD93EFDA28AB73907E342A0B
                                  SHA1:06D884E1EDA6FD667FB69BCA851A0890A978E0D1
                                  SHA-256:1DC64C7406B61B4E77C0C68DBFCEDCE94357DC90967635DF8B297F5BBE188BDF
                                  SHA-512:9F5E55A20510B869F6455F18FEFB4140B7427C8B160FBA9482713F1404F1121D36E9E694B3EA19105229A831BE6A073CA543AC61A98A93321A4315B3227676C0
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2uN.g.......Ncmap..T...,....cvt 9/|........fpgm......\....head...........6hhea.......$...$hmtx ..C...H....maxp.N.....\... name.#.....|...Ypost..........@prep/7L........:glyf.XK....T..j.loca_.{....................................f..............................BRTH.!. %.................................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~..........................................................................................................*. .....~.....S.a.x.~...... . . . " & 0 : .!"%...... .....R.`.x.}...... . . . & 0 9 .!"%..........^...C.i.....................X.j.......(...............................................................................................................b.c...d...e...............f.........g...........h.......j.i.k.m.l.n...o.q.p.r.s.u.t.v.w...x.z.y.{.}.|.......~...............................q...............J.H..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.PT Utah CondensedBoldBrother : PT Utah Condensed B
                                  Category:dropped
                                  Size (bytes):36216
                                  Entropy (8bit):6.428061701631088
                                  Encrypted:false
                                  SSDEEP:768:2A7jnukoFmX5ML2qmebGyB/4VQV6PEz6mVeiVhsK7X:2yHqL2qmebvBAVbPOVeiVhsKL
                                  MD5:78C6D894C3642104F23D6683C211A53D
                                  SHA1:C7AE4F44CA86CC9DFA85A6826E2F07768EAE5BD6
                                  SHA-256:64B4A9B3B10CD3527B3B9FA1E953E15301B7FCAD85BE7A7743EE8631744A1E0D
                                  SHA-512:D0F5033C393F2E960ADA6D6CFDED2A59066A01CEC24D3FE3AAF0C835F81E1C1D709BE24B1F8B0833D509C24FF8C164217237442CDC4D40B1D281F5BC78D846FC
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2uOV........Ncmap`,.....,...bcvt J\W........ fpgm.y.........head..\|...@...6hhea.......x...$hmtx..y.........maxp.N.$....... name...3........post.2U........@prep/7.........:glyf..........tjloca.......l...............................f..............................BRTH. . .........u........................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.PT Utah CondensedObliqueBrother : PT Utah Condense
                                  Category:dropped
                                  Size (bytes):33660
                                  Entropy (8bit):6.585750781087932
                                  Encrypted:false
                                  SSDEEP:768:kVdhAaVAb8FihdMw4JFi5n34fCGDMse+bd+o1evj5:k1ihTeA53Gpe+bd+o1evj5
                                  MD5:4F5E903A70DD2AFE2152283BB1EA7439
                                  SHA1:0AA753DFC32F8185C98CF0A9309665B483F5E0E8
                                  SHA-256:0EC58CEB13FA392E3480615530CF6035C385C5E9C596D773A75D223A8A177561
                                  SHA-512:67F44AAAEDA6459546246CE68553B75DFA7B5ACFE5894CBCF8E0A21C8B1F25E0CD508FAA4376D5FEB62390A7286772BA8641DB27CD60DCE6BCD48F96612C0B56
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2s#V9.......Ncmap`,.....,...bcvt I.?.........fpgm..........xhead..[........6hhea.......D...$hmtx..:V...h....maxp.N.....|... name.i..........post.!.....x...@prep/7.........:glyf.|........j|locax.....p...............................f..............................BRTH... .........\........................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.PT Utah CondensedRegularBrother : PT Utah Condense
                                  Category:dropped
                                  Size (bytes):35224
                                  Entropy (8bit):6.473523793824878
                                  Encrypted:false
                                  SSDEEP:768:euut0Q3bchomKDTZFkxZT6X9XhuRpiAKs0thFB:e1Jb/1Fi6tXURbat/B
                                  MD5:8C53267E8BAC0658E8362D8B5DC09B25
                                  SHA1:54082FD5CDF6D6FF2C5CE07F64EF4AE94FFA9BB1
                                  SHA-256:64A8C21610915E80E30C8712EDD443FBEE26E1E7F6B91840835406898697B632
                                  SHA-512:2E12AFAA9D554173BCC3F066B172A8A05F54500E3BB38FA440E42ACC7C84A48E8AA5BB7AAD2C36293EE34CEB16823FA14D93B2D45DD07EE00AF98C66A35160A2
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2s UM.......Ncmap`,.....,...bcvt NJD.........fpgm...........xhead..f....$...6hhea.......\...$hmtx.y.........maxp.N.$....... name............post.2U....@...@prep/7.........:glyf.L........p.loca^.{....................................f..............................BRTH.@. .........\........................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.PT Utah CondensedBold ObliqueBrother : PT Utah Con
                                  Category:dropped
                                  Size (bytes):33636
                                  Entropy (8bit):6.577010656612868
                                  Encrypted:false
                                  SSDEEP:768:06TMvTpxT28yQHHD3bZ0uBt5tsgAsE0arFmSfrxK:cL3q+L2u3f6LK
                                  MD5:994E8D06489A9440B2EDC1A94CDBE18D
                                  SHA1:66DC457DDC4AF9B8F8662F6ECDC6C2FB7046AECB
                                  SHA-256:4166C7D29FF84911716BF76099DE4FC3AE78FD49A05CA0D6B14DB9A30FBE8936
                                  SHA-512:B94B7BE0A19F449E03D3FA4732FCF351B7FDE2E3DEF167508A577CA3C93D29BC550ED60C43CE37ABD33C2B262FDA94A5BEE78479E4E35CEB7FA112A7FD88EBB3
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2uN.........Ncmap..T...,....cvt DgP.........fpgm.D.`........head...n...h...6hhea.N.........$hmtx..,>........maxp.N......... namem...........post.........@prep/7.....P...:glyf...C......j.loca..3...X...............................f..............................BRTH.!. %........u........................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~..........................................................................................................*. .....~.....S.a.x.~...... . . . " & 0 : .!"%...... .....R.`.x.}...... . . . & 0 9 .!"%..........^...C.i.....................X.j.......(...............................................................................................................b.c...d...e...............f.........g...........h.......j.i.k.m.l.n...o.q.p.r.s.u.t.v.w...x.z.y.{.}.|.......~...............................q.................|..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 14 tables, 1st "OS/2", name offset 0x46d630
                                  Category:dropped
                                  Size (bytes):4643968
                                  Entropy (8bit):6.670562636105746
                                  Encrypted:false
                                  SSDEEP:49152:IhjmXV8OPUQyHl7niYhna8/o/SGa/1Q/0xa2pEUbvYt6QvatQUFAoMk6tKp:m/vgSP/1QVt6QvaSKPMRE
                                  MD5:E5045DC6437844E0395144E632814EB8
                                  SHA1:EB79E5678CF8F257274122B67429366BC6D1FC4F
                                  SHA-256:A6F11868D684D87A154E3E0592195B39AAB478DB026241135BD21717D76D0FA0
                                  SHA-512:CD11217C8AC62D6A3D1A79DE5002E2E07C15E654758A4184D3EB112C0C3BB203B9D2DBE798652724F35C491BE868507813B77527C55E283F76DF4B171BF9B749
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........`OS/2dl]k.......Vcmap..:....t..*.cvt Y.U...,P....fpgmP..Q........glyf-.....4..E..head..l.EM....6hhea..3..EM....$hmtxAA...EM.....loca....F......maxp9*...F..... mort ....F.0....name.2.L.F.0....post...<.F. ... prep.[.}.F.@...?...........................................................X.X.....X.X.....<..............................BRTH.@. ...p...K.p.}................................................................................................. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.b...............................cdefghijklmnopqrstuvwxyz{|}~......................................................................)....l.....l.~.................Q . & 3 ;!.!.!!!+!i!y!.!."."." "."5"="R"a"k".".".#.$s%.%B%K%.%.%.%.%.&.&B&o0.0.0.0.0.22292.3.3.3.3+363;3Q3W3~3.3.3.3.N.N!NENONbNsN.N.N.O.O.O.O=OGO^OiOvO.O.O.O.O.O.P-P9PIPPP\PePxP.P.P.P.P.P.P.P.P.Q.Q.Q.Q!Q*Q2QTQ\Q.Q.Q.Q.Q.R.R.R;RORVR^RjRuR.R.R.S.S.S$S*S3S`SiS.S.S.S.S.S.S.S.T.T T.TQT_TjT.T.T.T.T.T.T.U.U.U3U9UFUWU]
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 14 tables, 1st "OS/2", name offset 0x43885c
                                  Category:dropped
                                  Size (bytes):4427436
                                  Entropy (8bit):6.710757675730087
                                  Encrypted:false
                                  SSDEEP:49152:A7oplGk7WDBZZ9umMUlJSGPGfsLqg3yBNX5wZ2spOqdE2s6fWCk:AKlhs1gOq1wH6N
                                  MD5:AA2E5C30F95AD026FE2D71FF673A4BDD
                                  SHA1:12EBD9E2537DBCC3F6F3694A5CB6C424976993E1
                                  SHA-256:80DD2BFEE7F01F833ADF26C6A45CE99112D7BF107A2018300BF7932A7D402BB3
                                  SHA-512:EBE6B10309F3AF707380D80579C68F937A46B7F0C391E7097240CF66ED3A7304B5C62A98208C05261EEA84424843936EF2FF918F3DE80C0D3BD496B98BB015FF
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........`OS/2db[a.......Vcmap..:....t..*.cvt 4.8]..,P....fpgm')Z....T....glyf~....48.A.head..jk.A.....6hhea.|3..B.....$hmtxAA...B.(....loca.HH..B.0....maxp9+.q.C.<... mort ....C.\....name..a..C.\....post...2.C.P... prep...C.p...<...........................................................X.X.....X.X.....2..............................BRTH.@. ...p...K.p.x................................................................................................. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.b...............................cdefghijklmnopqrstuvwxyz{|}~......................................................................)....l.....l.~.................Q . & 3 ;!.!.!!!+!i!y!.!."."." "."5"="R"a"k".".".#.$s%.%B%K%.%.%.%.%.&.&B&o0.0.0.0.0.22292.3.3.3.3+363;3Q3W3~3.3.3.3.N.N!NENONbNsN.N.N.O.O.O.O=OGO^OiOvO.O.O.O.O.O.P-P9PIPPP\PePxP.P.P.P.P.P.P.P.P.Q.Q.Q.Q!Q*Q2QTQ\Q.Q.Q.Q.Q.R.R.R;RORVR^RjRuR.R.R.S.S.S$S*S3S`SiS.S.S.S.S.S.S.S.T.T T.TQT_TjT.T.T.T.T.T.T.U.U.U3U9UFUWU]
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.Brussels CondensedDemiBrother : Brussels Condensed
                                  Category:dropped
                                  Size (bytes):46244
                                  Entropy (8bit):6.637486093774403
                                  Encrypted:false
                                  SSDEEP:768:pCEgtoQBWV9fyuhdeB7ce5HzR5Z6NIpKzbSSRVLNWZdy2ZQ9nZQ:pQouWVQ0WHRK1pWZdyh9nZQ
                                  MD5:0D3EF2E1A1D016222DA942398A9F4930
                                  SHA1:427BFB87C792CAE5CF6A066566EED9023E62170E
                                  SHA-256:41B462BDDA50F4D91D4EA7DF314C10E477B426AA646C06D77F92E8931AA2C4A0
                                  SHA-512:47EB1A402A68D2F54BECEB9D97078CFC69758CFFAF7A86BBCADD13D53ADFF85344C601EC5F391B030DAD9AE5F62F9F6E17D183EF9A219B4A69D92353D665454D
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2utS........Ncmap`,.....,...bcvt R.F........Bfpgm..$........{head.zF....P...6hhea...H.......$hmtx..,.........maxp.^.!....... name............post..V........@prep!........<glyfS/.....$...tloca#yL..............X.....................f..............................BRTH. . .....=.(............................................................................................. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.Brussels CondensedLight ItalicBrother : Brussels C
                                  Category:dropped
                                  Size (bytes):45432
                                  Entropy (8bit):6.749665472619072
                                  Encrypted:false
                                  SSDEEP:768:6ZciiipnaWwrK2rnzLSRCPrbPAaeO6G4j/OdmEZQLkEiLjurJ9fOngKzVcUMdmrA:ViiigWYKCnHEMrb4aeO63j/OdmEZQL5v
                                  MD5:B2438074490892820B65C4944100B5BC
                                  SHA1:1E8FC4B4466DE449DFA04632F9B89C507A512C59
                                  SHA-256:04BCB2D71A321531FD3371D569A3F1645BBAF6E8D7096A964F28D0166538F707
                                  SHA-512:CC8D1CED5E17DDB7C75D3CDC66C24D8FCC438CD88E8AE4E4F54823513E0D8152CECF74CE1A2C67E36949E02205136ADEB83969A6A327F6ECB88BCC8E222CE25C
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2tH.........Ncmap..T...,....cvt 5.,z........fpgmD..(.......rhead.......<...6hhea.......t...$hmtxgBj.........maxp.N.A....... name.#.........+post.Y{........@prep..`...8...<glyf\D.r...t....loca.......l.........,................._...f..............................BRTH... %....=.(............................................................................................. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~..........................................................................................................*. .....~.....S.a.x.~...... . . . " & 0 : .!"%...... .....R.`.x.}...... . . . & 0 9 .!"%..........^...C.i.....................X.j.......(...............................................................................................................b.c...d...e...............f.........g...........h.......j.i.k.m.l.n...o.q.p.r.s.u.t.v.w...x.z.y.{.}.|.......~.............................=.%.........q..........
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.Brussels CondensedLightBrother : Brussels Condense
                                  Category:dropped
                                  Size (bytes):46568
                                  Entropy (8bit):6.657234342085203
                                  Encrypted:false
                                  SSDEEP:768:SPqiWvilkhZXn59mtXjPBy2jTEdDlA7Dy9k/j9DwMCNbAkg9rPCAXgyEPKN7B+:SPlZoZXn7CTFTADyvy9kb9DwNN8kYrP6
                                  MD5:461A39093DAC2FFF17553ABF33E8F762
                                  SHA1:8E2664C9913574A8B71882A384BC8587E885A347
                                  SHA-256:A24624A802A8CA9FE9907815CF0973513A6AA67015D6776B79374AB7B9CFE778
                                  SHA-512:2B79B9F1E0647ABF52AED7DEBF7D065601DFD8A7F69AB62BF22BB307CAEF055A257ABDE8639B1EB232909F1FF152127E9CD87C2B22208CF999D47F9204EE2B0F
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2tHPI.......Ncmap`,.....,...bcvt *T1.........fpgmsNtw...x...~head...S.......6hhea.......0...$hmtx\./....T....maxp.^.....h... name.1..........post..V....h...@prep.........<glyfGFy.........locaKZt..............,.....................f..............................BRTH.@. .....=............................................................................................... !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~......................................................................................................H...P.@.....~...........1.B.S.a.x.~........ . . . " & 0 : . .!"!&"."."."."."."+"H"`"e%........ ...........0.A.R.^.x.}........ . . . & 0 9 . .!"!&"."."."."."."+"H"`"d%......................^...C.i.......................T.X.j.y.......t.q._./.0.........N.....................................................................................................................................................b.c...d..
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 1993-2011 Brother Industries,Ltd.Brussels CondensedDemi ItalicBrother : Brussels Co
                                  Category:dropped
                                  Size (bytes):45188
                                  Entropy (8bit):6.755854840463967
                                  Encrypted:false
                                  SSDEEP:768:O0UHZ+hIZl3mj6VrR29d3gdh/nhpV8e/VN5UiHp+wC3:e5jWja9S3OJ9h/Vo8gb3
                                  MD5:49CB11323D94A7788514890841CF2DA4
                                  SHA1:E777F3EF764153835224586C952C286FF753B93A
                                  SHA-256:06686EC7EE90019736107FE7E2A4AECE2B0C83793E71612615D9941A68165AAE
                                  SHA-512:DBB63EC8F6249D6C90A9E19522305F3BEBC68AB5EED717B5EB681E46D43562677290B244A05141E9CA5D88A3075C8012A6E7CEB7DEB34D40DFC0254D6C55E915
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2ut.........Ncmap..T...,....cvt H.R........4fpgm.$.Q.......{head.k.........6hhea.Z.z.......$hmtx.Rd.........maxp.^......... name..df........post.Y{....0...@prep.....p...<glyfe..........loca.D.....x.........X.................^...f..............................BRTH.!. %....=.(............................................................................................. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.bcdefghijklmnopqrstuvwxyz{|}~..........................................................................................................*. .....~.....S.a.x.~...... . . . " & 0 : .!"%...... .....R.`.x.}...... . . . & 0 9 .!"%..........^...C.i.....................X.j.......(...............................................................................................................b.c...d...e...............f.........g...........h.......j.i.k.m.l.n...o.q.p.r.s.u.t.v.w...x.z.y.{.}.|.......~.............................=.%.........q.........y
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 2002 Brother Industries,Ltd.PT Symbol 1RegularBrother : PT Symbol 1 : 2002PT Symbo
                                  Category:dropped
                                  Size (bytes):61360
                                  Entropy (8bit):6.820748879764713
                                  Encrypted:false
                                  SSDEEP:1536:1dU9D4nbgrZ2xW4vAdFzaVn/BW8YwUqLBrP:1dUt4nUX67/BfI8B7
                                  MD5:69FA4500777ACF08BA53F9F8383F71B1
                                  SHA1:236EEF7AFC260183F5D06AFDB7AEC5610F2A3432
                                  SHA-256:9E46D521B52A05CB33439DF5229E35078EC0F12AD2CC28B597DCE1EFB23E6605
                                  SHA-512:70120FF8D94FAFEF971E70C9FFC14EE4DBA888E11D488B5F2210131E88005F86E50FFCC34BF5C262DE5EC6FC7E24585DECAB6B6EADE01B06A8C35082C79DDB9A
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2d.T[.......Ncmap..U....l....cvt 5.<....p....fpgmOg.........oglyf|.i.........head...........6hhea.......$...$hmtxQka....H....loca............maxp.*........ name..a.......Dpost$q0.........prep..`...t...<.....................................................................,.......f.......f.....f..............................BRTH.@. .....=...s........................................................................................... !"#$%&'..*+,-./0123....89:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.cdefghi.....opqrstuvwxyz{|.....................................................................................................................9.D.P.~.......... .=.G.U..........................B.P.b............................................................. .!.".#.$.%.&.'.*.+.,.-.../.0.1.2.3.8.9.:.;.<.=.>.?.@.A.B.C.D.E.F.G.H.I.J.K.L.M.N.O.P.Q.R.S.T.U.V.W.X.Y.Z.[.\.].^._.`.a.c.d.e.f.g.h.i.o.p.q.r.s.t.u.v.w.x.y.z.{.|............................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:TrueType Font data, 13 tables, 1st "OS/2", 24 names, Macintosh, Copyright(c) 2002 Brother Industries,Ltd.PT Symbol 2RegularBrother : PT Symbol 2 : 2002PT Symbol
                                  Category:dropped
                                  Size (bytes):47788
                                  Entropy (8bit):6.708238482153325
                                  Encrypted:false
                                  SSDEEP:768:y2h71ZVsKbFieU+E+oLnG5HYYJcgyiYet2w+FfK6BemBhmHKCBLEvRm:y2d3FcT+oLG5HYicgyiYQ2w+FfzeghmT
                                  MD5:3E6FA6FF18848FB1F3CFE2BF9F62FF76
                                  SHA1:891BBFB3529FBAFB02AFFA37237C6D684D35AB4A
                                  SHA-256:E72F1E6DCB3F9C3605BA6ADDCDEDE63CFAC12021F074A7AC655547B556B96991
                                  SHA-512:EB4C926A5669DC5F10C26599CB7B1DBABE75B6CDFF70EEDDB538AB9948EE6ACF3E4BB9FCD1C625EA7AF55C5F209745671345877EA5957FB34BE4B0B011EA816F
                                  Malicious:false
                                  Reputation:low
                                  Preview:...........POS/2`.W........Ncmap..U....l....cvt 10&....p....fpgm..{....4....glyf..i1.......0head...1.......6hhea...0...(...$hmtx[..i...L....loca.Z.........maxp.:......... nameO..$.......;post$.0.........prep/5f=...p...:.................................................................................+.........f..............................BRTH.@. .....f.(.{........................................................................................... !"#$%&'..*+,-./0123....89:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`a.cdefghi.....opqrstuvwxyz{|.....................................................................................................................9.D.P.~.......... .=.G.U..........................B.P.b............................................................. .!.".#.$.%.&.'.*.+.,.-.../.0.1.2.3.8.9.:.;.<.=.>.?.@.A.B.C.D.E.F.G.H.I.J.K.L.M.N.O.P.Q.R.S.T.U.V.W.X.Y.Z.[.\.].^._.`.a.c.d.e.f.g.h.i.o.p.q.r.s.t.u.v.w.x.y.z.{.|............................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                  Category:dropped
                                  Size (bytes):147728
                                  Entropy (8bit):5.909287934496192
                                  Encrypted:false
                                  SSDEEP:3072:h+qD1Cd/Oa5kXFlqkFGr3CAP7LCyInPEggen5Ez:hlCd/OaaFEjCAPKyOE6na
                                  MD5:C89E401800DE62E5702E085D898EED20
                                  SHA1:72FB4F088C6AC02097B55FB267C76FBF5E0FA1F7
                                  SHA-256:DE83C9D9203050B40C098E4143EF8F577AA90016C7A64D4F2931B57A4C43E566
                                  SHA-512:70006D70DCB47361FF43E4F7C458655AD2474B70CB917873AA77D2CC06465A68D375D36C494D154A03DBBFF891DF7DD6CAB3D2C7B08E8650B9FF170E30838070
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............ru..ru..ru..mf..ru..ru..su.Rich.ru.........................PE..L....!.6...........#..................... ........<e.........................`... ..^q..................................n.......d....0.......................@..0...P!............................................... ..L............................text...n.... ....... .............. ..`.data....d.......P..................@....rsrc........0......................@..@.reloc..v....@... ... ..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                  Category:dropped
                                  Size (bytes):598288
                                  Entropy (8bit):6.644743270512807
                                  Encrypted:false
                                  SSDEEP:12288:HCKynQWKglDhrUtrvT/NInIk4NDXsR6lMlpGz:HGXqB8V6lMlMz
                                  MD5:7B156D230278B8C914EF3F4169FEC1CC
                                  SHA1:6B58E20B2538CB308091DA838710F6AAD933A301
                                  SHA-256:BAEB2F7C1B8BE56738D34E1D1DDF8E0EEBD3A633215DC1575E14656BE38B939D
                                  SHA-512:E4EC2BC714069E0A6B56D89B52AABAD92E5BA741DC6F26D2FC2D72AA9AD2EC465DEA523CCCD810331AB78B5FB8A1244B2B521303418EAD5BD6BE5A58B43794C5
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ibW.-.9.-.9.-.9...7.(.9.{.*.,.9.-.9...9.Rich-.9.................PE..L....#.6...........#..... ...................p....4e......................... ......+................................6..%$.......................................g...................................................................................text............ ... .............. ..`.data....a...0...`...@..............@....rsrc...............................@..@.reloc...g.......p..................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                  Category:dropped
                                  Size (bytes):164112
                                  Entropy (8bit):5.8462943829831575
                                  Encrypted:false
                                  SSDEEP:3072:+VrhrwLXcA2Ha/joWklbo/Acjwm4AaW7zozn/zgOh0Z76:fklbsqmyWnoz/P
                                  MD5:CE0155405EA902797E88B92A78443AEB
                                  SHA1:8ADFF69050D14A57D7F553CA8978439AF188C192
                                  SHA-256:789C3C45EDA1749BD939F4A96616E1E9EF1B7DCC62A2889F65088954C64D0938
                                  SHA-512:3FDE09067F9CA8D315DE07C8DB972F99723EA4C3F997DC58210F9D6565CAA9935C79F13E8B2D20ADC5609919A381E4C2A90A0B3123A35947997229D7C615E162
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......e.'r!.I!!.I!!.I!w.Z!*.I!!.I!\.I!Rich!.I!........PE..L....!.6...........#.................)... ........0_............................. ..>................................................0...3...................p...... #............................................... ...............................text...q.... ....... .............. ..`.data....X.......P..................@....rsrc....3...0...@... ..............@..@.reloc.......p... ...`..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):17920
                                  Entropy (8bit):4.083884450202126
                                  Encrypted:false
                                  SSDEEP:384:cogoEvM/uFrR+X6QNn1pcJIrWocDGWct:cogoEvM0rgqQNn3
                                  MD5:1B02577F0ADDEA32EB02A50D4A4CDD1E
                                  SHA1:36F701CCEC78A5D218FEA23FD05351890F14CF7D
                                  SHA-256:6EA525BFACE5467C1045C3708F339A4B92A3A273F70656E061C7F7322C56D667
                                  SHA-512:87FD4AA5158D09EB97B6131E651DB2A4761546907A960AF7792F8E95947C0A825E84F88ECCF42EC896FF5BB2BBC461488B898D5F1BD853847317493C44B330C9
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......eU!.!4O.!4O.!4O.!4O. 4O.Rich!4O.................PE..L....!.6...........!.........D...............................................p...........................................................@...................`.......................................................................................rsrc....@.......B..................@..@.reloc.......`.......D..............@..B.............!.6............ .......8........!.6............P........!.6............h........!.6.....................!.6....................@:...........J................T.Y.P.E.L.I.B.MSFT................A...........*................................... ...................d.......,...........X....... ...........L...........x.......@...........l.......4...........`.......(...........T...................H...........t.......<...............h...........................................L...P.......
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Microsoft Access database engine 2010 (English), Author: Microsoft Corporation, Keywords: Installer, MSI, Database, Release, Comments: This Installer database contains the logic and data required to install Microsoft Access database engine 2010 (English)., Template: Intel;1033, Revision Number: {77770536-28B1-4201-9170-6888BD5ECA8B}, Create Time/Date: Tue Mar 30 18:57:52 2010, Last Saved Time/Date: Tue Mar 30 18:57:52 2010, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.0.5419.0), Security: 2
                                  Category:dropped
                                  Size (bytes):26955264
                                  Entropy (8bit):7.98061375564031
                                  Encrypted:false
                                  SSDEEP:393216:U7eMGC/bhyNg7yvMGspeO0+5DropJhgubzgdwg+y/2QwU1tOPFd+v7NWBee:gIEZ4/wuQdwQ2/U1AP3sUV
                                  MD5:0B1097F4B29B3D3C81616438ABCA91CB
                                  SHA1:20732ECDACCDE9B15555BBE931F23A8D16139214
                                  SHA-256:AA107293DAA835BEE98AB540B06536104D761E796E1AF24F0B94E7050AD9A1AF
                                  SHA-512:6ED7C2FF0AD6818DA7AD9ADB4F4B696F640265AA89B5D77573279F87AB511DB4C130E9B6AC9661D1524B2106B00F5C5CDCEAC553CD7F6485D3B3CAA5F6FB8357
                                  Malicious:false
                                  Reputation:low
                                  Preview:......................>............................................6....................................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5...6..........y................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Microsoft Access database engine 2010 (English), Author: Microsoft Corporation, Keywords: Installer, MSI, Database, Release, Comments: This Installer database contains the logic and data required to install Microsoft Access database engine 2010 (English)., Template: Intel;1033, Revision Number: {77770536-28B1-4201-9170-6888BD5ECA8B}, Create Time/Date: Tue Mar 30 18:57:52 2010, Last Saved Time/Date: Tue Mar 30 18:57:52 2010, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML (3.0.5419.0), Security: 2
                                  Category:dropped
                                  Size (bytes):26955264
                                  Entropy (8bit):7.98061375564031
                                  Encrypted:false
                                  SSDEEP:393216:U7eMGC/bhyNg7yvMGspeO0+5DropJhgubzgdwg+y/2QwU1tOPFd+v7NWBee:gIEZ4/wuQdwQ2/U1AP3sUV
                                  MD5:0B1097F4B29B3D3C81616438ABCA91CB
                                  SHA1:20732ECDACCDE9B15555BBE931F23A8D16139214
                                  SHA-256:AA107293DAA835BEE98AB540B06536104D761E796E1AF24F0B94E7050AD9A1AF
                                  SHA-512:6ED7C2FF0AD6818DA7AD9ADB4F4B696F640265AA89B5D77573279F87AB511DB4C130E9B6AC9661D1524B2106B00F5C5CDCEAC553CD7F6485D3B3CAA5F6FB8357
                                  Malicious:false
                                  Reputation:low
                                  Preview:......................>............................................6....................................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5...6..........y................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: Cable Label Tool 1.0, Comments: ENG, Keywords: Installer,MSI,Database, Subject: Cable Label Tool 1.0, Author: Brother Industries, Ltd., Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2011 - Premier Edition 17, Last Saved Time/Date: Wed Apr 25 15:13:25 2018, Create Time/Date: Wed Apr 25 15:13:25 2018, Last Printed: Wed Apr 25 15:13:25 2018, Revision Number: {359EA332-970F-4A7E-BDB3-23381B02ECBF}, Code page: 1252, Template: Intel;1033
                                  Category:dropped
                                  Size (bytes):41839616
                                  Entropy (8bit):7.973469488021884
                                  Encrypted:false
                                  SSDEEP:786432:hJ0tD7MHWUcim3o9cuRP6TVnlP09obwW3Ap2jGITWIlYtHQBvxr5Tib5vv:hJ0tD7MHMroSuRWnGCBQQjGT2YIvxlk
                                  MD5:EAD26D65A4586D5291A052C0A5582464
                                  SHA1:97BDDEF16FF708128E977F9D5B30D33F0D769A40
                                  SHA-256:E8013C9B6C4D56C34500B93D97358622E365DCB28A63F883F9229B2570BC3D9F
                                  SHA-512:5BC6A71D81D84FDAB5201D0DD1E2F19C2FD83B57E9B8C0D3C2453B1E2B11BE8D274237E4805F299C14A905CB0195DC901875DBDFF3A729CEC4F86C0D49FD6A55
                                  Malicious:false
                                  Reputation:low
                                  Preview:......................>...................................8........6....................................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5...6..........;...............................................................................................................1... ...!..."...#...$...'...&...K...(.......*...+...,...-......./...0...%...2...3...4...5...6...7...>...M...:...<.......=.......?...@...A...B...C...D...E...F...G...H...I...J...N...L...f.......O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...h...g.......i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: Cable Label Tool 1.0, Comments: ENG, Keywords: Installer,MSI,Database, Subject: Cable Label Tool 1.0, Author: Brother Industries, Ltd., Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2011 - Premier Edition 17, Last Saved Time/Date: Wed Apr 25 15:13:25 2018, Create Time/Date: Wed Apr 25 15:13:25 2018, Last Printed: Wed Apr 25 15:13:25 2018, Revision Number: {359EA332-970F-4A7E-BDB3-23381B02ECBF}, Code page: 1252, Template: Intel;1033
                                  Category:dropped
                                  Size (bytes):41839616
                                  Entropy (8bit):7.973469488021884
                                  Encrypted:false
                                  SSDEEP:786432:hJ0tD7MHWUcim3o9cuRP6TVnlP09obwW3Ap2jGITWIlYtHQBvxr5Tib5vv:hJ0tD7MHMroSuRWnGCBQQjGT2YIvxlk
                                  MD5:EAD26D65A4586D5291A052C0A5582464
                                  SHA1:97BDDEF16FF708128E977F9D5B30D33F0D769A40
                                  SHA-256:E8013C9B6C4D56C34500B93D97358622E365DCB28A63F883F9229B2570BC3D9F
                                  SHA-512:5BC6A71D81D84FDAB5201D0DD1E2F19C2FD83B57E9B8C0D3C2453B1E2B11BE8D274237E4805F299C14A905CB0195DC901875DBDFF3A729CEC4F86C0D49FD6A55
                                  Malicious:false
                                  Reputation:low
                                  Preview:......................>...................................8........6....................................................................................................................................................................................................................................................................... ... ...!...!..."..."...#...#...$...$...%...%...&...&...'...'...(...(...)...)...*...*...+...+...,...,...-...-.........../.../...0...0...1...1...2...2...3...3...4...4...5...5...6..........;...............................................................................................................1... ...!..."...#...$...'...&...K...(.......*...+...,...-......./...0...%...2...3...4...5...6...7...>...M...:...<.......=.......?...@...A...B...C...D...E...F...G...H...I...J...N...L...f.......O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...h...g.......i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):263568
                                  Entropy (8bit):6.597474158645916
                                  Encrypted:false
                                  SSDEEP:6144:GHp/r0YSOJ0K5q0+S2M1evzug/xHvo6+A7sm:GHp/rrS60KIRpkyzumxHYXm
                                  MD5:D1F5CE6B23351677E54A245F46A9F8D2
                                  SHA1:0D5C6749401248284767F16DF92B726E727718CA
                                  SHA-256:57CB8F01CF553C3886760180D1A74839F2F676640115504485ACA9692F577ACC
                                  SHA-512:960E90894E7BEDCC89894E77E57E8EE0C99DD2C530D02665E8BBD3A1793ECCC1E295C5923D1F37C757FA1158097FBAAE70898C16052882D3D210C29EA801B3BA
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........gK..4K..4K..4U.^4L..4B.O4\..4B.Y4..4lQ.4I..4lQ.4R..4K..4m..4B.H4J..4B.N4J..4B.^4&..4B.K4J..4RichK..4................PE..L.....K...........!................oJ.............A.........................P............@.........................<...|...\................................ ..."..(...8...............................@.......................`....................text............................... ..`.data....W..........................@....rsrc...............................@..@.reloc..."... ...$..................@..B........................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):28672
                                  Entropy (8bit):3.741623752383387
                                  Encrypted:false
                                  SSDEEP:192:XOdG/6G4nnykxsdYZ+mrv2ySzLUHypLGgjuXFw5acHKBNtHjhuHWrkA9uBP1WWzT:P6GuZBrvkzAHyxxHKBdaA2dWWzm0ZH
                                  MD5:85221B3BCBA8DBE4B4A46581AA49F760
                                  SHA1:746645C92594BFC739F77812D67CFD85F4B92474
                                  SHA-256:F6E34A4550E499346F5AB1D245508F16BF765FF24C4988984B89E049CA55737F
                                  SHA-512:060E35C4DE14A03A2CDA313F968E372291866CC4ACD59977D7A48AC3745494ABC54DF83FFF63CF30BE4E10FF69A3B3C8B6C38F43EBD2A8D23D6C86FBEE7BA87D
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........CnuS".&S".&S".&t.}&P".&S".&.".&t.{&X".&t.m&^".&t.z&R".&t.n&R".&t.x&R".&RichS".&........................PE..L...\..C...........!.....@... .......6.......P....@..........................p......I................................B.......=..x............................`......0...............................x...@............................................text....2.......@.................. ..`.data...h....P.......P..............@....reloc..<....`.......`..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):308329
                                  Entropy (8bit):6.200915284555975
                                  Encrypted:false
                                  SSDEEP:6144:OhroH5MhIaO9j14yjSqLBzghDC8Ra23HuySnavx+5Xqp42Rl+iurVnWfVKXlyUT9:F4QC1wfHM7WP
                                  MD5:EBBEA56F5C6413DF1036E90F6347B9C1
                                  SHA1:F7D0B4FBDE523D9FAFEFAC2E6C26BB2684D2E302
                                  SHA-256:68B5194FC5C282A078D4FEBB5545ABFBD9A577EF379F3AF54835AAF83C877116
                                  SHA-512:E8B280CD954B630440143B09538F469982FE1F808000FC2A6565B82C5CEB4E13E28BC8472125DD901379CD9C263E0D97EEBA28E1443722ED56EEF17AC23CF512
                                  Malicious:false
                                  Reputation:low
                                  Preview:...@IXOS.@.....@.tyX.@.....@.....@.....@.....@.....@......&.{90140000-00D1-0409-0000-0000000FF1CE}/.Microsoft Access database engine 2010 (English)..AceRedist.msi.@.....@.....@.....@........&.{77770536-28B1-4201-9170-6888BD5ECA8B}.....@.....@.....@.....@.......@.....@.....@.......@..../.Microsoft Access database engine 2010 (English)......Rollback..Rolling back installation..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{77F30F62-59C5-4A99-A003-700584527465}&.{90140000-00D1-0409-0000-0000000FF1CE}..&.{77F30F62-59C5-4A99-A003-700584527465}...@.....@......&.{B1E84B29-4EAA-4B7A-8718-E1409F3AB3FC}&.{90140000-00D1-0409-0000-0000000FF1CE}..&.{B1E84B29-4EAA-4B7A-8718-E1409F3AB3FC}...@.....@......&.{9C3C4BAE-BDEB-4ADA-9343-8761D1BBA4C2}&.{90140000-00D1-0409-0000-0000000FF1CE}..&.{9C3C4BAE-BDEB-4ADA-9343-8761D1BBA4C2}...@.....@.......@.....@.....@.]....&.{398E906A-826B-48DD-9791-549C649CACE5}
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):152064
                                  Entropy (8bit):6.508790784114524
                                  Encrypted:false
                                  SSDEEP:1536:KJS28uK6Gf6oGFDrJMxiPXzr8iOE6uqR4JjAK3Xf5n4TbTwzx/JQ5jR1bQlWkjWt:wSMtlFCuU4F3tM1wWkaUfHM64kQ+
                                  MD5:33908AA43AC0AAABC06A58D51B1C2CCA
                                  SHA1:0A0D1CE3435ABE2EED635481BAC69E1999031291
                                  SHA-256:4447FAACEFABA8F040822101E2A4103031660DE9139E70ECFF9AA3A89455A783
                                  SHA-512:D5216A53DF9CFBE1A78629C103286EB17042F639149C46B6A1CD76498531AE82AFD265462FBE0BA9BAAFF275FC95C66504804F107C449F3FC5833B1ED9C3DA46
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........e...............V&......V0......................."....V7......V!......V'......V".....Rich....................PE..L...Z.;J...........!.........`......W........0............................................@..........................$...............p..............................................................X4..@............................................text............................... ..`.data....;...0......................@....rsrc........p......................@..@.reloc...............4..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):263568
                                  Entropy (8bit):6.597474158645916
                                  Encrypted:false
                                  SSDEEP:6144:GHp/r0YSOJ0K5q0+S2M1evzug/xHvo6+A7sm:GHp/rrS60KIRpkyzumxHYXm
                                  MD5:D1F5CE6B23351677E54A245F46A9F8D2
                                  SHA1:0D5C6749401248284767F16DF92B726E727718CA
                                  SHA-256:57CB8F01CF553C3886760180D1A74839F2F676640115504485ACA9692F577ACC
                                  SHA-512:960E90894E7BEDCC89894E77E57E8EE0C99DD2C530D02665E8BBD3A1793ECCC1E295C5923D1F37C757FA1158097FBAAE70898C16052882D3D210C29EA801B3BA
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........gK..4K..4K..4U.^4L..4B.O4\..4B.Y4..4lQ.4I..4lQ.4R..4K..4m..4B.H4J..4B.N4J..4B.^4&..4B.K4J..4RichK..4................PE..L.....K...........!................oJ.............A.........................P............@.........................<...|...\................................ ..."..(...8...............................@.......................`....................text............................... ..`.data....W..........................@....rsrc...............................@..@.reloc..."... ...$..................@..B........................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):152064
                                  Entropy (8bit):6.508790784114524
                                  Encrypted:false
                                  SSDEEP:1536:KJS28uK6Gf6oGFDrJMxiPXzr8iOE6uqR4JjAK3Xf5n4TbTwzx/JQ5jR1bQlWkjWt:wSMtlFCuU4F3tM1wWkaUfHM64kQ+
                                  MD5:33908AA43AC0AAABC06A58D51B1C2CCA
                                  SHA1:0A0D1CE3435ABE2EED635481BAC69E1999031291
                                  SHA-256:4447FAACEFABA8F040822101E2A4103031660DE9139E70ECFF9AA3A89455A783
                                  SHA-512:D5216A53DF9CFBE1A78629C103286EB17042F639149C46B6A1CD76498531AE82AFD265462FBE0BA9BAAFF275FC95C66504804F107C449F3FC5833B1ED9C3DA46
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........e...............V&......V0......................."....V7......V!......V'......V".....Rich....................PE..L...Z.;J...........!.........`......W........0............................................@..........................$...............p..............................................................X4..@............................................text............................... ..`.data....;...0......................@....rsrc........p......................@..@.reloc...............4..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):152064
                                  Entropy (8bit):6.508790784114524
                                  Encrypted:false
                                  SSDEEP:1536:KJS28uK6Gf6oGFDrJMxiPXzr8iOE6uqR4JjAK3Xf5n4TbTwzx/JQ5jR1bQlWkjWt:wSMtlFCuU4F3tM1wWkaUfHM64kQ+
                                  MD5:33908AA43AC0AAABC06A58D51B1C2CCA
                                  SHA1:0A0D1CE3435ABE2EED635481BAC69E1999031291
                                  SHA-256:4447FAACEFABA8F040822101E2A4103031660DE9139E70ECFF9AA3A89455A783
                                  SHA-512:D5216A53DF9CFBE1A78629C103286EB17042F639149C46B6A1CD76498531AE82AFD265462FBE0BA9BAAFF275FC95C66504804F107C449F3FC5833B1ED9C3DA46
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........e...............V&......V0......................."....V7......V!......V'......V".....Rich....................PE..L...Z.;J...........!.........`......W........0............................................@..........................$...............p..............................................................X4..@............................................text............................... ..`.data....;...0......................@....rsrc........p......................@..@.reloc...............4..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
                                  Category:dropped
                                  Size (bytes):1322067
                                  Entropy (8bit):7.884042726586148
                                  Encrypted:false
                                  SSDEEP:24576:9/QqSNOOuBZIfDNbGbOQhRzeg0FI7NODzJTcd3+bIZlfhUZPYGkQgo4+b:94qYOOuBCDFcBRzl0FIJ4qckvJUqGkQL
                                  MD5:F4C63154CD75701E34CCCC117A5B63FB
                                  SHA1:93AF85409A16734CA499FA1C88DF50F18397DC87
                                  SHA-256:8437F55765EAAA97960356A9B9928DDC4E4DD91553EFFCEF23A8CAF832EDE8B4
                                  SHA-512:CCA8D19CB42A00D7C59AAA4041B8EDFAEB418288D6CEAD272B85089C64CC140C197AC0356D48EF5660EF1D2D9E843FCBEFD6DB4C6BF1F9F95ED8E1337C8932CB
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........B.r.B.r.B.r.9.~.A.r...|._.r.-.y.A.r...y.A.r.t.x..r.q.W.@.r...n.N.r...k.V.r.B.s.S.r.K..A.r.t.y...r...t.C.r...v.C.r.RichB.r.................PE..L...}=VL...........!.........@.......#.......................................@......R...............................<...[;...!..........4....................0.......................................................................................text...................PEC2MO...... ....rsrc....@.......>.................. ....reloc.......0......................@...........................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
                                  Category:dropped
                                  Size (bytes):1322067
                                  Entropy (8bit):7.884042726586148
                                  Encrypted:false
                                  SSDEEP:24576:9/QqSNOOuBZIfDNbGbOQhRzeg0FI7NODzJTcd3+bIZlfhUZPYGkQgo4+b:94qYOOuBCDFcBRzl0FIJ4qckvJUqGkQL
                                  MD5:F4C63154CD75701E34CCCC117A5B63FB
                                  SHA1:93AF85409A16734CA499FA1C88DF50F18397DC87
                                  SHA-256:8437F55765EAAA97960356A9B9928DDC4E4DD91553EFFCEF23A8CAF832EDE8B4
                                  SHA-512:CCA8D19CB42A00D7C59AAA4041B8EDFAEB418288D6CEAD272B85089C64CC140C197AC0356D48EF5660EF1D2D9E843FCBEFD6DB4C6BF1F9F95ED8E1337C8932CB
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........B.r.B.r.B.r.9.~.A.r...|._.r.-.y.A.r...y.A.r.t.x..r.q.W.@.r...n.N.r...k.V.r.B.s.S.r.K..A.r.t.y...r...t.C.r...v.C.r.RichB.r.................PE..L...}=VL...........!.........@.......#.......................................@......R...............................<...[;...!..........4....................0.......................................................................................text...................PEC2MO...... ....rsrc....@.......>.................. ....reloc.......0......................@...........................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
                                  Category:dropped
                                  Size (bytes):1322067
                                  Entropy (8bit):7.884042726586148
                                  Encrypted:false
                                  SSDEEP:24576:9/QqSNOOuBZIfDNbGbOQhRzeg0FI7NODzJTcd3+bIZlfhUZPYGkQgo4+b:94qYOOuBCDFcBRzl0FIJ4qckvJUqGkQL
                                  MD5:F4C63154CD75701E34CCCC117A5B63FB
                                  SHA1:93AF85409A16734CA499FA1C88DF50F18397DC87
                                  SHA-256:8437F55765EAAA97960356A9B9928DDC4E4DD91553EFFCEF23A8CAF832EDE8B4
                                  SHA-512:CCA8D19CB42A00D7C59AAA4041B8EDFAEB418288D6CEAD272B85089C64CC140C197AC0356D48EF5660EF1D2D9E843FCBEFD6DB4C6BF1F9F95ED8E1337C8932CB
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........B.r.B.r.B.r.9.~.A.r...|._.r.-.y.A.r...y.A.r.t.x..r.q.W.@.r...n.N.r...k.V.r.B.s.S.r.K..A.r.t.y...r...t.C.r...v.C.r.RichB.r.................PE..L...}=VL...........!.........@.......#.......................................@......R...............................<...[;...!..........4....................0.......................................................................................text...................PEC2MO...... ....rsrc....@.......>.................. ....reloc.......0......................@...........................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):5807259
                                  Entropy (8bit):7.575622784086816
                                  Encrypted:false
                                  SSDEEP:98304:cc77Lhoxfl8sqfEcp74NRt4jMlLiDFo5v4qbGkQgaiDFo5v4qbGkQgciDFo5v4q5:LxfEc0t4jMlL8FevLMga8FevLMgc8Fe9
                                  MD5:4D5F531D9E29081F082FCB2A68F8A5E1
                                  SHA1:6BD7201E26D3D2FD359806601A484F31E656FFBF
                                  SHA-256:E738BCDBA3A12F5877730B158843CFC0D682267345B9B57520F8123534D4CF8C
                                  SHA-512:E1CCCE9E228731F0E986BDC37E238A3F181084F1451EA48624A2C3481761E08B182E9090DEFA6BBCE8A49C67A08E4FA59907E198E6842011A6C7DB7710655786
                                  Malicious:false
                                  Reputation:low
                                  Preview:...@IXOS.@.....@.tyX.@.....@.....@.....@.....@.....@......&.{7F623E18-5D3F-4FD9-B8B3-4E7235399AF2}..Brother Cable Label Tool 1.0..CableLabel.msi.@.....@.....@.....@......ARPPRODUCTICON.exe..&.{359EA332-970F-4A7E-BDB3-23381B02ECBF}.....@.....@.....@.....@.......@.....@.....@.......@......Brother Cable Label Tool 1.0......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration...@y....@.....@.]....&.{DC04E706-5A91-4837-A0FD-88119BED0A61}*.C:\Program Files (x86)\Brother\CableLabel\.@.......@.....@.....@......&.{96D06DDA-33B9-4D80-B7AA-2796E4C27891}5.C:\Program Files (x86)\Brother\CableLabel\BroSNMP.dll.@.......@.....@.....@......&.{E1C50958-F328-49E0-9548-C5F117FFADB6}8.C:\Program Files (x86)\Brother\CableLabel\CableLabel.exe.@.......@.....@.....@......&.{436AA520-D40C-48AF-95BF-288F508A1310}5.C:\Program Files (x86)\Brother\CableLabel\ConfigInfo\.@.......@.....@.....@......&.{94A5322B-4C71
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):1637376
                                  Entropy (8bit):6.410830195807195
                                  Encrypted:false
                                  SSDEEP:49152:UOn77C222oxflHiq6sqIaEcp7OxxdosRt4jMl6:Uc77Lhoxfl8sqfEcp74NRt4jMl
                                  MD5:E52FBF76B172E4BF99A5772D196E63A1
                                  SHA1:1198D6D30BDCECAFD56EE2DB37DB17D5D257B2D6
                                  SHA-256:72122127445C706A653D66703C0E0816A1E65CAA4D2B5944D0B4F625E5C8351A
                                  SHA-512:085821FF69E0460E2C92172F758006BC413D71350B1E16D1C1FCCC429C828470BDEB69E8D070B136F4CF9016EBC55D3640E96D85460D093EA47B972A27E33902
                                  Malicious:true
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........C.>.".m.".m.".m.Z9m.".m.Z>m.".m.Z.m.".m.".mp .ms.pm.".ms.sm3".ms.rm.#.m..nm.".m..tm.".m..qm.".mRich.".m........................PE..L...7.!X.............................p............@.........................................................................l~..@.......................................8...............................@............................................text............................... ..`.rdata..............................@..@.data............^..................@....rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
                                  Category:dropped
                                  Size (bytes):1322067
                                  Entropy (8bit):7.884042726586148
                                  Encrypted:false
                                  SSDEEP:24576:9/QqSNOOuBZIfDNbGbOQhRzeg0FI7NODzJTcd3+bIZlfhUZPYGkQgo4+b:94qYOOuBCDFcBRzl0FIJ4qckvJUqGkQL
                                  MD5:F4C63154CD75701E34CCCC117A5B63FB
                                  SHA1:93AF85409A16734CA499FA1C88DF50F18397DC87
                                  SHA-256:8437F55765EAAA97960356A9B9928DDC4E4DD91553EFFCEF23A8CAF832EDE8B4
                                  SHA-512:CCA8D19CB42A00D7C59AAA4041B8EDFAEB418288D6CEAD272B85089C64CC140C197AC0356D48EF5660EF1D2D9E843FCBEFD6DB4C6BF1F9F95ED8E1337C8932CB
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........B.r.B.r.B.r.9.~.A.r...|._.r.-.y.A.r...y.A.r.t.x..r.q.W.@.r...n.N.r...k.V.r.B.s.S.r.K..A.r.t.y...r...t.C.r...v.C.r.RichB.r.................PE..L...}=VL...........!.........@.......#.......................................@......R...............................<...[;...!..........4....................0.......................................................................................text...................PEC2MO...... ....rsrc....@.......>.................. ....reloc.......0......................@...........................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
                                  Category:dropped
                                  Size (bytes):1322067
                                  Entropy (8bit):7.884042726586148
                                  Encrypted:false
                                  SSDEEP:24576:9/QqSNOOuBZIfDNbGbOQhRzeg0FI7NODzJTcd3+bIZlfhUZPYGkQgo4+b:94qYOOuBCDFcBRzl0FIJ4qckvJUqGkQL
                                  MD5:F4C63154CD75701E34CCCC117A5B63FB
                                  SHA1:93AF85409A16734CA499FA1C88DF50F18397DC87
                                  SHA-256:8437F55765EAAA97960356A9B9928DDC4E4DD91553EFFCEF23A8CAF832EDE8B4
                                  SHA-512:CCA8D19CB42A00D7C59AAA4041B8EDFAEB418288D6CEAD272B85089C64CC140C197AC0356D48EF5660EF1D2D9E843FCBEFD6DB4C6BF1F9F95ED8E1337C8932CB
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........B.r.B.r.B.r.9.~.A.r...|._.r.-.y.A.r...y.A.r.t.x..r.q.W.@.r...n.N.r...k.V.r.B.s.S.r.K..A.r.t.y...r...t.C.r...v.C.r.RichB.r.................PE..L...}=VL...........!.........@.......#.......................................@......R...............................<...[;...!..........4....................0.......................................................................................text...................PEC2MO...... ....rsrc....@.......>.................. ....reloc.......0......................@...........................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, PECompact2 compressed
                                  Category:modified
                                  Size (bytes):1322067
                                  Entropy (8bit):7.884042726586148
                                  Encrypted:false
                                  SSDEEP:24576:9/QqSNOOuBZIfDNbGbOQhRzeg0FI7NODzJTcd3+bIZlfhUZPYGkQgo4+b:94qYOOuBCDFcBRzl0FIJ4qckvJUqGkQL
                                  MD5:F4C63154CD75701E34CCCC117A5B63FB
                                  SHA1:93AF85409A16734CA499FA1C88DF50F18397DC87
                                  SHA-256:8437F55765EAAA97960356A9B9928DDC4E4DD91553EFFCEF23A8CAF832EDE8B4
                                  SHA-512:CCA8D19CB42A00D7C59AAA4041B8EDFAEB418288D6CEAD272B85089C64CC140C197AC0356D48EF5660EF1D2D9E843FCBEFD6DB4C6BF1F9F95ED8E1337C8932CB
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........B.r.B.r.B.r.9.~.A.r...|._.r.-.y.A.r...y.A.r.t.x..r.q.W.@.r...n.N.r...k.V.r.B.s.S.r.K..A.r.t.y...r...t.C.r...v.C.r.RichB.r.................PE..L...}=VL...........!.........@.......#.......................................@......R...............................<...[;...!..........4....................0.......................................................................................text...................PEC2MO...... ....rsrc....@.......>.................. ....reloc.......0......................@...........................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):20480
                                  Entropy (8bit):1.1639025655543156
                                  Encrypted:false
                                  SSDEEP:12:JSbX72FjL/iAGiLIlHVRpZh/7777777777777777777777777vDHF9cpzJO8PlK6:J8QI5topHliF
                                  MD5:2CFAC8C4CB2E89EEACCAD58D4629AE7E
                                  SHA1:1AA033B09041184F7E26A333510E62D402875D97
                                  SHA-256:FA044E51BA675A02BD5AE3C2A4EF8F1D8D9A00A2E0542A277FFEA029276782B8
                                  SHA-512:7DF7316B56E8A6A50141FE76BDFC64CFF564EF04C1D2892F65F3B03676EBBD2C7453402A97F9927D7E2A4A329778DA07D524DDAE0FC859D91106B570202C5175
                                  Malicious:false
                                  Reputation:low
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):20480
                                  Entropy (8bit):1.1631648652697675
                                  Encrypted:false
                                  SSDEEP:12:JSbX72Fjtv//iAGiLIlHVRpiBh/7777777777777777777777777vDHFjusp7l0G:JbvSQI5AVWF
                                  MD5:FA85B51C6A4F34247348ACE288334EAF
                                  SHA1:B51F7DBA6811C9C92F569BFFA2F65CA05C9F74A6
                                  SHA-256:6AB5F1011953B946BA487E1283B012E6130CB1D03714AE9DED998FC5360AFCB2
                                  SHA-512:8397015E3E4C9D32D1C4E9A7D24DD7D5BB617B1A5E30665628E581E76C50CCCF0D65C9F46A83386A3EE653EDD4D058D306EF5439EC2E92F2F3F20C6A2A1BDF39
                                  Malicious:false
                                  Reputation:low
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):24576
                                  Entropy (8bit):2.1111993994775093
                                  Encrypted:false
                                  SSDEEP:96:uh31aFTqLjacT2pzO2KwyqocT2pzO2QD1D:M1AcpqpzRKjqrqpzRQV
                                  MD5:BF8134EEB0C72955C9BD109D5817E6CC
                                  SHA1:18A9BA01F93499885669E15F2F26F6B080816E7C
                                  SHA-256:3916C40DF7263D83E54D8CE42339E2CDB5808316B2252C81C317633540CF07D0
                                  SHA-512:EED1ACF4C151C3B61799BBEF21470AFEF53B50E80958AF75279D65C8AAD324CAD473AF6B3F9E664CB68D98C98F29FF2C1D233BC1636C9930F192EDACDADC7C4F
                                  Malicious:false
                                  Reputation:low
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):65536
                                  Entropy (8bit):5.100221202708343
                                  Encrypted:false
                                  SSDEEP:768:oMAyYdTmPJbgqcnDcObWDH+vOiUHdEWkx:o1U81cObWDH+fUHdEWkx
                                  MD5:E629E820D1C9FB27FBD46D57C5E435F1
                                  SHA1:82016E2AE159C04E0A09DB6481F65BD689C737A9
                                  SHA-256:76964E608C29B148817D244A9175618D72AF0D0223A8791827566EDA1BE32B98
                                  SHA-512:E385BAF4C41695AFEAB31A96A15A3B9CB414E4BCC61052D35099531C8EB1132E6BD737B065FFAA1FE901E33B5386AC56ADCF47A9006C2BD0C2ABD73F2F295DEA
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L..."OVL.................@...................P....@.........................................................................4T..(.......de...........................................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc...de.......p..................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):65536
                                  Entropy (8bit):5.100221202708343
                                  Encrypted:false
                                  SSDEEP:768:oMAyYdTmPJbgqcnDcObWDH+vOiUHdEWkx:o1U81cObWDH+fUHdEWkx
                                  MD5:E629E820D1C9FB27FBD46D57C5E435F1
                                  SHA1:82016E2AE159C04E0A09DB6481F65BD689C737A9
                                  SHA-256:76964E608C29B148817D244A9175618D72AF0D0223A8791827566EDA1BE32B98
                                  SHA-512:E385BAF4C41695AFEAB31A96A15A3B9CB414E4BCC61052D35099531C8EB1132E6BD737B065FFAA1FE901E33B5386AC56ADCF47A9006C2BD0C2ABD73F2F295DEA
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............C...C...C...C...CD..C...C...C...C=..C...C...C...C...C...CRich...C........................PE..L..."OVL.................@...................P....@.........................................................................4T..(.......de...........................................................................P...............................text....5.......@.................. ..`.rdata.......P.......P..............@..@.data....)...`...0...`..............@....rsrc...de.......p..................@..@................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):364484
                                  Entropy (8bit):5.365503733834773
                                  Encrypted:false
                                  SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26KgauL:zTtbmkExhMJCIpEI
                                  MD5:96180EAE3FAA039B73EFB95CDDDDA14C
                                  SHA1:53C58C158989A6C6EDD1A057ABAAE61E0BF49EC7
                                  SHA-256:7A9F73B93E927E6C7FAA6042D70D29C63BEDAB5A136B2743E99340895D0379C0
                                  SHA-512:5AACCEF511950199B7931452C4EAEA1441696189CB93A952417F8C23AF921ABF52D134ED1EF8D654B4C1DBFC3B9D42830C2DB34026726A893B88DDBA51E307D4
                                  Malicious:false
                                  Reputation:low
                                  Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                  Process:C:\Windows\System32\svchost.exe
                                  File Type:JSON data
                                  Category:dropped
                                  Size (bytes):55
                                  Entropy (8bit):4.306461250274409
                                  Encrypted:false
                                  SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                  MD5:DCA83F08D448911A14C22EBCACC5AD57
                                  SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                  SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                  SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                  Malicious:false
                                  Reputation:low
                                  Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):875472
                                  Entropy (8bit):6.9224404430053434
                                  Encrypted:false
                                  SSDEEP:12288:TmCyHcMpK7QdgD+9Tr8r3FmJciMgLFWkA8qTWu+FVlofpJCjNdr12iqwZeq:TmCyHNIQdTryVmCipIkqTWu+Fr
                                  MD5:4BA25D2CBE1587A841DCFB8C8C4A6EA6
                                  SHA1:52693D4B5E0B55A929099B680348C3932F2C3C62
                                  SHA-256:B30160E759115E24425B9BCDF606EF6EBCE4657487525EDE7F1AC40B90FF7E49
                                  SHA-512:82E86EC67A5C6CDDF2230872F66560F4B0C3E4C1BB672507BBB8446A8D6F62512CBD0475FE23B619DB3A67BB870F4F742761CF1F87D50DB7F14076F54006F6C6
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x._'<.1t<.1t<.1t<.0t..1t...t?.1t.+.t..1t.+.t].1t.+.t..1t.+.t..1t.+.t=.1t.+.t=.1t.+.t=.1tRich<.1t................PE..L......P.........."!.....`..........<........@...............................`......l9....@.........................`...........(........................=.......S..0n..8...........................0...@............................................text....^.......`.................. ..`.data....\...p...N...d..............@....idata..............................@....rsrc...............................@..@.reloc...S.......T..................@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):252400
                                  Entropy (8bit):6.495493954251028
                                  Encrypted:false
                                  SSDEEP:6144:/LNmQfmriZ5UUvs5UdeTC2tmku/iCikka/+MMB6V1aFW9+ex/DnI:/LhmTC2tmku/iCikka/+MMB6P9+oT
                                  MD5:C5C2295981EEDEFF9924889A7F084CC2
                                  SHA1:6A77860E26B7A14F60DA2957EBCD2848C5CAA00C
                                  SHA-256:0F4A9F6976C0B7FB34E362CC5220B70DA32D3420771FBFCAC70981DA3B505D08
                                  SHA-512:ACE879BE15BF129C286B8F984A96368A0321E6689A4EC743476B58C6DFAA34AA7595F34085F327992A5A24AC424DCB492FBF9A51251FFB5E84353FB426F351DC
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........\.8.=.k.=.k.=.k.E;k.=.k..ck.=.k..ek.=.k..fk.=.k..gk.=.k.=.k.=.k.J.k.=.k..{k.=.k..bk.=.k..ak.=.k..dk.=.kRich.=.k................PE..L...s..P.........."!.................-....................................................@.........................`|..I;...@.......`...................=...p..|R..@...................................@............B...............................text............................... ..`.data...0p.......n..................@....idata.......@......................@..@minATL.......P.......*..............@..@.rsrc........`.......,..............@..@.reloc..bk...p...l...0..............@..B................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Reputation:low
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):24576
                                  Entropy (8bit):2.1111993994775093
                                  Encrypted:false
                                  SSDEEP:96:uh31aFTqLjacT2pzO2KwyqocT2pzO2QD1D:M1AcpqpzRKjqrqpzRQV
                                  MD5:BF8134EEB0C72955C9BD109D5817E6CC
                                  SHA1:18A9BA01F93499885669E15F2F26F6B080816E7C
                                  SHA-256:3916C40DF7263D83E54D8CE42339E2CDB5808316B2252C81C317633540CF07D0
                                  SHA-512:EED1ACF4C151C3B61799BBEF21470AFEF53B50E80958AF75279D65C8AAD324CAD473AF6B3F9E664CB68D98C98F29FF2C1D233BC1636C9930F192EDACDADC7C4F
                                  Malicious:false
                                  Reputation:low
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):49152
                                  Entropy (8bit):1.3678125909175405
                                  Encrypted:false
                                  SSDEEP:96:pvHI4T58fUwLjacT2pzO2KwyqocT2pzO2QD1D:dHI49wpqpzRKjqrqpzRQV
                                  MD5:C4E44C979240D37330088765B7647F6B
                                  SHA1:E2588775EA3B251E091BEDF89BE79E75C93D3846
                                  SHA-256:8BC8A2E2A62517F0994FE91C346D78935C84D20316C08CB199C0B08802178D39
                                  SHA-512:3355EABC4B963438B2D22B4DD0F4EFA74A05BBE25A59D14BC1BAFE3FF6C98687F90123E8E6BCF753EE9F13F3A210489E11EF43B33579186EA8187BABD58C0921
                                  Malicious:false
                                  Reputation:low
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):24576
                                  Entropy (8bit):2.1111993994775093
                                  Encrypted:false
                                  SSDEEP:96:uh31aFTqLjacT2pzO2KwyqocT2pzO2QD1D:M1AcpqpzRKjqrqpzRQV
                                  MD5:BF8134EEB0C72955C9BD109D5817E6CC
                                  SHA1:18A9BA01F93499885669E15F2F26F6B080816E7C
                                  SHA-256:3916C40DF7263D83E54D8CE42339E2CDB5808316B2252C81C317633540CF07D0
                                  SHA-512:EED1ACF4C151C3B61799BBEF21470AFEF53B50E80958AF75279D65C8AAD324CAD473AF6B3F9E664CB68D98C98F29FF2C1D233BC1636C9930F192EDACDADC7C4F
                                  Malicious:false
                                  Reputation:low
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):49152
                                  Entropy (8bit):1.3678125909175405
                                  Encrypted:false
                                  SSDEEP:96:pvHI4T58fUwLjacT2pzO2KwyqocT2pzO2QD1D:dHI49wpqpzRKjqrqpzRQV
                                  MD5:C4E44C979240D37330088765B7647F6B
                                  SHA1:E2588775EA3B251E091BEDF89BE79E75C93D3846
                                  SHA-256:8BC8A2E2A62517F0994FE91C346D78935C84D20316C08CB199C0B08802178D39
                                  SHA-512:3355EABC4B963438B2D22B4DD0F4EFA74A05BBE25A59D14BC1BAFE3FF6C98687F90123E8E6BCF753EE9F13F3A210489E11EF43B33579186EA8187BABD58C0921
                                  Malicious:false
                                  Reputation:low
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Reputation:low
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):73728
                                  Entropy (8bit):0.424797955397549
                                  Encrypted:false
                                  SSDEEP:48:sDVbDg5SBm07d4dgXdadHOdlYrgPb20c3d9xz0c3d9G20c3d9JYS87d4dgXdadHz:sDBDsqocT2pzO26acT2pzO2KwuX
                                  MD5:E8A07A9AD53B770C422B834AE425B8E7
                                  SHA1:3370D41B56373FD7AE583FB788D3650149DB76E4
                                  SHA-256:A891EDAE3DA456EF31AAF3EF318A27FCF6F9D09B59808F3A9072912AC956761C
                                  SHA-512:A1B44A28B93BF025941C9583ED71D61611CC1CCE8C3FA34B4082EA07008FF0D0AFF1E4AB4A54E93EEE44EBB6A0F3A90CB1BF9D9C5956A58C556F6E734BDFF5EA
                                  Malicious:false
                                  Reputation:low
                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):32768
                                  Entropy (8bit):1.2516714836230687
                                  Encrypted:false
                                  SSDEEP:48:T49ujrhLFXJdT5gCtdBT1GEX4AdCCS5s1FAdCCSIBXT1G:09+FTaChJGELYlJG
                                  MD5:EFC801C545DAAD4BF4C63C7FC9958204
                                  SHA1:1A4FB3F276A41D2570F638A69955DB52F3E9C8F5
                                  SHA-256:EB989DB585E3D2711E879E57229EA0046854ED16258E091EC33C2AE2FFE1C81F
                                  SHA-512:63CFA5CCB1501E95E8B0768B1D89677553CA571D56C5F5161FA9AE55A2C31E0523E6109A12880F69159BE2D834A9748C2F2C1255B738D22306E05DA047A61532
                                  Malicious:false
                                  Reputation:low
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Reputation:low
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):20480
                                  Entropy (8bit):1.5622556487410604
                                  Encrypted:false
                                  SSDEEP:48:18PhFuRc06WXJKjT5dtdBT1GEX4AdCCS5s1FAdCCSIBXT1G:YhF1BjTThJGELYlJG
                                  MD5:B9E48D749861FB720501D617B0982F4F
                                  SHA1:F834828DB19DD7C0D681D52B129474E7E5F06BA4
                                  SHA-256:BC1814D2AD4D65EDFF36E03DEC3A31DB834BABDCDE06008FA9B0C67E482B21AD
                                  SHA-512:7A56BC8FD6AD4CF0EF35E5AA121E03F5661DFCFD3AEE21D10F40065A3A0DA154C27E4872EED1DF230161D2E7C211125469C384DD62AE5D0C5EE6F4A5B8C3C05F
                                  Malicious:false
                                  Reputation:low
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Reputation:low
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Reputation:low
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):32768
                                  Entropy (8bit):0.0708936639175064
                                  Encrypted:false
                                  SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOj4A+9Vv1xLTlztiVky6l7:2F0i8n0itFzDHFjulb7
                                  MD5:A01D6CE2CA67B815BF6B7CDBF6EC1321
                                  SHA1:5B661ECA51DB7C5D92C5ABEFB2BD571CF94AB719
                                  SHA-256:F56E208323DCD183C5D5F9A03ECDE461CC412F883C78D6251F76C7E0C6780E99
                                  SHA-512:B5224522A75682FD4C97F1F6714F54E9A5A9D52AC1C3E1F6BD0284EDA448844D8502FA35450DD09EFD2113638D3193881C8DB670FB1D8A5541AC7173FCB1F2F2
                                  Malicious:false
                                  Reputation:low
                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Reputation:low
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):32768
                                  Entropy (8bit):1.2516714836230687
                                  Encrypted:false
                                  SSDEEP:48:T49ujrhLFXJdT5gCtdBT1GEX4AdCCS5s1FAdCCSIBXT1G:09+FTaChJGELYlJG
                                  MD5:EFC801C545DAAD4BF4C63C7FC9958204
                                  SHA1:1A4FB3F276A41D2570F638A69955DB52F3E9C8F5
                                  SHA-256:EB989DB585E3D2711E879E57229EA0046854ED16258E091EC33C2AE2FFE1C81F
                                  SHA-512:63CFA5CCB1501E95E8B0768B1D89677553CA571D56C5F5161FA9AE55A2C31E0523E6109A12880F69159BE2D834A9748C2F2C1255B738D22306E05DA047A61532
                                  Malicious:false
                                  Reputation:low
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):32768
                                  Entropy (8bit):0.07116663392270035
                                  Encrypted:false
                                  SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKO9cpzJp08SGBXhgVky6lit/:2F0i8n0itFzDHF9cpzJO8Pldit/
                                  MD5:BFB22634A9718AFFF0941ED0B90AFA12
                                  SHA1:DC55D8690F44AA3FA628161F6C22127F9488DC30
                                  SHA-256:876F1561427EDA19C5F771C0B894128F42C8F6EB02C477BAE2CF683256230CA1
                                  SHA-512:CE0F3D122C8F05FB2C8EC0F539094E3758FE1C4568D1ACC6C739CCA4C1A2389C40C16E422C67316F5D36750A0E9472F6D9D644A7AC2DBAE393C25236BF669902
                                  Malicious:false
                                  Reputation:low
                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Reputation:low
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):73728
                                  Entropy (8bit):0.13611951770354214
                                  Encrypted:false
                                  SSDEEP:24:0AWPvdG2jlj0tdWmgdCCipVodWmgdCCipV7Vm+gNlGwYpFm+ALAWPvdGzdSXQ:0T1G2BiAdCCSoAdCCS5s1omJT1Gzdd
                                  MD5:48E37CBB8699596EFBDAF34C8E7A2CD3
                                  SHA1:A455EEDA5385AE7119105CC33CA02B979DC80128
                                  SHA-256:EBDCCFEA14BD4EFDFD6C5768E7D4065567A49E7A969BC9A5BC52D09FA0BC641F
                                  SHA-512:6E90710A8ED496404D9CDD83380D3BF5F8C205201879AAD492DF22CFAC6AFB1904EBC9152A9293C197DA6F20C77E7CB2FA19857179AA9DE2B30E081C23FC0C7C
                                  Malicious:false
                                  Reputation:low
                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):49152
                                  Entropy (8bit):1.3678125909175405
                                  Encrypted:false
                                  SSDEEP:96:pvHI4T58fUwLjacT2pzO2KwyqocT2pzO2QD1D:dHI49wpqpzRKjqrqpzRQV
                                  MD5:C4E44C979240D37330088765B7647F6B
                                  SHA1:E2588775EA3B251E091BEDF89BE79E75C93D3846
                                  SHA-256:8BC8A2E2A62517F0994FE91C346D78935C84D20316C08CB199C0B08802178D39
                                  SHA-512:3355EABC4B963438B2D22B4DD0F4EFA74A05BBE25A59D14BC1BAFE3FF6C98687F90123E8E6BCF753EE9F13F3A210489E11EF43B33579186EA8187BABD58C0921
                                  Malicious:false
                                  Reputation:low
                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Reputation:low
                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):225280
                                  Entropy (8bit):6.034450906226583
                                  Encrypted:false
                                  SSDEEP:3072:P5wveocziNzMLSMOYscmuW0AXLiLR4JpA86Goao1vJU87/amFYw8fF01OyAILH:hwyOMqcp3AXOLR4JpL6ft3/amiX2OyX
                                  MD5:67BDB40FBE6CECC320507161B58D134A
                                  SHA1:11EC8313BA20E96A0F776A018586CC127A451E16
                                  SHA-256:A15EAABBE6C32FBA34C1CACD8C0F206C28A69A8B73E619C962D812AE7FA0F844
                                  SHA-512:687289C5740E5316ABDAEC56BBB6C0A629FC1F374B865A61F71AE3561738B42D3C31987E53ED0DBAED0AEFD357824303B0DD7527BAA81FEE2434A4BCDEC6433D
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;...h...h...h..ah...h1.dh...h..gh...h...h...h.-.h...h...h...h..qh...h..vh...h..`h...h..fh...h..ch...hRich...h........................PE..L....LYJ...........!.....:..........Z........P....?x.........................0............@......................... 3..4....&..d...............................d...P...............................H...@...............(...........p...H............text...T9.......:.................. ..`.data........P.......>..............@....rsrc................H..............@..@.reloc...#.......$...L..............@..B........................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):569664
                                  Entropy (8bit):6.521726174641651
                                  Encrypted:false
                                  SSDEEP:12288:iZ/veMyZ137mSEWT0VkypLvgLehUgiW6QR7t5183Ooc8SHkC2eU8bw:iZSZ13iwJmgLq83Ooc8SHkC2efw
                                  MD5:B2EEE3DEE31F50E082E9C720A6D7757D
                                  SHA1:3322840FEF43C92FB55DC31E682D19970DAF159D
                                  SHA-256:4608BEEDD8CF9C3FC5AB03716B4AB6F01C7B7D65A7C072AF04F514FFB0E02D01
                                  SHA-512:8B1854E80045001E7AB3A978FB4AA1DE19A3C9FC206013D7BC43AEC919F45E46BB7555F667D9F7D7833AB8BAA55C9098AF8872006FF277FC364A5E6F99EE25D3
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........#%..Mv..Mv..Mv.66v..Mv...v..Mv..Lv:.Mv...v..Mv...v..Mv...v..Mv...v..Mv...v..Mv...v..Mv...v..MvRich..Mv........................PE..L...~LYJ...........!.....4...p..............P....Hx......................................@..........................P..,....E..<.......................@.......43...................................%..@............................................text....2.......4.................. ..`.data...t'...P.......8..............@....rsrc................R..............@..@.reloc..HC.......D...V..............@..B................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):653120
                                  Entropy (8bit):6.883968356674239
                                  Encrypted:false
                                  SSDEEP:12288:shr4UC+UumMaIYE8EoPP1cI9xPP2OKDL9QXyG2pUmRyyvRt:cU9FNPPbxPP2OeL9Q2pUmRyyvRt
                                  MD5:7538050656FE5D63CB4B80349DD1CFE3
                                  SHA1:F825C40FEE87CC9952A61C8C34E9F6EEE8DA742D
                                  SHA-256:E16BC9B66642151DE612EE045C2810CA6146975015BD9679A354567F56DA2099
                                  SHA-512:843E22630254D222DFD12166C701F6CD1DCA4A8DC216C7A8C9C0AB1AFC90189CFA8B6499BBC46408008A1D985394EB8A660B1FA1991059A65C09E8D6481A3AF8
                                  Malicious:false
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..................6.........!.R...7.....&.....0.....6.....3...Rich..........PE..L...yLYJ...........!.....\..........@-.......p....Rx.........................0............@..............................|..P...(.......................@........3......................................@............................................text...t[.......\.................. ..`.data....g...p...D...`..............@....rsrc...............................@..@.reloc...7.......8..................@..B................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7473
                                  Entropy (8bit):7.340614348720467
                                  Encrypted:false
                                  SSDEEP:192:kh0ifIJ2hEi1HnNpBjSebyaAqjkKiTbmr3TSc2Q:ky3eHNpBjTeajCynn
                                  MD5:BDDF54672A53F5DEA80F8202CD39C481
                                  SHA1:207C39103155AA3B6A7AF25B3E4A91AEB82898CB
                                  SHA-256:2717A5A51CFA1F0371B9FBB344D79554B0EFA3A6FF94DA3DC6664F7AF13C5048
                                  SHA-512:DD4A4F2FD470235602BA0645AAEFCB9664B41FFE228C654D94779164C095E828C69FCB74B0B70442C79DD2AAC6072FC295224DC8507EFAA37DF64EC5C5633BDD
                                  Malicious:false
                                  Reputation:low
                                  Preview:0..-..*.H..........0......1.0...+......0..u..+.....7.....f0..b0...+.....7......J...o8I......c..090712070759Z0...+.....7.....0...0....RD.8.B.A.8.1.E.D.6.5.8.6.8.2.5.8.3.5.B.7.6.E.9.D.5.6.6.0.7.7.4.6.6.E.E.4.1.A.8.5...1..0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........e..X5.n.V`wFn...0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....M.i.c.r.o.s.o.f.t...V.C.9.0...C.R.T...m.a.n...1..0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........e..X5.n.V`wFn...0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}........0...0..........a........"0...*.H........0y1.0...U....US1.0...U....Washington1.0...U....Redmond1.0...U....Microsoft Corporation1#0!..U....Microsoft Code Signing PCA0...081022223914Z..100122224914Z0..1.0...U....US1.0...U....Washington1.0...U....Redmond1.0...U....Microsoft Corporation1.0...U....MOPR1E0C..U...<Microsoft Develo
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1506), with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1860
                                  Entropy (8bit):5.392371898016726
                                  Encrypted:false
                                  SSDEEP:48:3SlK+vU6g49Pd09kkKKMzEAZ09kkKxrzVHNw09kkK3zY:Clt8CtdXks5ZXk8pNwXkK8
                                  MD5:53213FC8C2CB0D6F77CA6CBD40FFF22C
                                  SHA1:D8BA81ED6586825835B76E9D566077466EE41A85
                                  SHA-256:03D0776812368478CE60E8160EC3C6938782DB1832F5CB53B7842E5840F9DBC5
                                  SHA-512:E3CED32A2EABFD0028EC16E62687573D86C0112B2B1D965F1F9D0BB5557CEF5FDF5233E87FE73BE621A52AFFE4CE53BEDF958558AA899646FA390F4541CF11EB
                                  Malicious:false
                                  Reputation:low
                                  Preview:.<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">.. <noInheritable></noInheritable>.. <assemblyIdentity type="win32" name="Microsoft.VC90.CRT" version="9.0.30729.4148" processorArchitecture="x86" publicKeyToken="1fc8b3b9a1e18e3b"></assemblyIdentity>.. <file name="msvcr90.dll" hashalg="SHA1" hash="98e8006e0a4542e69f1a3555b927758bd76ca07d"><asmv2:hash xmlns:asmv2="urn:schemas-microsoft-com:asm.v2" xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"><dsig:Transforms><dsig:Transform Algorithm="urn:schemas-microsoft-com:HashTransforms.Identity"></dsig:Transform></dsig:Transforms><dsig:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"></dsig:DigestMethod><dsig:DigestValue>+CXED+6HzJlSphyMNOn27ujadC0=</dsig:DigestValue></asmv2:hash></file> <file name="msvcp90.dll" hashalg="SHA1" hash="3aec3be680024a46813dee891a753bd58b3f3b12"><asmv2:hash xmlns:asmv2="urn:schemas-microsoft-com:asm.v2" xmlns:d
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):7522
                                  Entropy (8bit):7.328101670485594
                                  Encrypted:false
                                  SSDEEP:192:iZ3fIJ2hEi1HnNpBjSebyaAqjkKiTbGpTcf:uQeHNpBjTeajC48
                                  MD5:F4F36BE5F6F26473AE2916D3614E04D0
                                  SHA1:CC81719FE7AC6BF72E2413206C6CAE4857CE4B9A
                                  SHA-256:44D63039DADFDE315555A2E4773153AB795AB46F254F7A21A8B3B6A29F71EE20
                                  SHA-512:27B5296422EC11639C8CF261C7B1057DB2FB5BB9E7771F4D3947D3742761C8634D1A7AC2DE2462A47CC4C4873422F406A046E4475A6A4DF97FA0FE270D95B0B2
                                  Malicious:false
                                  Reputation:low
                                  Preview:0..^..*.H.........O0..K...1.0...+......0.....+.....7......0..{0...+.....7.....t..n.. E........090712023807Z0...+.....7.....0..80....R5.E.3.9.1.7.8.6.7.3.0.5.F.D.B.F.0.7.D.9.3.0.1.B.D.4.6.3.2.F.8.6.2.E.2.6.8.0.7.2...1..0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........^9..s.....0..c/..&.r0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....Fp.o.l.i.c.y...9...0.0...M.i.c.r.o.s.o.f.t...V.C.9.0...C.R.T...m.a.n...1..0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........^9..s.....0..c/..&.r0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}........0...0..........a........"0...*.H........0y1.0...U....US1.0...U....Washington1.0...U....Redmond1.0...U....Microsoft Corporation1#0!..U....Microsoft Code Signing PCA0...081022223914Z..100122224914Z0..1.0...U....US1.0...U....Washington1.0...U....Redmond1.0...U....Microsoft Corporation1.0...U....MOPR1E
                                  Process:C:\Windows\System32\msiexec.exe
                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):764
                                  Entropy (8bit):5.318118661435931
                                  Encrypted:false
                                  SSDEEP:12:TMHdtXBFN8uN53SNbMHpaXOr6gVuNnOw53SNK+MHCgVuNnm/6hdSIXOV/FkxqOK3:2dtXD+uXiNbPXU6g4NnOIiNK+zg4NnoP
                                  MD5:8D108E59FDDFA7E845AE8795296EA4FA
                                  SHA1:5E3917867305FDBF07D9301BD4632F862E268072
                                  SHA-256:7EA6ADD145DAF72CCBFD2140C32DA4718039B2B683CCB02B47C8DB142203E461
                                  SHA-512:D93758E1BD6170D5B70653F3C369230F97203CB1E789E6318652EEA128F5B63FFF2FB9CF4D7B16B4938B7856A0A5DB6A365803BA84F32954524E0630E857EE74
                                  Malicious:false
                                  Reputation:low
                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>.. Copyright (c) Microsoft Corporation. All rights reserved. -->..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">...<assemblyIdentity type="win32-policy" name="policy.9.0.Microsoft.VC90.CRT" version="9.0.30729.4148" processorArchitecture="x86" publicKeyToken="1fc8b3b9a1e18e3b"/>...<dependency>....<dependentAssembly>.....<assemblyIdentity type="win32" name="Microsoft.VC90.CRT" processorArchitecture="x86" publicKeyToken="1fc8b3b9a1e18e3b"/>.....<bindingRedirect oldVersion="9.0.20718.0-9.0.21022.8" newVersion="9.0.30729.4148"/>.....<bindingRedirect oldVersion="9.0.30201.0-9.0.30729.4148" newVersion="9.0.30729.4148"/>....</dependentAssembly>...</dependency>..</assembly>..
                                  No static file info
                                  TimestampSource PortDest PortSource IPDest IP
                                  Mar 25, 2024 14:38:58.707535028 CET5130553192.168.2.51.1.1.1
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Mar 25, 2024 14:38:58.707535028 CET192.168.2.51.1.1.10x554dStandard query (0)download.brother.comA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Mar 25, 2024 14:38:58.805140018 CET1.1.1.1192.168.2.50x554dNo error (0)download.brother.comdownload.brother.com.edgekey.netCNAME (Canonical name)IN (0x0001)false

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:14:38:56
                                  Start date:25/03/2024
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://download.brother.com/welcome/dlfp100270/cltw10100a.exe" > cmdline.out 2>&1
                                  Imagebase:0x790000
                                  File size:236'544 bytes
                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:14:38:56
                                  Start date:25/03/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:2
                                  Start time:14:38:56
                                  Start date:25/03/2024
                                  Path:C:\Windows\SysWOW64\wget.exe
                                  Wow64 process (32bit):true
                                  Commandline:wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://download.brother.com/welcome/dlfp100270/cltw10100a.exe"
                                  Imagebase:0x400000
                                  File size:3'895'184 bytes
                                  MD5 hash:3DADB6E2ECE9C4B3E1E322E617658B60
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:5
                                  Start time:14:39:04
                                  Start date:25/03/2024
                                  Path:C:\Users\user\Desktop\download\cltw10100a.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\download\cltw10100a.exe"
                                  Imagebase:0x400000
                                  File size:69'307'352 bytes
                                  MD5 hash:9541E83179ABDD1F0CEBCFEFF94BC9A2
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:false

                                  Target ID:6
                                  Start time:14:39:09
                                  Start date:25/03/2024
                                  Path:C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Local\Temp\pft15B6.tmp\InstallManager\InstallManager.exe" /L:MULT /Model:CableLabelTool
                                  Imagebase:0xc50000
                                  File size:1'874'096 bytes
                                  MD5 hash:CDDFE6FF78C9EF7667321A1EBB9D8F33
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:false

                                  Target ID:8
                                  Start time:14:39:20
                                  Start date:25/03/2024
                                  Path:C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\ADE\US\AccessDatabaseEngine.exe /quiet /passive
                                  Imagebase:0x2de80000
                                  File size:26'809'448 bytes
                                  MD5 hash:77423E9942B09AFD564C307B26D1F4BA
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:9
                                  Start time:14:39:22
                                  Start date:25/03/2024
                                  Path:C:\Windows\System32\msiexec.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\msiexec.exe /V
                                  Imagebase:0x7ff7f6c20000
                                  File size:69'632 bytes
                                  MD5 hash:E5DA170027542E25EDE42FC54C929077
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:false

                                  Target ID:10
                                  Start time:14:39:23
                                  Start date:25/03/2024
                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding EB11130A8E2D63B3F747D23242553FAB
                                  Imagebase:0x400000
                                  File size:59'904 bytes
                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:11
                                  Start time:14:39:30
                                  Start date:25/03/2024
                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding A62CD37A4C11E58DF0BCDEEDF1919238 E Global\MSI0000
                                  Imagebase:0x400000
                                  File size:59'904 bytes
                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:12
                                  Start time:14:39:35
                                  Start date:25/03/2024
                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                  Wow64 process (32bit):true
                                  Commandline:msiexec.exe /i "C:\Users\user\AppData\Local\Temp\pft15B6.tmp\CableLabelTool\CableLabel.msi" USERNAME="hardz" COMPANYNAME="" INSTPATH="C:\Program Files (x86)\Brother" NOCOMPANYNAME=0 SCDESKTOP=1 SCQUICK=1 GGANA=0 /norestart /qn
                                  Imagebase:0x400000
                                  File size:59'904 bytes
                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:13
                                  Start time:14:39:37
                                  Start date:25/03/2024
                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 83F27F5FB60DD41C7AB11B9672B294FA
                                  Imagebase:0x400000
                                  File size:59'904 bytes
                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:14
                                  Start time:14:39:37
                                  Start date:25/03/2024
                                  Path:C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Users\user\AppData\Local\Temp\{30A7D0B3-6AFB-4B04-9B83-26BDADDD6B2C}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3AFEB423-0B54-4B5C-AF4D-A716F5EC019D}
                                  Imagebase:0x140000000
                                  File size:107'392 bytes
                                  MD5 hash:B83D2774CDAF5016CD8765A630FA1150
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:15
                                  Start time:14:39:38
                                  Start date:25/03/2024
                                  Path:C:\Users\user\AppData\Local\Temp\{88126FF3-5FB8-4112-8A6E-8CC3757E4773}\ISBEW64.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Users\user\AppData\Local\Temp\{88126FF3-5FB8-4112-8A6E-8CC3757E4773}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8B431535-90AA-40F3-9655-445ADAB437CB}
                                  Imagebase:0x140000000
                                  File size:107'392 bytes
                                  MD5 hash:B83D2774CDAF5016CD8765A630FA1150
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:16
                                  Start time:14:39:38
                                  Start date:25/03/2024
                                  Path:C:\Users\user\AppData\Local\Temp\{4D3AAFCB-F4A5-4635-B876-40288960575F}\ISBEW64.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Users\user\AppData\Local\Temp\{4D3AAFCB-F4A5-4635-B876-40288960575F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{6BC22D34-1C49-421D-9176-A3AFA0E55D33}
                                  Imagebase:0x140000000
                                  File size:107'392 bytes
                                  MD5 hash:B83D2774CDAF5016CD8765A630FA1150
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:18
                                  Start time:14:39:44
                                  Start date:25/03/2024
                                  Path:C:\Windows\System32\svchost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                  Imagebase:0x7ff7e52b0000
                                  File size:55'320 bytes
                                  MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:false

                                  Target ID:20
                                  Start time:14:39:51
                                  Start date:25/03/2024
                                  Path:C:\Windows\Installer\MSICA89.tmp
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\Installer\MSICA89.tmp" /Commit
                                  Imagebase:0x400000
                                  File size:1'637'376 bytes
                                  MD5 hash:E52FBF76B172E4BF99A5772D196E63A1
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:21
                                  Start time:14:39:51
                                  Start date:25/03/2024
                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding D4A9004CD4BE2ECB65C741789AB02FDC E Global\MSI0000
                                  Imagebase:0x400000
                                  File size:59'904 bytes
                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:22
                                  Start time:14:39:52
                                  Start date:25/03/2024
                                  Path:C:\Users\user\AppData\Local\Temp\{BEB42744-6340-45B8-9F53-1E39881815F3}\ISBEW64.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Users\user\AppData\Local\Temp\{BEB42744-6340-45B8-9F53-1E39881815F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{96E3FD8A-3439-49F5-85BF-4761FA9EF6C3}
                                  Imagebase:0x140000000
                                  File size:107'392 bytes
                                  MD5 hash:B83D2774CDAF5016CD8765A630FA1150
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:23
                                  Start time:14:39:53
                                  Start date:25/03/2024
                                  Path:C:\Users\user\AppData\Local\Temp\{C94AACC5-E97F-46C2-A601-8B973B2BC7F5}\ISBEW64.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Users\user\AppData\Local\Temp\{C94AACC5-E97F-46C2-A601-8B973B2BC7F5}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{34B640B0-E1C5-4E02-93D5-01A751615909}
                                  Imagebase:0x140000000
                                  File size:107'392 bytes
                                  MD5 hash:B83D2774CDAF5016CD8765A630FA1150
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:24
                                  Start time:14:39:53
                                  Start date:25/03/2024
                                  Path:C:\Users\user\AppData\Local\Temp\{17CEC823-4AB4-40C3-B585-B72FBC1A1527}\ISBEW64.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Users\user\AppData\Local\Temp\{17CEC823-4AB4-40C3-B585-B72FBC1A1527}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{AE513F01-59BA-4495-8488-BB8EA735A7AC}
                                  Imagebase:0x140000000
                                  File size:107'392 bytes
                                  MD5 hash:B83D2774CDAF5016CD8765A630FA1150
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Target ID:25
                                  Start time:14:39:57
                                  Start date:25/03/2024
                                  Path:C:\Windows\System32\LogonUI.exe
                                  Wow64 process (32bit):false
                                  Commandline:"LogonUI.exe" /flags:0x4 /state0:0xa3f98855 /state1:0x41c64e6d
                                  Imagebase:0x7ff63a300000
                                  File size:13'824 bytes
                                  MD5 hash:893144FE49AA16124B5BD3034E79BBC6
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:false

                                  Target ID:26
                                  Start time:14:40:57
                                  Start date:25/03/2024
                                  Path:C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exe" -ServerName:WindowsDefaultLockScreen.AppX7y4nbzq37zn4ks9k7amqjywdat7d3j2z.mca
                                  Imagebase:0x7ff604390000
                                  File size:3'596'648 bytes
                                  MD5 hash:DD4966999D7DB48046CE6D12AF1F70F3
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:false

                                  Target ID:29
                                  Start time:14:40:58
                                  Start date:25/03/2024
                                  Path:C:\Windows\System32\svchost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s BthAvctpSvc
                                  Imagebase:0x7ff7e52b0000
                                  File size:55'320 bytes
                                  MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                  Has elevated privileges:true
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:false

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:16.3%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:3.7%
                                    Total number of Nodes:1640
                                    Total number of Limit Nodes:91
                                    execution_graph 9145 401940 9146 401950 9145->9146 9147 401947 9145->9147 9148 40781d ctype 7 API calls 9147->9148 9148->9146 9149 40c940 9150 40c94e 9149->9150 9151 40c952 LCMapStringW 9150->9151 9152 40c906 9150->9152 9151->9152 9153 40c96a WideCharToMultiByte 9151->9153 9153->9152 9428 40d682 SetUnhandledExceptionFilter 9429 408302 9430 408307 9429->9430 9433 40aecb GetModuleHandleA 9430->9433 9432 40830c 9434 40aeda GetProcAddress 9433->9434 9435 40aeea 9433->9435 9434->9435 9435->9432 9436 404f05 9437 404f12 9436->9437 9438 404f23 9436->9438 9439 4035da 9 API calls 9438->9439 9440 404f32 SetDlgItemTextA 9439->9440 9440->9437 9441 402c07 GetParent 9442 402c1f 9441->9442 9447 402c61 9441->9447 9444 402c26 9442->9444 9445 402c4f 9442->9445 9443 402c5c 9444->9443 9451 403863 GetDlgItem 9444->9451 9446 4035da 9 API calls 9445->9446 9446->9443 9447->9443 9448 402c89 PostMessageA PostMessageA 9447->9448 9448->9443 9450 402c38 GetDlgItem EnableWindow 9450->9443 9452 4038a2 9451->9452 9453 403876 GetWindowTextA 9451->9453 9452->9450 9454 403921 20 API calls 9453->9454 9455 403893 9454->9455 9455->9450 9456 402b07 9457 402b17 9456->9457 9464 402ba9 9456->9464 9458 402b51 GetDlgItem SendMessageA 9457->9458 9459 402b1e 9457->9459 9462 402b84 9458->9462 9463 402b7d 9458->9463 9460 402bbf 9459->9460 9461 402b25 GetParent GetDlgItem IsDlgButtonChecked EnableWindow 9459->9461 9461->9460 9467 4035da 9 API calls 9462->9467 9466 403d4d 7 API calls 9463->9466 9464->9460 9465 402bd4 PostMessageA PostMessageA 9464->9465 9465->9460 9466->9462 9468 402b95 CheckRadioButton 9467->9468 9468->9460 9469 40c88c 9470 40c89b 9469->9470 9471 40c8a0 MultiByteToWideChar 9470->9471 9472 40c906 9470->9472 9471->9472 9473 40c8b9 LCMapStringW 9471->9473 9473->9472 9474 40c8d4 9473->9474 9475 40c8da 9474->9475 9477 40c91a 9474->9477 9475->9472 9476 40c8e8 LCMapStringW 9475->9476 9476->9472 9477->9472 9478 40c952 LCMapStringW 9477->9478 9478->9472 9479 40c96a WideCharToMultiByte 9478->9479 9479->9472 7622 406d90 7623 406da9 7622->7623 7624 40730a 7623->7624 7625 406dca 7623->7625 7626 407317 7624->7626 7628 407303 7624->7628 7627 406dd0 7625->7627 7625->7628 7629 407322 7626->7629 7630 407459 7626->7630 7631 406de3 7627->7631 7632 4072bd 7627->7632 7663 406e72 7627->7663 7628->7663 7753 406d1d 7628->7753 7633 407329 7629->7633 7634 4073bb GetDlgItem GetDlgItem GetDlgItem 7629->7634 7635 407464 SetWindowTextA 7630->7635 7636 407469 LoadStringA 7630->7636 7640 40722c 7631->7640 7641 406dec 7631->7641 7632->7663 7720 406a0f BeginPaint SetTextColor SetBkColor SetBkMode MapDialogRect 7632->7720 7642 40732d 7633->7642 7649 4073a0 7633->7649 7637 4073f1 7634->7637 7638 4073f5 ShowWindow 7634->7638 7635->7663 7636->7635 7636->7663 7644 4073fc KiUserCallbackDispatcher 7637->7644 7638->7644 7647 407234 GetSysColorBrush GetClientRect FillRect DeleteObject 7640->7647 7640->7663 7645 406df5 7641->7645 7646 407117 7641->7646 7648 407334 9 API calls 7642->7648 7642->7663 7651 407413 ShowWindow 7644->7651 7652 40740f 7644->7652 7653 406e00 7645->7653 7654 406f73 7645->7654 7650 407124 8 API calls 7646->7650 7646->7663 7655 40726f 6 API calls 7647->7655 7648->7663 7657 4067ad 50 API calls 7649->7657 7649->7663 7751 4076f0 7650->7751 7659 40741c KiUserCallbackDispatcher 7651->7659 7652->7659 7660 406e07 GetWindowLongA 7653->7660 7653->7663 7706 406802 7 API calls 7654->7706 7655->7663 7657->7663 7665 407429 ShowWindow ShowWindow 7659->7665 7666 40743a ShowWindow ShowWindow EnableWindow 7659->7666 7667 406e2a 7660->7667 7668 406f3d SendMessageA 7660->7668 7665->7663 7666->7663 7673 406f21 SendMessageA 7667->7673 7674 406e33 7667->7674 7671 406f60 7668->7671 7672 406ed7 7668->7672 7669 406f79 7709 40678a 7669->7709 7670 4076f0 7676 4071ef TextOutA SetBkMode SetTextColor SelectObject DeleteObject 7670->7676 7677 4062d6 5 API calls 7671->7677 7672->7663 7673->7663 7678 406edc SendMessageA 7674->7678 7679 406e3e 7674->7679 7676->7663 7677->7672 7678->7663 7683 406ef9 7678->7683 7681 406e41 7679->7681 7682 406e94 SendMessageA 7679->7682 7680 406f87 7684 406fa2 GetDlgItem ShowWindow GetDlgItem ShowWindow 7680->7684 7685 406fc4 7680->7685 7681->7663 7687 406e48 SendMessageA 7681->7687 7682->7663 7686 406eb1 7682->7686 7688 406eb7 7683->7688 7698 406eff 7683->7698 7684->7685 7691 406fe0 7685->7691 7692 406fca GetWindowLongA SetWindowLongA 7685->7692 7686->7688 7693 406ec4 7686->7693 7689 406e65 7687->7689 7690 406e76 IsWindow 7687->7690 7747 4067ad 7688->7747 7740 4062d6 7689->7740 7690->7663 7697 406e83 SetFocus 7690->7697 7695 406ff3 15 API calls 7691->7695 7699 4070dc 7691->7699 7692->7691 7702 40678a 50 API calls 7693->7702 7695->7699 7697->7663 7698->7663 7700 40678a 50 API calls 7698->7700 7714 406253 7699->7714 7700->7672 7702->7672 7704 4070f7 7705 40678a 50 API calls 7704->7705 7705->7663 7707 4076f0 7706->7707 7708 4068b6 9 API calls 7707->7708 7708->7669 7710 406797 7709->7710 7711 4067aa 7709->7711 7759 4065e9 GetWindowLongA 7710->7759 7711->7680 7715 406268 GetWindowRect 7714->7715 7716 40625f GetDesktopWindow 7714->7716 7717 4062d3 ShowWindow 7715->7717 7718 40627c GetWindowRect 7715->7718 7716->7715 7717->7704 7718->7717 7719 406289 SetWindowPos 7718->7719 7719->7717 7843 406938 6 API calls 7720->7843 7723 406ab9 CreateCompatibleDC SelectObject 7725 406ae3 SelectPalette RealizePalette SelectPalette RealizePalette 7723->7725 7726 406b09 BitBlt 7723->7726 7724 406b5a 7729 406b78 7724->7729 7846 4064b8 GetDC SendMessageA GetObjectA 7724->7846 7725->7726 7730 406b34 SelectPalette SelectPalette 7726->7730 7731 406b2f 7726->7731 7728 406c14 7734 406cea SetTextColor SetBkColor SetBkMode EndPaint 7728->7734 7737 406c66 LoadStringA 7728->7737 7738 406c56 lstrcpynA 7728->7738 7729->7728 7732 406bc6 LoadStringA 7729->7732 7733 406bb6 lstrcpynA 7729->7733 7735 406b45 SelectObject DeleteDC 7730->7735 7731->7730 7731->7735 7736 406bda SelectObject lstrlenA TextOutA SelectObject 7732->7736 7733->7736 7734->7663 7735->7724 7736->7728 7739 406c7a 6 API calls 7737->7739 7738->7739 7739->7734 7741 406307 DestroyWindow 7740->7741 7742 4062ed 7740->7742 7744 406315 7741->7744 7745 40631b 7741->7745 7742->7741 7743 4062f7 DestroyWindow 7742->7743 7743->7742 7859 406401 7744->7859 7745->7663 7748 4067bf 7747->7748 7749 4067d0 7747->7749 7748->7749 7750 4065e9 50 API calls 7748->7750 7749->7663 7750->7749 7752 4071c4 TextOutA SetBkMode GetSysColor SetTextColor 7751->7752 7752->7670 7754 406d2a 7753->7754 7755 406d8d 7753->7755 7754->7755 7756 406d3d GetDC SelectPalette RealizePalette 7754->7756 7755->7663 7757 406d65 InvalidateRect UpdateWindow 7756->7757 7758 406d77 SelectPalette RealizePalette ReleaseDC 7756->7758 7757->7758 7758->7755 7760 40664b 7759->7760 7761 40661d SendMessageA 7759->7761 7764 40670a SendMessageA 7760->7764 7777 406196 7760->7777 7762 406739 7761->7762 7763 40663e ShowWindow 7761->7763 7762->7680 7763->7760 7764->7762 7765 406727 7764->7765 7767 40673d InvalidateRect ShowWindow SetActiveWindow GetNextDlgTabItem 7765->7767 7768 40672e 7765->7768 7771 406777 SetFocus 7767->7771 7772 40676e GetNextDlgTabItem 7767->7772 7770 4067ad 33 API calls 7768->7770 7770->7762 7771->7762 7772->7771 7773 406689 GetWindowLongA SetWindowLongA GetWindowLongA SetWindowLongA KiUserCallbackDispatcher 7774 4066e4 MapDialogRect SetWindowPos 7773->7774 7775 4066cf 7773->7775 7774->7764 7775->7774 7778 4061a0 __EH_prolog 7777->7778 7790 405853 GetModuleHandleA FindResourceA LoadResource SizeofResource LockResource 7778->7790 7783 406220 CreateDialogIndirectParamA 7808 4058c8 7783->7808 7784 4061e5 GetSystemDefaultLCID 7802 405bed GetDC lstrcpynA lstrcpynA EnumFontFamiliesExA 7784->7802 7787 40620b 7811 40597e 7787->7811 7815 4058ea GlobalAlloc 7790->7815 7792 40589a 7793 4060d3 7792->7793 7818 401571 7793->7818 7795 406113 7796 406138 7795->7796 7797 40611a GetModuleHandleA LoadStringA 7795->7797 7798 40614f 7796->7798 7821 40811f 7796->7821 7797->7796 7800 406184 7797->7800 7798->7800 7801 40617a lstrcpyA 7798->7801 7800->7783 7800->7784 7801->7800 7803 405c64 GetStockObject 7802->7803 7807 405c5e lstrcpyA ReleaseDC lstrcmpiA 7802->7807 7805 405c92 GetObjectA 7803->7805 7806 405c8a GetStockObject 7803->7806 7805->7807 7806->7805 7806->7807 7807->7787 7809 4058e8 7808->7809 7810 4058d8 GlobalUnlock GlobalFree 7808->7810 7809->7762 7809->7773 7810->7809 7812 405995 7811->7812 7814 405a02 ctype 7811->7814 7813 4059e1 MultiByteToWideChar 7812->7813 7812->7814 7813->7814 7814->7783 7816 40591e 7815->7816 7817 405907 GlobalLock 7815->7817 7816->7792 7817->7816 7819 40158a wsprintfA GetPrivateProfileStringA 7818->7819 7820 4015bf 7818->7820 7819->7795 7820->7795 7823 408127 7821->7823 7824 408155 7823->7824 7827 40a0ba 7823->7827 7825 40a0ba 6 API calls 7824->7825 7826 40819c 7824->7826 7825->7824 7826->7798 7828 40a0d8 7827->7828 7830 40a0cc 7827->7830 7831 40a12f 7828->7831 7830->7823 7832 40a160 GetStringTypeW 7831->7832 7833 40a178 7831->7833 7832->7833 7834 40a17c GetStringTypeA 7832->7834 7835 40a1a3 GetStringTypeA 7833->7835 7836 40a1c7 7833->7836 7834->7833 7839 40a264 7834->7839 7835->7839 7838 40a1dd MultiByteToWideChar 7836->7838 7836->7839 7838->7839 7840 40a201 7838->7840 7839->7830 7840->7839 7841 40a23b MultiByteToWideChar 7840->7841 7841->7839 7842 40a254 GetStringTypeW 7841->7842 7842->7839 7844 4069e9 7843->7844 7845 4069ca GetObjectA 7843->7845 7844->7723 7844->7724 7845->7844 7847 4060d3 11 API calls 7846->7847 7848 40652e 7847->7848 7849 40656c GetDeviceCaps MulDiv GetSystemDefaultLCID 7848->7849 7852 406544 GetSystemDefaultLCID 7848->7852 7850 406597 7849->7850 7851 40659b CreateFontIndirectA 7849->7851 7850->7851 7853 4065d3 ReleaseDC 7851->7853 7854 4065af 7851->7854 7855 405bed 10 API calls 7852->7855 7853->7729 7856 4065c0 GetDeviceCaps MulDiv 7854->7856 7857 4065b3 GetObjectA 7854->7857 7858 406569 7855->7858 7856->7853 7857->7856 7858->7849 7860 406448 7859->7860 7864 40640a 7859->7864 7861 40646b 7860->7861 7862 40645d DeleteObject 7860->7862 7861->7745 7862->7861 7867 40633e 7864->7867 7866 40633e 2 API calls 7866->7860 7868 406345 GetProcessHeap HeapFree 7867->7868 7869 406358 7867->7869 7868->7869 7869->7866 9481 408793 9482 40b32f 4 API calls 9481->9482 9483 4087b9 9482->9483 9155 405cd9 9156 405cf2 lstrcmpiA 9155->9156 9157 405ce8 lstrcpyA 9155->9157 9156->9157 9159 405d0d 9156->9159 9157->9159 9488 40cd1d 9494 40dc1c 9488->9494 9490 40cd30 9491 40cd22 9491->9490 9493 40781d ctype 7 API calls 9491->9493 9497 40e709 9491->9497 9493->9491 9507 40dc25 9494->9507 9498 40e719 9497->9498 9499 40e71e 9497->9499 9498->9491 9499->9498 9511 40dbc0 9499->9511 9505 40e738 9505->9498 9506 40781d ctype 7 API calls 9505->9506 9506->9498 9508 40dc23 9507->9508 9509 40dc36 9507->9509 9508->9491 9509->9508 9510 40db85 8 API calls 9509->9510 9510->9509 9512 40dbd6 9511->9512 9513 40dbf1 9511->9513 9512->9513 9514 40ca61 6 API calls 9512->9514 9515 40eb05 9513->9515 9514->9513 9516 40eb11 9515->9516 9517 40e730 9515->9517 9516->9517 9518 40781d ctype 7 API calls 9516->9518 9519 40ea52 9517->9519 9518->9517 9520 40ea66 9519->9520 9525 40ead3 9519->9525 9521 40eacb 9520->9521 9523 40eab5 CloseHandle 9520->9523 9520->9525 9526 40d9c5 9521->9526 9523->9521 9524 40eac1 GetLastError 9523->9524 9524->9521 9525->9505 9527 40da1e 9526->9527 9529 40d9d3 9526->9529 9527->9525 9528 40da18 SetStdHandle 9528->9527 9529->9527 9529->9528 9160 408be2 9167 40a2b6 9160->9167 9163 408bfb 9165 40c501 7 API calls 9163->9165 9164 40c4c8 7 API calls 9164->9163 9166 408c04 9165->9166 9170 40a2c7 9167->9170 9171 40a2d3 GetCurrentProcess TerminateProcess 9170->9171 9174 40a2e4 9170->9174 9171->9174 9172 408bed 9172->9163 9172->9164 9173 40a34e ExitProcess 9174->9172 9174->9173 9530 4058a3 GetModuleHandleA 9175 402ee5 9176 402ef1 9175->9176 9177 402f47 9175->9177 9178 402f18 9176->9178 9179 402ef8 9176->9179 9180 402f91 9177->9180 9181 402f5f 9177->9181 9182 402f0f 9177->9182 9183 402f30 9178->9183 9184 402f21 SetDlgItemTextA 9178->9184 9179->9182 9198 4037c2 GetDlgItemTextA SHBrowseForFolderA 9179->9198 9187 402fac GetDlgItemTextA 9180->9187 9190 40776b 12 API calls 9180->9190 9181->9182 9186 402f66 GetParent 9181->9186 9185 4035da 9 API calls 9183->9185 9184->9183 9185->9182 9188 402f80 PostMessageA 9186->9188 9189 402f7d 9186->9189 9201 4036c1 lstrcpyA 9187->9201 9188->9182 9189->9188 9193 402fa6 9190->9193 9193->9187 9195 40163b 4 API calls 9197 402fe6 9195->9197 9196 403466 6 API calls 9196->9182 9197->9182 9197->9196 9199 403812 SHGetPathFromIDListA SetDlgItemTextA SHGetMalloc 9198->9199 9200 403841 9198->9200 9199->9200 9200->9182 9202 405d15 7 API calls 9201->9202 9203 403701 9202->9203 9204 405d54 6 API calls 9203->9204 9205 40370d lstrlenA 9204->9205 9206 403721 9205->9206 9207 403752 GetFileAttributesA 9206->9207 9208 40377b 2 API calls 9206->9208 9209 402fc7 9207->9209 9210 40373e lstrcatA 9208->9210 9209->9182 9209->9195 9209->9197 9210->9207 9211 40c3e8 9214 40c3f0 9211->9214 9212 40c482 9214->9212 9215 4089e8 RtlUnwind 9214->9215 9216 408a00 9215->9216 9216->9214 9217 403c6c 9218 403c82 9217->9218 9219 403c73 9217->9219 9220 404f4d 43 API calls 9219->9220 9220->9218 9531 4058ac 9532 4058c8 ctype 2 API calls 9531->9532 9533 4058b4 9532->9533 9534 40839d ctype 7 API calls 9533->9534 9535 4058c1 9533->9535 9534->9535 9536 40a22c 9537 40a233 9536->9537 9538 40a264 9537->9538 9539 40a23b MultiByteToWideChar 9537->9539 9539->9538 9540 40a254 GetStringTypeW 9539->9540 9540->9538 9541 40192d 9542 401935 9541->9542 9544 40193e 9541->9544 9543 40776b 12 API calls 9542->9543 9543->9544 9098 4074ee GetParent 9099 40750e 9098->9099 9100 4075a8 9099->9100 9102 4076bc 9099->9102 9105 40752d 9099->9105 9101 407597 9100->9101 9103 4075e3 GetWindowTextA 9100->9103 9104 4075f8 9100->9104 9101->9102 9115 40302c 9101->9115 9106 407628 SetWindowTextA 9103->9106 9107 407617 LoadStringA 9104->9107 9108 407607 lstrcpynA 9104->9108 9105->9101 9105->9102 9111 40755c 9105->9111 9109 40765d GetDlgItem ShowWindow 9106->9109 9110 40763e GetDlgItem ShowWindow 9106->9110 9107->9106 9108->9106 9112 40767a GetDlgItem ShowWindow GetDlgItem KiUserCallbackDispatcher 9109->9112 9110->9112 9111->9102 9113 407582 CreateSolidBrush 9111->9113 9112->9101 9113->9102 9116 403041 9115->9116 9117 403188 9115->9117 9120 4030c3 9116->9120 9121 40304a 9116->9121 9118 403195 9117->9118 9119 4031c7 GetParent 9117->9119 9122 40319c GetParent PostMessageA PostMessageA 9118->9122 9125 4031c3 9118->9125 9123 403466 6 API calls 9119->9123 9133 4035da GetWindow wsprintfA 9120->9133 9121->9125 9127 403fde 178 API calls 9121->9127 9122->9125 9123->9125 9125->9102 9129 40307e 9127->9129 9128 401571 2 API calls 9130 403118 SetDlgItemTextA GetDlgItemTextA wsprintfA SetDlgItemTextA SendDlgItemMessageA 9128->9130 9131 4030a5 GetParent SendMessageA 9129->9131 9132 403087 GetParent PostMessageA 9129->9132 9130->9125 9131->9125 9132->9125 9134 401571 2 API calls 9133->9134 9135 403646 9134->9135 9136 40364d GetWindowTextA 9135->9136 9137 40365e 9135->9137 9136->9137 9138 403673 SetWindowTextA 9137->9138 9142 40367f 9137->9142 9138->9142 9139 403683 GetWindowLongA 9141 401571 2 API calls 9139->9141 9140 403100 9140->9128 9141->9142 9142->9139 9142->9140 9143 4036b1 GetWindow 9142->9143 9144 4036a8 SetWindowTextA 9142->9144 9143->9142 9144->9143 9221 4029f0 9222 402a00 9221->9222 9223 402ab9 9221->9223 9224 402a60 GetDlgItem SendMessageA 9222->9224 9225 402a07 9222->9225 9228 402ad3 PostMessageA PostMessageA 9223->9228 9229 402ab4 9223->9229 9230 402a96 9224->9230 9231 402a8c 9224->9231 9226 402a35 9225->9226 9227 402a0a 9225->9227 9226->9229 9233 402a3f GetParent GetDlgItem SetFocus 9226->9233 9227->9229 9232 402a19 SendDlgItemMessageA 9227->9232 9228->9229 9243 403dff GetSystemDefaultLCID 9230->9243 9240 403d4d GetWindowLongA SetWindowLongA lstrlenA 9231->9240 9232->9229 9233->9229 9236 402a93 9256 405647 FindResourceA 9236->9256 9239 4035da 9 API calls 9239->9229 9260 402098 9240->9260 9244 401571 2 API calls 9243->9244 9245 403e8b 9244->9245 9246 403e92 LoadStringA 9245->9246 9248 403ea7 9245->9248 9246->9248 9247 403ec0 9250 405bed 10 API calls 9247->9250 9248->9247 9249 40811f 6 API calls 9248->9249 9249->9247 9251 403ef1 9250->9251 9252 401571 2 API calls 9251->9252 9253 403f05 wsprintfA SetWindowTextA SendMessageA 9252->9253 9254 401571 2 API calls 9253->9254 9255 403f61 wsprintfA SendMessageA SendMessageA 9254->9255 9255->9236 9257 405660 LoadResource LockResource 9256->9257 9258 402aa5 9256->9258 9257->9258 9259 40567a 7 API calls 9257->9259 9258->9239 9259->9258 9261 4020a1 SendMessageA SetWindowLongA SendMessageA SetFocus 9260->9261 9261->9236 9262 40c3f0 9263 40c482 9262->9263 9265 40c40e 9262->9265 9264 4089e8 RtlUnwind 9264->9265 9265->9263 9265->9264 7870 402971 7871 40299d LoadIconA SendMessageA LoadImageA SendMessageA 7870->7871 7874 40297c 7870->7874 7876 40352d 7871->7876 7873 402997 7874->7873 7889 4055e0 7874->7889 7877 401571 2 API calls 7876->7877 7878 40356a 7877->7878 7879 403577 SetDlgItemTextA 7878->7879 7880 403588 7878->7880 7879->7880 7881 401571 2 API calls 7880->7881 7882 403598 7881->7882 7883 4035b0 7882->7883 7884 40359f SetDlgItemTextA 7882->7884 7885 401571 2 API calls 7883->7885 7884->7883 7886 4035c0 7885->7886 7887 4035d5 7886->7887 7888 4035c7 SetDlgItemTextA 7886->7888 7887->7873 7888->7887 7890 405646 7889->7890 7891 4055e9 GetDC SelectPalette RealizePalette 7889->7891 7890->7873 7892 40561c InvalidateRect UpdateWindow 7891->7892 7893 40562e SelectPalette RealizePalette ReleaseDC 7891->7893 7892->7893 7893->7890 9545 40d633 9546 408bed 7 API calls 9545->9546 9547 40d63a 9546->9547 9266 40aef4 9271 40cfeb 9266->9271 9268 40af02 9269 40af34 9268->9269 9270 40a0ba 6 API calls 9268->9270 9270->9268 9272 40d018 9271->9272 9276 40cffb 9271->9276 9273 40d036 9272->9273 9274 40a0ba 6 API calls 9272->9274 9275 40c778 9 API calls 9273->9275 9273->9276 9274->9273 9275->9276 9276->9268 9277 40d774 9278 40c501 7 API calls 9277->9278 9279 40d77b 9278->9279 9284 40e597 9279->9284 9282 40a2b6 3 API calls 9283 40d78b 9282->9283 9285 40e5a5 9284->9285 9286 40a2b6 3 API calls 9285->9286 9287 40d782 9285->9287 9286->9287 9287->9282 9548 40afb4 9549 40afc2 9548->9549 9550 40afdd 9548->9550 9555 40d448 9549->9555 9558 40d475 9550->9558 9553 40afcb 9554 40afe6 9561 40de33 9555->9561 9557 40d464 9557->9553 9559 40de33 6 API calls 9558->9559 9560 40d491 9559->9560 9560->9554 9566 40de6e 9561->9566 9562 40e11b 9562->9557 9563 40a0ba 6 API calls 9563->9566 9564 40a0ba 6 API calls 9565 40e123 9564->9565 9565->9564 9568 40e16e 9565->9568 9566->9562 9566->9563 9566->9565 9567 40a0ba 6 API calls 9567->9568 9568->9562 9568->9567 9288 4088f6 9289 408919 9288->9289 9290 40890a 9288->9290 9294 40b32f 9289->9294 9292 408940 9292->9290 9298 408744 RtlUnwind 9292->9298 9295 40b340 9294->9295 9297 40b34e 9295->9297 9299 40b3ca 9295->9299 9297->9292 9298->9290 9302 40b3e2 9299->9302 9300 40b546 9303 40b56c 9300->9303 9317 40b571 9300->9317 9302->9300 9305 40b43a 9302->9305 9307 40b531 9302->9307 9309 40d6a0 IsBadReadPtr 9302->9309 9305->9300 9306 40b47e 9305->9306 9306->9307 9311 40b72a 9306->9311 9307->9297 9310 40d6b6 9309->9310 9310->9305 9312 40b749 9311->9312 9313 40b73c 9311->9313 9344 408744 RtlUnwind 9312->9344 9321 40b8db 9313->9321 9316 40b760 9316->9306 9319 40b581 9317->9319 9318 40b615 9318->9307 9319->9318 9320 40b72a 4 API calls 9319->9320 9320->9319 9322 40b90f 9321->9322 9343 40b953 ctype 9321->9343 9323 40b934 9322->9323 9324 40b978 9322->9324 9322->9343 9327 40d6a0 IsBadReadPtr 9323->9327 9325 40b980 9324->9325 9326 40b9d2 9324->9326 9330 40d6a0 IsBadReadPtr 9325->9330 9328 40b9e0 9326->9328 9329 40ba1a 9326->9329 9331 40b941 9327->9331 9332 40d6a0 IsBadReadPtr 9328->9332 9334 40d6a0 IsBadReadPtr 9329->9334 9333 40b98d 9330->9333 9331->9343 9345 40d6bc IsBadWritePtr 9331->9345 9335 40b9e5 9332->9335 9338 40d6bc IsBadWritePtr 9333->9338 9333->9343 9336 40ba1f 9334->9336 9340 40d6bc IsBadWritePtr 9335->9340 9335->9343 9339 40d6bc IsBadWritePtr 9336->9339 9336->9343 9338->9343 9341 40ba2d 9339->9341 9340->9343 9341->9343 9347 40d6d8 IsBadCodePtr 9341->9347 9343->9312 9344->9316 9346 40d6d2 9345->9346 9346->9343 9348 40d6ea 9347->9348 9348->9343 7894 408af7 GetVersion 7920 408dc6 HeapCreate 7894->7920 7896 408b56 7897 408b63 7896->7897 7898 408b5b 7896->7898 7932 40c23c 7897->7932 8003 408c12 7898->8003 7902 408b6b GetCommandLineA 7946 40c10a 7902->7946 7906 408b85 7969 40be04 7906->7969 7908 408b8a 7909 408b8f GetStartupInfoA 7908->7909 7982 40bdac 7909->7982 7911 408ba1 7912 408baa 7911->7912 7913 408bb3 GetModuleHandleA 7912->7913 7986 4010c2 7913->7986 7921 408de6 7920->7921 7922 408e1c 7920->7922 8018 408c7e 7921->8018 7922->7896 7925 408e02 7928 408e1f 7925->7928 8032 409674 7925->8032 7926 408df5 8030 408e23 HeapAlloc 7926->8030 7928->7896 7929 408dff 7929->7928 7931 408e10 HeapDestroy 7929->7931 7931->7922 8079 40776b 7932->8079 7935 40c25b GetStartupInfoA 7942 40c36c 7935->7942 7945 40c2a7 7935->7945 7938 40c393 GetStdHandle 7941 40c3a1 GetFileType 7938->7941 7938->7942 7939 40c3d3 SetHandleCount 7939->7902 7940 40776b 12 API calls 7940->7945 7941->7942 7942->7938 7942->7939 7943 40c318 7943->7942 7944 40c33a GetFileType 7943->7944 7944->7943 7945->7940 7945->7942 7945->7943 7947 40c125 GetEnvironmentStringsW 7946->7947 7948 40c158 7946->7948 7949 40c139 GetEnvironmentStrings 7947->7949 7950 40c12d 7947->7950 7948->7950 7951 40c149 7948->7951 7949->7951 7952 408b7b 7949->7952 7953 40c171 WideCharToMultiByte 7950->7953 7954 40c165 GetEnvironmentStringsW 7950->7954 7951->7952 7955 40c1eb GetEnvironmentStrings 7951->7955 7959 40c1f7 7951->7959 8009 40bebd 7952->8009 7957 40c1a5 7953->7957 7958 40c1d7 FreeEnvironmentStringsW 7953->7958 7954->7952 7954->7953 7955->7952 7955->7959 7961 40776b 12 API calls 7957->7961 7958->7952 7960 40776b 12 API calls 7959->7960 7967 40c212 7960->7967 7962 40c1ab 7961->7962 7962->7958 7963 40c1b4 WideCharToMultiByte 7962->7963 7965 40c1ce 7963->7965 7966 40c1c5 7963->7966 7964 40c228 FreeEnvironmentStringsA 7964->7952 7965->7958 8147 40781d 7966->8147 7967->7964 7970 40be11 7969->7970 7972 40be16 7969->7972 8177 40a05c 7970->8177 7973 40776b 12 API calls 7972->7973 7974 40be43 7973->7974 7975 408bed 7 API calls 7974->7975 7981 40be57 7974->7981 7975->7981 7976 40be9a 7977 40781d ctype 7 API calls 7976->7977 7978 40bea6 7977->7978 7978->7908 7979 40776b 12 API calls 7979->7981 7980 408bed 7 API calls 7980->7981 7981->7976 7981->7979 7981->7980 7983 40bdb5 7982->7983 7985 40bdba 7982->7985 7984 40a05c 19 API calls 7983->7984 7984->7985 7985->7911 8201 4011f8 7986->8201 7989 4010ed 7992 4010f8 GetDesktopWindow 7989->7992 7997 401109 7989->7997 8257 403466 7992->8257 7994 401113 7999 404f4d 43 API calls 7994->7999 7996 401111 ExitProcess 8268 404f4d 7997->8268 8000 401118 7999->8000 8000->7996 8001 401121 GetDesktopWindow 8000->8001 8002 403466 6 API calls 8001->8002 8002->7996 8004 408c20 8003->8004 8005 408c1b 8003->8005 8007 40c501 7 API calls 8004->8007 8006 40c4c8 7 API calls 8005->8006 8006->8004 8008 408c29 ExitProcess 8007->8008 8010 40bed4 GetModuleFileNameA 8009->8010 8011 40becf 8009->8011 8013 40bef7 8010->8013 8012 40a05c 19 API calls 8011->8012 8012->8010 8014 40776b 12 API calls 8013->8014 8015 40bf18 8014->8015 8016 408bed 7 API calls 8015->8016 8017 40bf28 8015->8017 8016->8017 8017->7906 8041 408360 8018->8041 8021 408cc1 GetEnvironmentVariableA 8025 408ce0 8021->8025 8029 408d9e 8021->8029 8022 408ca7 8022->8021 8023 408cb9 8022->8023 8023->7925 8023->7926 8026 408d25 GetModuleFileNameA 8025->8026 8027 408d1d 8025->8027 8026->8027 8027->8029 8043 407d69 8027->8043 8029->8023 8046 408c51 GetModuleHandleA 8029->8046 8031 408e3f 8030->8031 8031->7929 8033 409681 8032->8033 8034 409688 HeapAlloc 8032->8034 8035 4096a5 VirtualAlloc 8033->8035 8034->8035 8040 4096dd 8034->8040 8036 4096c5 VirtualAlloc 8035->8036 8037 40979a 8035->8037 8038 40978c VirtualFree 8036->8038 8036->8040 8039 4097a2 HeapFree 8037->8039 8037->8040 8038->8037 8039->8040 8040->7929 8042 40836c GetVersionExA 8041->8042 8042->8021 8042->8022 8048 407d80 8043->8048 8047 408c68 8046->8047 8047->8023 8050 407d98 8048->8050 8049 40a0ba 6 API calls 8049->8050 8050->8049 8052 407dc8 8050->8052 8051 40a0ba 6 API calls 8051->8052 8052->8051 8054 407d7c 8052->8054 8055 40a37a 8052->8055 8054->8029 8056 40a3a5 8055->8056 8060 40a388 8055->8060 8057 40a3c1 8056->8057 8058 40a0ba 6 API calls 8056->8058 8057->8060 8061 40c778 8057->8061 8058->8057 8060->8052 8062 40c7a8 LCMapStringW 8061->8062 8063 40c7c4 8061->8063 8062->8063 8064 40c7cc LCMapStringA 8062->8064 8066 40c82a 8063->8066 8067 40c80d LCMapStringA 8063->8067 8064->8063 8065 40c906 8064->8065 8065->8060 8066->8065 8068 40c840 MultiByteToWideChar 8066->8068 8067->8065 8068->8065 8069 40c86a 8068->8069 8069->8065 8070 40c8a0 MultiByteToWideChar 8069->8070 8070->8065 8071 40c8b9 LCMapStringW 8070->8071 8071->8065 8072 40c8d4 8071->8072 8073 40c8da 8072->8073 8075 40c91a 8072->8075 8073->8065 8074 40c8e8 LCMapStringW 8073->8074 8074->8065 8075->8065 8076 40c952 LCMapStringW 8075->8076 8076->8065 8077 40c96a WideCharToMultiByte 8076->8077 8077->8065 8088 40777d 8079->8088 8082 408bed 8083 408bf6 8082->8083 8084 408bfb 8082->8084 8127 40c4c8 8083->8127 8133 40c501 8084->8133 8089 40777a 8088->8089 8091 407784 8088->8091 8089->7935 8089->8082 8091->8089 8092 4077a9 8091->8092 8093 4077b8 8092->8093 8094 4077cd 8092->8094 8096 4077c6 8093->8096 8103 4091bf 8093->8103 8094->8096 8097 40780c RtlAllocateHeap 8094->8097 8099 4077ed 8094->8099 8096->8097 8098 4077cb 8096->8098 8100 40781b 8097->8100 8098->8091 8109 40996c 8099->8109 8100->8091 8102 4077f8 8102->8097 8102->8100 8107 4091f1 8103->8107 8104 409290 8106 40929f 8104->8106 8123 409579 8104->8123 8106->8096 8107->8104 8107->8106 8116 4094c8 8107->8116 8110 40997a 8109->8110 8111 409b3b 8110->8111 8114 409a66 VirtualAlloc 8110->8114 8115 409a37 8110->8115 8112 409674 5 API calls 8111->8112 8112->8115 8114->8115 8115->8102 8117 40950b HeapAlloc 8116->8117 8118 4094db HeapReAlloc 8116->8118 8120 40955b 8117->8120 8121 409531 VirtualAlloc 8117->8121 8119 4094fa 8118->8119 8118->8120 8119->8117 8120->8104 8121->8120 8122 40954b HeapFree 8121->8122 8122->8120 8124 40958b VirtualAlloc 8123->8124 8126 4095d4 8124->8126 8126->8106 8128 40c4d2 8127->8128 8129 40c501 7 API calls 8128->8129 8132 40c4ff 8128->8132 8130 40c4e9 8129->8130 8131 40c501 7 API calls 8130->8131 8131->8132 8132->8084 8135 40c514 8133->8135 8134 408c04 8134->7935 8135->8134 8136 40c62b 8135->8136 8137 40c554 8135->8137 8138 40c63e GetStdHandle WriteFile 8136->8138 8137->8134 8139 40c560 GetModuleFileNameA 8137->8139 8138->8134 8140 40c578 8139->8140 8142 40d7cd 8140->8142 8143 40d7da LoadLibraryA 8142->8143 8145 40d81c 8142->8145 8144 40d7eb GetProcAddress 8143->8144 8143->8145 8144->8145 8146 40d802 GetProcAddress GetProcAddress 8144->8146 8145->8134 8146->8145 8148 407829 8147->8148 8157 407845 8147->8157 8149 407833 ctype 8148->8149 8150 407849 ctype 8148->8150 8152 407875 HeapFree 8149->8152 8153 40783f 8149->8153 8151 407874 8150->8151 8155 407863 8150->8155 8151->8152 8152->8157 8158 408e96 8153->8158 8164 409927 8155->8164 8157->7965 8159 408ed4 8158->8159 8163 40918a ctype 8158->8163 8160 4090d0 VirtualFree 8159->8160 8159->8163 8161 409134 8160->8161 8162 409143 VirtualFree HeapFree 8161->8162 8161->8163 8162->8163 8163->8157 8165 409954 8164->8165 8167 40996a 8164->8167 8165->8167 8168 40980e 8165->8168 8167->8157 8170 40981b 8168->8170 8169 4098cb 8169->8167 8170->8169 8171 40983c VirtualFree 8170->8171 8173 4097b8 VirtualFree 8170->8173 8171->8170 8174 4097d5 8173->8174 8175 409805 8174->8175 8176 4097e5 HeapFree 8174->8176 8175->8170 8176->8170 8178 40a065 8177->8178 8179 40a06c 8177->8179 8181 409c98 8178->8181 8179->7972 8188 409e31 8181->8188 8185 409cdb GetCPInfo 8186 409cef 8185->8186 8187 409e25 8186->8187 8193 409ed7 GetCPInfo 8186->8193 8187->8179 8189 409e51 8188->8189 8190 409e41 GetOEMCP 8188->8190 8191 409ca9 8189->8191 8192 409e56 GetACP 8189->8192 8190->8189 8191->8185 8191->8186 8191->8187 8192->8191 8194 409fc2 8193->8194 8196 409efa 8193->8196 8194->8187 8195 40a12f 6 API calls 8197 409f76 8195->8197 8196->8195 8198 40c778 9 API calls 8197->8198 8199 409f9a 8198->8199 8200 40c778 9 API calls 8199->8200 8200->8194 8202 40776b 12 API calls 8201->8202 8203 401216 8202->8203 8204 40776b 12 API calls 8203->8204 8205 401225 8204->8205 8206 40776b 12 API calls 8205->8206 8207 401235 8206->8207 8208 40776b 12 API calls 8207->8208 8209 401240 8208->8209 8210 40776b 12 API calls 8209->8210 8212 40124b 8210->8212 8211 4010d3 8211->7989 8224 402451 #17 8211->8224 8212->8211 8213 40776b 12 API calls 8212->8213 8214 401297 8213->8214 8214->8211 8215 4012a1 GetModuleFileNameA 8214->8215 8331 401324 RegOpenKeyExA 8215->8331 8218 4012f1 8359 40186c 8218->8359 8219 4012ce 8219->8218 8379 401151 8219->8379 8225 40248f 8224->8225 8226 4024fa 8225->8226 8227 4024d8 GetDesktopWindow MessageBoxA 8225->8227 8228 4024ba LoadStringA 8225->8228 8252 4026bb 8225->8252 8256 4010e4 8225->8256 8231 402560 8226->8231 8234 4027f1 21 API calls 8226->8234 8227->8226 8227->8256 8228->8227 8229 402794 8629 403fde 8229->8629 8230 4026eb 8576 40553b FindResourceA LoadResource LockResource 8230->8576 8235 402592 8231->8235 8237 4027f1 21 API calls 8231->8237 8234->8231 8239 4027f1 21 API calls 8235->8239 8244 4025c5 8235->8244 8237->8235 8238 40553b 6 API calls 8241 402735 8238->8241 8239->8244 8240 402645 8552 4027f1 wsprintfA 8240->8552 8582 405ffd 8241->8582 8243 40279a 8248 4027d6 lstrlenA 8243->8248 8243->8256 8244->8240 8249 4027f1 21 API calls 8244->8249 8247 402789 DeleteObject 8247->8243 8251 4027e1 8248->8251 8248->8256 8249->8240 8250 4027f1 21 API calls 8250->8252 8597 403951 GetStartupInfoA 8251->8597 8252->8229 8252->8230 8253 40781d 7 API calls ctype 8254 402743 8253->8254 8254->8247 8254->8253 8256->7989 8256->7994 8258 403529 8257->8258 8259 40347c 8257->8259 8258->7997 8260 4034db LoadStringA LoadStringA 8259->8260 8261 4034bc 8259->8261 8267 4034d6 8260->8267 8262 401571 2 API calls 8261->8262 8263 4034c7 8262->8263 8266 401571 2 API calls 8263->8266 8264 403510 MessageBoxA 8264->7997 8265 403505 lstrcpyA 8265->8264 8266->8267 8267->8264 8267->8265 8269 404f66 8268->8269 8270 404f59 DestroyWindow 8268->8270 8271 404f7c 8269->8271 8272 404f6f FreeLibrary 8269->8272 8270->8269 8273 404f9b 8271->8273 8277 403ceb 4 API calls 8271->8277 8272->8271 8274 404fb1 8273->8274 8275 404faa DeleteFileA 8273->8275 9083 405505 8274->9083 8275->8274 8279 404f90 8277->8279 9065 4051e0 lstrcpyA lstrcatA 8279->9065 8281 404fc5 8283 404fdb 8281->8283 8285 40781d ctype 7 API calls 8281->8285 8282 40781d ctype 7 API calls 8282->8281 8284 404ff1 8283->8284 8286 40781d ctype 7 API calls 8283->8286 8287 405007 8284->8287 8288 40781d ctype 7 API calls 8284->8288 8285->8283 8286->8284 8289 40501d 8287->8289 8290 40781d ctype 7 API calls 8287->8290 8288->8287 8291 405033 8289->8291 8293 40781d ctype 7 API calls 8289->8293 8290->8289 8292 405049 8291->8292 8294 40781d ctype 7 API calls 8291->8294 8295 40505f 8292->8295 8296 40781d ctype 7 API calls 8292->8296 8293->8291 8294->8292 8297 405075 8295->8297 8298 40781d ctype 7 API calls 8295->8298 8296->8295 8299 40508b 8297->8299 8301 40781d ctype 7 API calls 8297->8301 8298->8297 8300 4050a1 8299->8300 8302 40781d ctype 7 API calls 8299->8302 8303 4050b7 8300->8303 8304 40781d ctype 7 API calls 8300->8304 8301->8299 8302->8300 8305 4050cd 8303->8305 8306 40781d ctype 7 API calls 8303->8306 8304->8303 8307 4050e3 8305->8307 8309 40781d ctype 7 API calls 8305->8309 8306->8305 8308 4050f9 8307->8308 8310 40781d ctype 7 API calls 8307->8310 8311 40510f 8308->8311 8312 40781d ctype 7 API calls 8308->8312 8309->8307 8310->8308 8313 405125 8311->8313 8314 40781d ctype 7 API calls 8311->8314 8312->8311 8315 40513b 8313->8315 8317 40781d ctype 7 API calls 8313->8317 8314->8313 8316 405151 8315->8316 8318 40781d ctype 7 API calls 8315->8318 8319 405167 8316->8319 8320 40781d ctype 7 API calls 8316->8320 8317->8315 8318->8316 8321 40517d 8319->8321 8322 40781d ctype 7 API calls 8319->8322 8320->8319 8323 405193 8321->8323 8325 40781d ctype 7 API calls 8321->8325 8322->8321 8324 4051a9 8323->8324 8326 40781d ctype 7 API calls 8323->8326 8327 4051bf 8324->8327 8328 40781d ctype 7 API calls 8324->8328 8325->8323 8326->8324 8329 4051d5 8327->8329 8330 40781d ctype 7 API calls 8327->8330 8328->8327 8329->7996 8330->8329 8332 4013e4 GetWindowsDirectoryA lstrlenA 8331->8332 8333 40135f RegQueryValueExA lstrlenA 8331->8333 8335 40153c 12 API calls 8332->8335 8397 40153c 8333->8397 8337 401405 lstrcatA lstrlenA 8335->8337 8336 40139c RegQueryValueExA lstrlenA 8339 40153c 12 API calls 8336->8339 8338 40153c 12 API calls 8337->8338 8340 401433 GetSystemDirectoryA lstrlenA 8338->8340 8341 4013d4 RegCloseKey 8339->8341 8342 40153c 12 API calls 8340->8342 8341->8332 8343 40145b GetTempPathA 8342->8343 8344 401480 8343->8344 8401 4015c3 GetFileAttributesA 8344->8401 8347 4014b6 lstrcpyA lstrcatA lstrlenA 8350 40153c 12 API calls 8347->8350 8348 401499 lstrlenA 8349 40153c 12 API calls 8348->8349 8351 4014ad lstrcpyA 8349->8351 8352 4014e5 8350->8352 8355 401513 8351->8355 8403 40163b CreateDirectoryA 8352->8403 8356 40151c lstrlenA 8355->8356 8357 40153c 12 API calls 8356->8357 8358 4012af LoadLibraryA 8357->8358 8358->8218 8358->8219 8417 401952 8359->8417 8362 401891 GetFileSize 8427 401c0c 8362->8427 8364 4018a9 8459 401a4d FindCloseChangeNotification 8364->8459 8367 4018b6 8440 401a09 ReadFile 8367->8440 8370 4012fe 8370->8211 8391 401718 8370->8391 8371 4018c3 8372 4018d5 8371->8372 8373 40776b 12 API calls 8371->8373 8441 401a09 ReadFile 8372->8441 8373->8372 8375 4018e5 8442 401d0c 8375->8442 8378 40781d ctype 7 API calls 8378->8364 8380 401160 8379->8380 8381 401166 8379->8381 8382 40781d ctype 7 API calls 8380->8382 8383 401182 CharNextA 8381->8383 8384 4011ac 8381->8384 8390 4011ef 8381->8390 8382->8381 8383->8381 8385 40776b 12 API calls 8384->8385 8384->8390 8386 4011cb lstrcpynA 8385->8386 8542 405d15 8386->8542 8390->8218 8392 401856 8391->8392 8396 40172e 8391->8396 8392->8211 8393 401840 8393->8392 8394 407cda 6 API calls 8393->8394 8394->8393 8395 401151 28 API calls 8395->8396 8396->8392 8396->8393 8396->8395 8398 40154d 8397->8398 8400 401549 8397->8400 8399 40776b 12 API calls 8398->8399 8399->8400 8400->8336 8402 40148e 8401->8402 8402->8347 8402->8348 8404 401656 GetLastError 8403->8404 8405 401684 8403->8405 8404->8405 8406 40167f 8404->8406 8405->8351 8406->8405 8412 4016c1 8406->8412 8408 401698 8408->8405 8409 40163b lstrcpyA 8408->8409 8410 4016aa 8409->8410 8410->8405 8411 4016af CreateDirectoryA 8410->8411 8411->8405 8413 4016d1 8412->8413 8414 401714 8413->8414 8415 4016d7 lstrcpyA 8413->8415 8414->8408 8416 4016ee 8415->8416 8416->8408 8418 401967 8417->8418 8419 4019c2 CreateFileA 8418->8419 8420 401996 lstrlenA 8418->8420 8421 4019dd 8419->8421 8422 401883 8419->8422 8420->8419 8424 4019a2 8420->8424 8460 4023fc GetLastError FormatMessageA 8421->8460 8422->8362 8422->8370 8424->8419 8426 4019b7 lstrcpyA 8424->8426 8426->8419 8428 401c26 8427->8428 8429 4018a2 8427->8429 8472 401a09 ReadFile 8428->8472 8429->8364 8439 4019f4 SetFilePointer 8429->8439 8431 401c5b 8473 4019f4 SetFilePointer 8431->8473 8433 401c65 8474 401a09 ReadFile 8433->8474 8435 401c74 8475 4019f4 SetFilePointer 8435->8475 8438 401c84 8438->8429 8476 401a09 ReadFile 8438->8476 8439->8367 8440->8371 8441->8375 8444 401d26 8442->8444 8443 4018fd 8443->8364 8443->8378 8444->8443 8445 40776b 12 API calls 8444->8445 8446 401d55 8444->8446 8445->8446 8447 40776b 12 API calls 8446->8447 8453 401dbe 8446->8453 8447->8453 8448 401fb2 8448->8453 8495 402216 GetTempFileNameA 8448->8495 8507 40232c 8448->8507 8514 402391 8448->8514 8449 40153c 12 API calls 8449->8453 8453->8443 8453->8448 8453->8449 8456 40776b 12 API calls 8453->8456 8458 40781d ctype 7 API calls 8453->8458 8477 4022c4 8453->8477 8486 4020c3 8453->8486 8492 407f88 8453->8492 8456->8453 8458->8453 8459->8370 8461 402426 8460->8461 8462 4019e5 MessageBoxA 8460->8462 8461->8462 8464 407cda 8461->8464 8462->8422 8465 407d47 8464->8465 8466 407ce9 8464->8466 8467 407d5c 8465->8467 8469 40a0ba 6 API calls 8465->8469 8468 407d0b 8466->8468 8470 40a12f 6 API calls 8466->8470 8467->8461 8468->8461 8471 407d58 8469->8471 8470->8468 8471->8461 8472->8431 8473->8433 8474->8435 8475->8438 8476->8438 8478 40776b 12 API calls 8477->8478 8479 4022cf GetTempFileNameA 8478->8479 8522 40214d GetTempFileNameA 8479->8522 8482 402304 MessageBoxA 8483 402321 8482->8483 8484 40231b 8482->8484 8483->8453 8485 40781d ctype 7 API calls 8484->8485 8485->8483 8487 4020d3 8486->8487 8490 402124 8486->8490 8487->8490 8532 408090 8487->8532 8488 40214a 8488->8453 8490->8488 8491 40213f lstrcpyA 8490->8491 8491->8490 8493 407d80 15 API calls 8492->8493 8494 407f9b 8493->8494 8494->8453 8496 40214d 21 API calls 8495->8496 8497 402264 8496->8497 8498 4022bd 8497->8498 8499 401952 12 API calls 8497->8499 8498->8453 8500 402283 8499->8500 8501 402295 8500->8501 8502 40776b 12 API calls 8500->8502 8540 401a09 ReadFile 8501->8540 8502->8501 8504 4022a3 8541 401a4d FindCloseChangeNotification 8504->8541 8506 4022a9 DeleteFileA 8506->8498 8508 40776b 12 API calls 8507->8508 8509 402336 lstrcpyA lstrcatA 8508->8509 8510 40214d 21 API calls 8509->8510 8511 40236d 8510->8511 8512 402374 LoadLibraryA 8511->8512 8513 402385 8511->8513 8512->8513 8513->8448 8515 4023f2 8514->8515 8516 40239c 8514->8516 8515->8453 8517 4023ab GetProcAddress 8516->8517 8518 4023bc 8516->8518 8517->8515 8517->8518 8519 4023c1 GetProcAddress 8518->8519 8520 4023d7 8518->8520 8519->8515 8519->8520 8520->8515 8521 4023dc GetProcAddress 8520->8521 8521->8515 8523 401952 12 API calls 8522->8523 8524 4021a0 8523->8524 8525 402211 8524->8525 8530 401a2b WriteFile 8524->8530 8525->8482 8525->8483 8527 4021b8 8531 401a4d FindCloseChangeNotification 8527->8531 8529 4021be 6 API calls 8529->8525 8530->8527 8531->8529 8533 4080fd 8532->8533 8534 40809f 8532->8534 8535 408112 8533->8535 8537 40a0ba 6 API calls 8533->8537 8536 40a12f 6 API calls 8534->8536 8538 4080c1 8534->8538 8535->8487 8536->8538 8539 40810e 8537->8539 8538->8487 8539->8487 8540->8504 8541->8506 8543 4011e8 8542->8543 8546 405d23 8542->8546 8548 405d54 8543->8548 8544 407cda 6 API calls 8544->8546 8545 405d40 8545->8543 8547 405d49 lstrcpyA 8545->8547 8546->8544 8546->8545 8547->8543 8549 405d87 8548->8549 8551 405d61 8548->8551 8549->8390 8550 407cda 6 API calls 8550->8551 8551->8549 8551->8550 8553 401571 2 API calls 8552->8553 8554 402855 8553->8554 8555 40288b 8554->8555 8556 40285c lstrlenA 8554->8556 8557 401571 2 API calls 8555->8557 8558 402871 8556->8558 8559 40286c lstrcpyA 8556->8559 8560 40289e 8557->8560 8562 40776b 12 API calls 8558->8562 8559->8555 8563 4028d4 8560->8563 8564 4028a5 lstrlenA 8560->8564 8562->8559 8567 40268e 8563->8567 8570 40776b 12 API calls 8563->8570 8565 4028b5 lstrcpyA 8564->8565 8566 4028ba 8564->8566 8565->8563 8569 40776b 12 API calls 8566->8569 8567->8250 8567->8252 8569->8565 8571 4028e2 8570->8571 8572 401571 2 API calls 8571->8572 8573 4028fb 8572->8573 8574 402906 lstrcpyA 8573->8574 8575 402919 wsprintfA 8573->8575 8574->8575 8575->8567 8577 402711 LoadImageA 8576->8577 8578 40556b 8576->8578 8577->8238 8578->8577 8579 405575 LocalAlloc 8578->8579 8579->8577 8580 405599 CreatePalette LocalFree 8579->8580 8580->8577 8583 406017 8582->8583 8584 406059 8582->8584 8583->8584 8651 406359 8583->8651 8584->8254 8586 406030 8586->8584 8587 406196 33 API calls 8586->8587 8588 406051 8587->8588 8588->8584 8589 40605d IsWindow 8588->8589 8590 4060c2 8589->8590 8595 406077 PeekMessageA 8589->8595 8591 406401 3 API calls 8590->8591 8591->8584 8593 4060b6 IsWindow 8593->8590 8593->8595 8594 40608e IsDialogMessageA 8594->8595 8596 40609e TranslateMessage DispatchMessageA 8594->8596 8595->8593 8595->8594 8596->8595 8598 4039d7 8597->8598 8599 403a2a lstrcpyA lstrcpyA 8598->8599 8614 403bf6 8598->8614 8661 40377b lstrlenA 8599->8661 8604 403a8d 8668 4037a6 lstrlenA 8604->8668 8605 403a7e lstrcpyA 8605->8604 8610 403af7 lstrcpyA wsprintfA 8612 403b30 lstrcatA lstrcatA 8610->8612 8613 403b49 8610->8613 8611 403aab ShellExecuteA 8611->8614 8615 403adb 8611->8615 8612->8613 8616 403b51 lstrcatA lstrcatA 8613->8616 8617 403b6a CreateDialogParamA CreateProcessA 8613->8617 8614->8256 8676 403ceb 8615->8676 8616->8617 8619 403bfa 8617->8619 8620 403bad 8617->8620 8623 403c2d MessageBoxA DestroyWindow 8619->8623 8626 401571 2 API calls 8619->8626 8622 403ceb 4 API calls 8620->8622 8625 403bb3 WaitForSingleObject 8622->8625 8623->8614 8624 403af2 8624->8614 8625->8620 8628 403bc6 GetExitCodeProcess CloseHandle CloseHandle DestroyWindow 8625->8628 8626->8623 8628->8614 8630 40402a 8629->8630 8631 40401f 8629->8631 8647 404033 8630->8647 8682 40418b GetTempFileNameA DeleteFileA 8630->8682 8743 403921 8631->8743 8635 404125 8637 404145 wsprintfA 8635->8637 8644 40416b DeleteFileA 8635->8644 8635->8647 8636 404070 lstrcpyA lstrlenA 8638 404098 8636->8638 8639 40411d 8636->8639 8640 4015dc 2 API calls 8637->8640 8641 401571 2 API calls 8638->8641 8719 404424 8639->8719 8640->8635 8643 4040b2 SetDlgItemTextA 8641->8643 8643->8639 8645 4040d4 wsprintfA 8643->8645 8644->8635 8646 4015dc 2 API calls 8645->8646 8648 4040f3 8646->8648 8647->8243 8648->8639 8648->8645 8649 4040fa 8648->8649 8649->8648 8749 405b08 CreateFileA 8649->8749 8658 406320 8651->8658 8653 406366 8654 406320 2 API calls 8653->8654 8657 406393 8653->8657 8655 406385 8654->8655 8656 40633e 2 API calls 8655->8656 8655->8657 8656->8657 8657->8586 8659 406327 GetProcessHeap HeapAlloc 8658->8659 8660 40633b 8658->8660 8659->8653 8660->8653 8662 40378f IsDBCSLeadByte 8661->8662 8663 40379d lstrcatA 8661->8663 8662->8663 8664 4015dc FindFirstFileA 8663->8664 8665 401635 8664->8665 8666 401619 FindClose 8664->8666 8665->8604 8665->8605 8666->8665 8669 4037be 8668->8669 8670 403c87 8669->8670 8671 403c96 8670->8671 8672 403aa5 8671->8672 8673 403c9e CompareStringA 8671->8673 8672->8610 8672->8611 8673->8672 8674 403cbd CompareStringA 8673->8674 8674->8672 8675 403cce CompareStringA 8674->8675 8675->8672 8677 403d09 PeekMessageA 8676->8677 8678 403d18 TranslateMessage DispatchMessageA 8677->8678 8679 403d2e 8677->8679 8678->8677 8679->8677 8680 403d33 Sleep 8679->8680 8681 403ae1 WaitForSingleObject 8679->8681 8680->8679 8681->8615 8681->8624 8683 40163b 4 API calls 8682->8683 8684 4041de lstrcatA 8683->8684 8758 4048d3 8684->8758 8687 401952 12 API calls 8688 404224 8687->8688 8689 40776b 12 API calls 8688->8689 8699 40404a 8688->8699 8690 404240 8689->8690 8773 4019f4 SetFilePointer 8690->8773 8692 404252 8693 40425a SendDlgItemMessageA 8692->8693 8714 40427a 8692->8714 8693->8714 8694 4043b8 8786 401a4d FindCloseChangeNotification 8694->8786 8695 404288 wsprintfA 8697 401952 12 API calls 8695->8697 8697->8714 8698 4043c0 8698->8699 8701 40781d ctype 7 API calls 8698->8701 8699->8635 8699->8636 8700 4043d6 DeleteFileA 8787 401a4d FindCloseChangeNotification 8700->8787 8701->8699 8704 4043eb 8705 4043f9 8704->8705 8707 40781d ctype 7 API calls 8704->8707 8705->8699 8707->8705 8708 401571 2 API calls 8712 40437a SetDlgItemTextA 8708->8712 8709 404415 8788 401a4d FindCloseChangeNotification 8709->8788 8710 4043fe 8710->8709 8713 40781d ctype 7 API calls 8710->8713 8777 4056ed 8712->8777 8713->8709 8714->8694 8714->8695 8714->8700 8714->8708 8714->8710 8717 403ceb 4 API calls 8714->8717 8774 401a09 ReadFile 8714->8774 8775 401a2b WriteFile 8714->8775 8776 401a4d FindCloseChangeNotification 8714->8776 8718 40431c SendDlgItemMessageA 8717->8718 8718->8714 8721 40446b 8719->8721 8720 40163b 4 API calls 8722 4044b4 8720->8722 8721->8720 8723 40377b 2 API calls 8722->8723 8724 4044bf 8723->8724 8725 4046a2 lstrcpynA 8724->8725 8726 4044d0 8725->8726 8727 404530 wsprintfA 8726->8727 8731 40450a 8726->8731 8882 404745 8726->8882 8728 4015dc 2 API calls 8727->8728 8736 40455f 8728->8736 8730 404523 8730->8727 8730->8731 8731->8635 8732 401952 12 API calls 8732->8736 8733 404694 8907 401a4d FindCloseChangeNotification 8733->8907 8736->8731 8736->8732 8736->8733 8737 4045ea wsprintfA 8736->8737 8738 4045bc SendDlgItemMessageA SendDlgItemMessageA SendDlgItemMessageA 8736->8738 8741 404650 wsprintfA 8736->8741 8894 40ebd2 8736->8894 8906 401a4d FindCloseChangeNotification 8736->8906 8897 40fb0b 8737->8897 8738->8737 8742 4015dc 2 API calls 8741->8742 8742->8736 8744 405731 12 API calls 8743->8744 8745 403927 lstrlenA 8744->8745 8746 40393d 8745->8746 8747 405777 7 API calls 8746->8747 8748 403944 8747->8748 8748->8630 8750 405b8a 8749->8750 8751 405b2d GetFileSize CreateFileMappingA 8749->8751 8750->8649 8752 405b82 CloseHandle 8751->8752 8753 405b4d MapViewOfFile 8751->8753 8752->8750 8754 405b60 8753->8754 8755 405b7a CloseHandle 8753->8755 9055 405b8f 8754->9055 8755->8752 8789 4046a2 lstrcpynA 8758->8789 8760 404905 8791 404ae3 8760->8791 8762 404205 8762->8687 8762->8699 8764 404995 LoadStringA 8765 401571 2 API calls 8764->8765 8766 4049c5 LoadStringA 8765->8766 8767 401571 2 API calls 8766->8767 8768 4049f0 wsprintfA 8767->8768 8797 4082b0 8768->8797 8771 404914 8771->8762 8772 404ae3 13 API calls 8771->8772 8794 404a84 8771->8794 8772->8771 8773->8692 8774->8714 8775->8714 8776->8714 8859 405731 8777->8859 8780 405727 8872 405777 8780->8872 8781 405717 8863 4057ce 8781->8863 8786->8698 8787->8704 8788->8699 8790 4046be 8789->8790 8790->8760 8802 405d91 GetModuleHandleA GetProcAddress 8791->8802 8795 404aa0 LoadStringA 8794->8795 8795->8764 8822 40a671 8797->8822 8800 404a3f MessageBoxA 8800->8762 8800->8771 8803 405dfb 8802->8803 8806 405e22 8802->8806 8804 405e00 lstrcpyA lstrcatA 8803->8804 8803->8806 8804->8806 8805 405e80 8808 405ea7 GetDiskFreeSpaceA 8805->8808 8816 405f1e LoadLibraryA GetProcAddress 8805->8816 8806->8805 8807 405e5d GetDiskFreeSpaceExA 8806->8807 8809 405e71 GetLastError 8807->8809 8810 404b16 8807->8810 8813 405ecb 8808->8813 8809->8805 8809->8810 8810->8771 8813->8810 8820 405fd5 LoadLibraryA GetProcAddress 8813->8820 8817 405f5a lstrlenA 8816->8817 8818 405ea0 8816->8818 8817->8818 8819 405f6e lstrlenA 8817->8819 8818->8808 8818->8810 8819->8818 8821 405f15 8820->8821 8821->8810 8823 4082de 8822->8823 8825 40a696 __aulldiv __aullrem 8822->8825 8823->8800 8829 40a55c 8823->8829 8824 40adb2 18 API calls 8824->8825 8825->8823 8825->8824 8826 40cd31 WideCharToMultiByte 8825->8826 8827 40ade7 18 API calls 8825->8827 8828 40ae18 18 API calls 8825->8828 8826->8825 8827->8825 8828->8825 8831 40a572 8829->8831 8838 40a5f6 8829->8838 8830 40a5cd 8832 40a5d7 8830->8832 8833 40a63b 8830->8833 8831->8830 8831->8838 8841 40cc0e 8831->8841 8835 40a5ee 8832->8835 8839 40a5fe 8832->8839 8834 40ca61 6 API calls 8833->8834 8834->8838 8844 40ca61 8835->8844 8838->8800 8839->8838 8854 40c9c7 8839->8854 8842 40776b 12 API calls 8841->8842 8843 40cc1e 8842->8843 8843->8830 8846 40ca7c 8844->8846 8853 40caab 8844->8853 8845 40cabf 8848 40cb91 WriteFile 8845->8848 8850 40cad0 8845->8850 8846->8845 8847 40c9c7 2 API calls 8846->8847 8846->8853 8847->8845 8849 40cbb3 GetLastError 8848->8849 8848->8853 8849->8853 8851 40cb1c WriteFile 8850->8851 8850->8853 8851->8850 8852 40cb86 GetLastError 8851->8852 8852->8853 8853->8838 8855 40c9ff 8854->8855 8856 40c9d6 8854->8856 8855->8838 8856->8855 8857 40ca0b SetFilePointer 8856->8857 8857->8855 8858 40ca23 GetLastError 8857->8858 8858->8855 8860 40573a 8859->8860 8862 4056f6 CreateFileA 8859->8862 8876 40838f 8860->8876 8862->8780 8862->8781 8864 4057de 8863->8864 8871 40571d FindCloseChangeNotification 8863->8871 8865 40838f 12 API calls 8864->8865 8866 4057f1 SetFilePointer 8865->8866 8867 405813 ReadFile 8866->8867 8868 405840 8867->8868 8869 405819 8867->8869 8879 40839d 8868->8879 8869->8867 8869->8868 8871->8780 8873 405780 8872->8873 8874 40572c 8872->8874 8875 40839d ctype 7 API calls 8873->8875 8874->8714 8875->8874 8877 40777d 12 API calls 8876->8877 8878 40839a 8877->8878 8878->8862 8880 40781d ctype 7 API calls 8879->8880 8881 4083a6 8880->8881 8881->8871 8883 404792 wsprintfA 8882->8883 8884 4015dc 2 API calls 8883->8884 8889 4047a2 8884->8889 8885 4048b3 8886 4048bc 8885->8886 8888 4048d3 40 API calls 8885->8888 8886->8730 8890 4048ce 8888->8890 8889->8883 8889->8885 8891 4047e6 LoadStringA 8889->8891 8908 401000 CreateFileA 8889->8908 8890->8730 8892 401571 2 API calls 8891->8892 8893 40485a GetSystemDirectoryA lstrcpynA wsprintfA MessageBoxA 8892->8893 8893->8885 8917 401a09 ReadFile 8894->8917 8895 40ebe8 8895->8736 8898 40fb46 8897->8898 8898->8898 8918 40f2f0 8898->8918 8900 40fc1e 8900->8736 8902 40fb5f 8902->8900 8904 401952 12 API calls 8902->8904 8922 40f5b4 8902->8922 8925 401a58 8902->8925 8954 40f9bc 8902->8954 8904->8902 8906->8736 8907->8731 8909 40103b CreateFileMappingA 8908->8909 8910 4010bc 8908->8910 8911 4010b3 CloseHandle 8909->8911 8912 40104f MapViewOfFile 8909->8912 8910->8889 8911->8910 8913 4010a9 CloseHandle 8912->8913 8916 401062 8912->8916 8913->8911 8914 40109d UnmapViewOfFile 8914->8913 8915 40109c 8915->8914 8916->8914 8916->8915 8917->8895 8919 40f30a 8918->8919 8920 40f394 8919->8920 8966 401a09 ReadFile 8919->8966 8920->8902 8967 401a09 ReadFile 8922->8967 8923 40f5c8 8923->8902 8926 403ceb 4 API calls 8925->8926 8927 401a85 8926->8927 8928 401a99 8927->8928 8929 401a93 8927->8929 8930 401af9 8927->8930 8928->8902 8931 401ac5 8929->8931 8932 401a96 8929->8932 8990 404cc1 8930->8990 8968 404b38 lstrcpyA 8931->8968 8932->8928 8935 401aa1 wsprintfA 8932->8935 8935->8928 8937 401b16 8937->8928 8940 404b38 11 API calls 8937->8940 8938 401add 8981 401a4d FindCloseChangeNotification 8938->8981 8939 404ae3 13 API calls 8939->8937 8942 401b40 8940->8942 8942->8928 8945 4015dc 2 API calls 8942->8945 8943 401ae5 8982 404c26 8943->8982 8946 401b7e 8945->8946 8947 401b8d 8946->8947 8948 401b94 8946->8948 8947->8928 8949 401bc2 GetFileAttributesA SetFileAttributesA 8947->8949 8999 404d9b 8948->8999 8951 401952 12 API calls 8949->8951 8951->8928 8953 401bb8 8953->8928 8955 40f9d0 8954->8955 8956 40fa77 8954->8956 9021 40f95b 8955->9021 8964 401a58 97 API calls 8956->8964 9028 401a4d FindCloseChangeNotification 8956->9028 8958 40fa4e 8958->8902 8959 40f9f0 8959->8958 8961 40fa0a 8959->8961 9029 40f8ba 8959->9029 8961->8956 8961->8958 8962 40f8ba ReadFile 8961->8962 9027 401a2b WriteFile 8961->9027 8962->8961 8964->8958 8966->8920 8967->8923 8969 404b7b 8968->8969 8970 404b8f lstrcpyA 8969->8970 8971 404ba7 8970->8971 8972 404be9 lstrcatA 8970->8972 8971->8972 8973 404bcd 8971->8973 8974 404bba lstrcatA 8971->8974 8972->8938 8975 4015c3 GetFileAttributesA 8973->8975 8974->8973 8976 404bd6 8975->8976 8977 404be1 8976->8977 8978 40163b 4 API calls 8976->8978 8979 40377b 2 API calls 8977->8979 8978->8977 8980 404be8 8979->8980 8980->8972 8981->8943 8983 401952 12 API calls 8982->8983 8984 404c47 8983->8984 8985 404c52 DosDateTimeToFileTime 8984->8985 8986 404cae SetFileAttributesA 8984->8986 8987 404ca4 CloseHandle 8985->8987 8988 404c75 LocalFileTimeToFileTime 8985->8988 8986->8928 8987->8986 8988->8987 8989 404c91 SetFileTime 8988->8989 8989->8987 8991 401b04 8990->8991 8992 404cd9 8990->8992 8991->8937 8991->8939 8992->8991 8993 404d17 8992->8993 8994 404d0e CharNextA 8992->8994 8995 401571 2 API calls 8993->8995 8994->8993 8996 404d30 8995->8996 8997 404d37 LoadStringA 8996->8997 8998 404d4d wsprintfA SetDlgItemTextA SendDlgItemMessageA 8996->8998 8997->8998 8998->8991 9000 404db2 GetParent 8999->9000 9001 404dad 8999->9001 9000->9001 9002 404de2 9001->9002 9003 404dc8 IsWindowEnabled 9001->9003 9005 406196 33 API calls 9002->9005 9003->9002 9004 404dd3 EnableWindow 9003->9004 9004->9002 9006 404e02 9005->9006 9007 404e12 ShowWindow UpdateWindow 9006->9007 9008 404e94 9006->9008 9011 404e80 SetWindowPos 9007->9011 9012 404e2b 9007->9012 9009 404ea2 9008->9009 9010 404e99 EnableWindow 9008->9010 9013 404ea6 GetActiveWindow 9009->9013 9014 404eb7 DestroyWindow 9009->9014 9010->9009 9011->9008 9015 404e3e PeekMessageA 9012->9015 9020 404e7d 9012->9020 9013->9014 9016 404eb0 SetActiveWindow 9013->9016 9018 401ba4 9014->9018 9015->9012 9017 404e4d IsDialogMessageA 9015->9017 9016->9014 9017->9015 9019 404e5e TranslateMessage DispatchMessageA 9017->9019 9018->8928 9018->8949 9018->8953 9019->9015 9020->9011 9022 40f969 9021->9022 9023 40f96e 9021->9023 9022->8959 9023->9022 9039 40f6a0 9023->9039 9025 40f99e 9025->9022 9026 40f8ba ReadFile 9025->9026 9026->9022 9027->8961 9028->8958 9030 40f8d5 9029->9030 9031 40f8db 9029->9031 9047 40f78f 9030->9047 9035 40f914 9031->9035 9044 40ecfe 9031->9044 9034 40f8ee 9034->9035 9036 40f78f ReadFile 9034->9036 9035->8959 9037 40f902 9036->9037 9037->9035 9038 40ecfe ReadFile 9037->9038 9038->9035 9040 40f6cf 9039->9040 9041 40f6ed 9040->9041 9043 401a09 ReadFile 9040->9043 9041->9025 9043->9041 9054 401a09 ReadFile 9044->9054 9045 40ed1f 9045->9034 9050 40f7db 9047->9050 9048 40f2f0 ReadFile 9048->9050 9049 40f873 9049->9031 9050->9048 9050->9049 9051 40f6a0 ReadFile 9050->9051 9052 40f86a 9050->9052 9051->9050 9052->9049 9053 40f5b4 ReadFile 9052->9053 9053->9052 9054->9045 9062 405ab3 lstrlenA 9055->9062 9058 405b6e UnmapViewOfFile 9058->8755 9059 405ba9 lstrlenA 9061 405bba 9059->9061 9060 40839d ctype 7 API calls 9060->9058 9061->9060 9063 40838f 12 API calls 9062->9063 9064 405adc 9063->9064 9064->9058 9064->9059 9087 4053a3 lstrcpyA 9065->9087 9067 405245 9068 405267 FindFirstFileA 9067->9068 9070 405260 DeleteFileA 9067->9070 9080 40524a 9067->9080 9069 405356 lstrcpyA lstrlenA RemoveDirectoryA 9068->9069 9081 405287 9068->9081 9071 405386 9069->9071 9069->9080 9070->9068 9077 405402 10 API calls 9071->9077 9071->9080 9072 4052d7 lstrcpyA lstrcatA 9075 4052fa SetFileAttributesA 9072->9075 9076 40530c DeleteFileA 9072->9076 9073 405335 FindNextFileA 9079 40534d FindClose 9073->9079 9073->9081 9074 40529d lstrcpyA lstrcatA lstrcatA 9078 4051e0 11 API calls 9074->9078 9075->9076 9076->9073 9076->9081 9077->9080 9078->9081 9079->9069 9080->8273 9081->9072 9081->9073 9081->9074 9089 405402 9081->9089 9084 404fb6 9083->9084 9085 40550e FreeLibrary DeleteFileA 9083->9085 9084->8281 9084->8282 9085->9084 9088 4053d0 9087->9088 9088->9067 9090 408360 9089->9090 9091 40540f MoveFileExA 9090->9091 9092 405427 GetPrivateProfileSectionA GetShortPathNameA 9091->9092 9093 4054fe 9091->9093 9094 40549d 9092->9094 9095 40548d lstrcpyA 9092->9095 9093->9081 9096 4054a1 WritePrivateProfileStringA 9094->9096 9097 4054b7 lstrcatA lstrcatA lstrcatA lstrcatA WritePrivateProfileSectionA 9094->9097 9095->9094 9096->9093 9097->9093 9349 40cc78 9350 40cc85 9349->9350 9357 40da7c 9350->9357 9352 40cc9f 9353 40da7c 12 API calls 9352->9353 9356 40ccca 9352->9356 9354 40ccb8 9353->9354 9355 408bed 7 API calls 9354->9355 9354->9356 9355->9356 9358 40da90 9357->9358 9359 40dae7 HeapAlloc 9358->9359 9360 4091bf 5 API calls 9358->9360 9361 40996c 6 API calls 9358->9361 9362 40db12 9358->9362 9359->9358 9359->9362 9360->9358 9361->9358 9362->9352 9363 4031f8 9364 4033cb 9363->9364 9365 40320e 9363->9365 9366 4033db GetParent 9364->9366 9391 4033c3 9364->9391 9367 40321b GetDC 9365->9367 9365->9391 9368 401571 2 API calls 9366->9368 9369 4035da 9 API calls 9367->9369 9370 403416 9368->9370 9371 403261 9369->9371 9372 403436 SendMessageA GetDlgItem EnableWindow 9370->9372 9373 40341d LoadStringA 9370->9373 9374 405647 10 API calls 9371->9374 9372->9391 9373->9372 9375 403267 9374->9375 9376 401571 2 API calls 9375->9376 9377 403280 wsprintfA SetDlgItemTextA 9376->9377 9378 401571 2 API calls 9377->9378 9379 4032c6 wsprintfA SetDlgItemTextA 9378->9379 9380 401571 2 API calls 9379->9380 9381 403306 9380->9381 9382 40330d LoadStringA 9381->9382 9383 403322 9381->9383 9382->9383 9384 403338 GetDeviceCaps MulDiv lstrcpyA GetSystemDefaultLCID 9383->9384 9386 40811f 6 API calls 9383->9386 9387 403393 CreateFontIndirectA 9384->9387 9388 40338f 9384->9388 9386->9384 9389 4033b1 9387->9389 9390 4033a1 SendDlgItemMessageA 9387->9390 9388->9387 9389->9391 9392 4033b7 ReleaseDC 9389->9392 9390->9389 9392->9391 9569 40d63c 9570 40d64b 9569->9570 9571 40d66e 9570->9571 9572 40d6d8 IsBadCodePtr 9570->9572 9572->9571 9393 402cfd 9394 402db4 9393->9394 9395 402d0f 9393->9395 9399 402e01 IsDlgButtonChecked 9394->9399 9400 402dcc 9394->9400 9417 402d53 9394->9417 9396 402d16 9395->9396 9397 402d5c 9395->9397 9408 4037c2 5 API calls 9396->9408 9410 402d2d 9396->9410 9396->9417 9398 402d6b SetDlgItemTextA 9397->9398 9413 402d93 9397->9413 9402 402d82 CheckDlgButton 9398->9402 9403 402d97 CheckDlgButton 9398->9403 9401 402e27 IsDlgButtonChecked 9399->9401 9399->9417 9405 402dd3 GetParent 9400->9405 9400->9417 9406 402e3f 9401->9406 9401->9417 9427 402cbd 6 API calls 9402->9427 9403->9413 9404 4035da 9 API calls 9404->9417 9411 402dea 9405->9411 9412 402ded PostMessageA 9405->9412 9415 402e66 GetDlgItemTextA 9406->9415 9406->9417 9418 40776b 12 API calls 9406->9418 9408->9410 9409 402d40 9409->9417 9426 402cbd 6 API calls 9409->9426 9410->9409 9425 402cbd 6 API calls 9410->9425 9411->9412 9412->9417 9413->9404 9419 4036c1 13 API calls 9415->9419 9420 402e60 9418->9420 9421 402e81 9419->9421 9420->9415 9421->9417 9422 40163b 4 API calls 9421->9422 9424 402e9f 9421->9424 9422->9424 9423 403466 6 API calls 9423->9417 9424->9417 9424->9423 9425->9409 9426->9417 9427->9413

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 462 405d91-405df9 GetModuleHandleA GetProcAddress 463 405e22-405e38 462->463 464 405dfb-405dfe 462->464 466 405e3e-405e47 463->466 464->463 465 405e00-405e20 lstrcpyA lstrcatA 464->465 465->466 467 405e80-405e86 466->467 468 405e49-405e55 466->468 471 405ea7-405ec9 GetDiskFreeSpaceA 467->471 472 405e88-405ea5 call 405f1e 467->472 469 405e57 468->469 470 405e5d-405e6b GetDiskFreeSpaceExA 468->470 469->470 473 405e71-405e7a GetLastError 470->473 474 405f16 470->474 476 405f01-405f07 471->476 477 405ecb-405efe call 405fac * 2 471->477 472->471 479 405f19-405f1d 472->479 473->467 473->474 474->479 476->474 478 405f09-405f15 call 405fd5 476->478 477->476 478->474
                                    APIs
                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,?,00000000,00000000), ref: 00405DE1
                                    • GetProcAddress.KERNEL32(00000000), ref: 00405DE8
                                    • lstrcpyA.KERNEL32(?,00000000), ref: 00405E08
                                    • lstrcatA.KERNEL32(?,004161DC), ref: 00405E1A
                                    • GetDiskFreeSpaceExA.KERNELBASE(?,?,00000000,00000000), ref: 00405E63
                                    • GetLastError.KERNEL32 ref: 00405E71
                                    • GetDiskFreeSpaceA.KERNEL32(?,00000000,?,00000000,?), ref: 00405EBE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: DiskFreeSpace$AddressErrorHandleLastModuleProclstrcatlstrcpy
                                    • String ID: GetDiskFreeSpaceExA$\$kernel32.dll
                                    • API String ID: 2937180275-1329531721
                                    • Opcode ID: bd0698738c333c5dc5862f577d2e6214fa4afd04b14ab129e7b630fbd0fef842
                                    • Instruction ID: 92d6951060e45e4071b0f5d3efcb2b2f2fe8f54583db33c88d3efe1b2e9e5334
                                    • Opcode Fuzzy Hash: bd0698738c333c5dc5862f577d2e6214fa4afd04b14ab129e7b630fbd0fef842
                                    • Instruction Fuzzy Hash: B7414D7594525DAFCB11DFA4CC499DFBFB9EB58300F1080AAE648A7241D6389B84CFA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindFirstFileA.KERNELBASE(00000000,00000000,%spftw%d.pkg,75A78400), ref: 00401605
                                    • FindClose.KERNELBASE(00000000), ref: 0040162F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Find$CloseFileFirst
                                    • String ID: %spftw%d.pkg
                                    • API String ID: 2295610775-1047716302
                                    • Opcode ID: 3865e289dbaa9492bba03545ca4bdafdd2334831079d820538fb2cf8c4fbf330
                                    • Instruction ID: 52ddb956fd1807f357e09408323b0021ae3a63876aabf2419024c5df83f227e8
                                    • Opcode Fuzzy Hash: 3865e289dbaa9492bba03545ca4bdafdd2334831079d820538fb2cf8c4fbf330
                                    • Instruction Fuzzy Hash: 3EF090739001346BCF314A25DC087DA7774AB44735F054675E919BB1E0C6349E84CAC4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 406d90-406db1 call 40646c 3 406db3-406db5 0->3 4 406db7 0->4 5 406dba-406dc4 3->5 4->5 6 40730a-407311 5->6 7 406dca 5->7 8 4074b0-4074b2 6->8 9 407317-40731c 6->9 10 406dd0-406dd4 7->10 11 407303-407305 7->11 17 4074c0 8->17 18 4074b4 8->18 15 407322-407323 9->15 16 407459-407462 9->16 12 4072e0-4072e2 10->12 13 406dda-406ddd 10->13 14 4074b7 11->14 19 4072e8-4072ed 12->19 20 406e8c-406e8f 12->20 22 406de3-406de6 13->22 23 4072bd-4072bf 13->23 14->17 21 4074b9-4074ba call 406d1d 14->21 25 407329-40732b 15->25 26 4073bb-4073ef GetDlgItem * 3 15->26 27 407464-407467 16->27 28 407469-40749e LoadStringA 16->28 24 4074c7-4074cc 17->24 18->14 19->20 31 4072f3-4072fe 19->31 32 4074e7-4074eb 20->32 48 4074bf 21->48 34 40722c-40722e 22->34 35 406dec-406def 22->35 23->24 41 4072c5-4072cd 23->41 36 4074e4 24->36 37 4074ce-4074d3 24->37 38 4073a0-4073a2 25->38 39 40732d-40732e 25->39 29 4073f1-4073f3 26->29 30 4073f5-4073fa ShowWindow 26->30 40 4074a7-4074ae SetWindowTextA 27->40 28->17 42 4074a0-4074a6 28->42 43 4073fc-40740d KiUserCallbackDispatcher 29->43 30->43 31->20 34->24 46 407234-40726d GetSysColorBrush GetClientRect FillRect DeleteObject 34->46 44 406df5-406dfa 35->44 45 407117-40711e 35->45 36->32 37->36 49 4074d5-4074e1 37->49 38->36 51 4073a8-4073b6 call 4067ad 38->51 39->24 50 407334-40739b GetDlgItem * 2 ShowWindow GetDlgItem ShowWindow SetWindowTextA EnableWindow ShowWindow SendMessageA 39->50 40->17 41->24 47 4072d3-4072d5 call 406a0f 41->47 42->40 53 407413-40741a ShowWindow 43->53 54 40740f-407411 43->54 56 406e00-406e01 44->56 57 406f73-406f8c call 406802 call 40678a 44->57 45->24 52 407124-407227 SendMessageA GetWindowTextA GetObjectA CreateFontIndirectA SelectObject SetBkMode GetSysColor SetTextColor call 4076f0 TextOutA SetBkMode GetSysColor SetTextColor call 4076f0 TextOutA SetBkMode SetTextColor SelectObject DeleteObject 45->52 58 407276 46->58 59 40726f-407274 46->59 67 4072da-4072db 47->67 48->17 49->36 50->24 51->24 52->24 63 40741c-407427 KiUserCallbackDispatcher 53->63 54->63 56->24 64 406e07-406e24 GetWindowLongA 56->64 90 406f96-406fa0 57->90 91 406f8e-406f90 57->91 65 40727b-4072b8 GetDlgItem GetWindowRect ScreenToClient CreateSolidBrush FillRect DeleteObject 58->65 59->65 71 407429-407435 ShowWindow * 2 63->71 72 40743a-407457 ShowWindow * 2 EnableWindow 63->72 73 406e2a-406e2d 64->73 74 406f3d-406f5e SendMessageA 64->74 65->17 67->48 71->17 72->17 79 406f21-406f38 SendMessageA 73->79 80 406e33-406e38 73->80 77 406f60-406f6b call 4062d6 74->77 78 406f6c-406f6e 74->78 77->78 78->32 79->20 84 406edc-406ef7 SendMessageA 80->84 85 406e3e-406e3f 80->85 84->20 92 406ef9-406efd 84->92 88 406e41-406e42 85->88 89 406e94-406eaf SendMessageA 85->89 88->24 96 406e48-406e63 SendMessageA 88->96 89->20 95 406eb1-406eb5 89->95 93 406fa2-406fbe GetDlgItem ShowWindow GetDlgItem ShowWindow 90->93 94 406fc4-406fc8 90->94 91->90 97 406eb7-406ec2 call 4067ad 92->97 98 406eff-406f0c call 4067e0 92->98 93->94 101 406fe0-406fe4 94->101 102 406fca-406fda GetWindowLongA SetWindowLongA 94->102 95->97 103 406ec4-406eda call 4067e0 call 40678a 95->103 99 406e65-406e6d call 4062d6 96->99 100 406e76-406e81 IsWindow 96->100 114 406e72-406e74 97->114 98->20 113 406f12-406f1c call 40678a 98->113 99->114 100->20 111 406e83-406e86 SetFocus 100->111 106 406ff3-4070d9 MapDialogRect GetDlgItem GetWindowRect ScreenToClient SetWindowPos GetDlgItem GetWindowRect ScreenToClient SetWindowPos GetDlgItem GetWindowRect ScreenToClient SetWindowPos GetDlgItem ShowWindow 101->106 107 406fe6-406fed 101->107 102->101 103->20 115 4070dc-4070f5 call 406253 ShowWindow 106->115 107->106 107->115 111->20 113->114 114->20 123 407105-407112 call 40678a 115->123 124 4070f7-407102 115->124 123->32 124->123
                                    APIs
                                    • GetWindowLongA.USER32(?,000000F4), ref: 00406E15
                                    • SendMessageA.USER32(?,0000004E,00000000,?), ref: 00406E59
                                    • IsWindow.USER32(00000000), ref: 00406E79
                                    • SetFocus.USER32(00000000), ref: 00406E86
                                    • SendMessageA.USER32(?,0000004E,00000000,?), ref: 00406EA5
                                    • SendMessageA.USER32(?,0000004E,00000000,?), ref: 00406EED
                                    • SendMessageA.USER32(?,0000004E,00000000,?), ref: 00406F32
                                    • SendMessageA.USER32(?,0000004E,00000000,?), ref: 00406F54
                                      • Part of subcall function 00406802: GetDC.USER32(?), ref: 00406838
                                      • Part of subcall function 00406802: SendMessageA.USER32(?,00000031,00000000,00000000), ref: 00406856
                                      • Part of subcall function 00406802: GetObjectA.GDI32(00000000,0000003C,?), ref: 00406866
                                      • Part of subcall function 00406802: CreateFontIndirectA.GDI32(?), ref: 00406877
                                      • Part of subcall function 00406802: SelectObject.GDI32(?,00000000), ref: 00406887
                                      • Part of subcall function 00406802: GetDlgItem.USER32(?,000003EE), ref: 004068A0
                                      • Part of subcall function 00406802: GetWindowTextA.USER32(00000000,?,?), ref: 004068A3
                                      • Part of subcall function 00406802: GetTextExtentPointA.GDI32(?,?,00000000,?), ref: 004068BF
                                      • Part of subcall function 00406802: SelectObject.GDI32(?,?), ref: 004068CB
                                      • Part of subcall function 00406802: DeleteObject.GDI32(00000000), ref: 004068CE
                                      • Part of subcall function 00406802: ReleaseDC.USER32(?,?), ref: 004068DB
                                      • Part of subcall function 00406802: GetDlgItem.USER32(?,000003ED), ref: 004068EB
                                      • Part of subcall function 00406802: GetWindowRect.USER32(00000000), ref: 004068EE
                                      • Part of subcall function 00406802: ScreenToClient.USER32(?,?), ref: 004068F9
                                    • GetDlgItem.USER32(?,00003024), ref: 00406FAA
                                    • ShowWindow.USER32(00000000), ref: 00406FAD
                                    • GetDlgItem.USER32(?,00003025), ref: 00406FBB
                                    • ShowWindow.USER32(00000000), ref: 00406FBE
                                    • GetWindowLongA.USER32(?,000000EC), ref: 00406FCD
                                    • SetWindowLongA.USER32(?,000000EC,00000000), ref: 00406FDA
                                    • MapDialogRect.USER32(?,00000039), ref: 00407007
                                    • GetDlgItem.USER32(?,00003023), ref: 00407019
                                    • GetWindowRect.USER32(00000000,00000039), ref: 00407029
                                    • ScreenToClient.USER32(?,00000039), ref: 00407036
                                    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,00000205), ref: 0040704F
                                    • GetDlgItem.USER32(?,00003024), ref: 0040705D
                                    • GetWindowRect.USER32(00000000,00000039), ref: 00407067
                                    • ScreenToClient.USER32(?,00000039), ref: 00407070
                                    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,00000205), ref: 00407089
                                    • GetDlgItem.USER32(?,00000002), ref: 00407094
                                    • GetWindowRect.USER32(00000000,00000039), ref: 0040709E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Window$Item$MessageSend$Rect$Object$ClientLongScreen$SelectShowText$CreateDeleteDialogExtentFocusFontIndirectPointRelease
                                    • String ID: $9
                                    • API String ID: 1961577443-1776416348
                                    • Opcode ID: 2128e12344de0dcaa728f413d396f62ef204cd3c496764aef39c84a806a7d500
                                    • Instruction ID: 325b898f0c554f3b5a365d71ae4ac57afced135a56463732b19fc282220d452c
                                    • Opcode Fuzzy Hash: 2128e12344de0dcaa728f413d396f62ef204cd3c496764aef39c84a806a7d500
                                    • Instruction Fuzzy Hash: 07226A71904209BFEB219FA0DC49FAF7F78EB44350F108166FA05B61E0D778AA51CB69
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • BeginPaint.USER32(00000000,00000000,?,?,?), ref: 00406A4B
                                    • SetTextColor.GDI32(00000000,00000000), ref: 00406A56
                                    • SetBkColor.GDI32(00000000,00FFFFFF), ref: 00406A65
                                    • SetBkMode.GDI32(00000000,00000001), ref: 00406A71
                                    • MapDialogRect.USER32(?,0000000E), ref: 00406A9C
                                      • Part of subcall function 00406938: MapDialogRect.USER32(?,?), ref: 00406971
                                      • Part of subcall function 00406938: GetClientRect.USER32(?,?), ref: 0040697C
                                      • Part of subcall function 00406938: GetDlgItem.USER32(?,000003EC), ref: 0040698C
                                      • Part of subcall function 00406938: GetWindowRect.USER32(00000000), ref: 00406993
                                      • Part of subcall function 00406938: ScreenToClient.USER32(?,00000000), ref: 004069A4
                                      • Part of subcall function 00406938: ScreenToClient.USER32(?,?), ref: 004069AB
                                      • Part of subcall function 00406938: GetObjectA.GDI32(?,00000018,00000000), ref: 004069DF
                                    • CreateCompatibleDC.GDI32(00000000), ref: 00406AC0
                                    • SelectObject.GDI32(00000000,?), ref: 00406ACD
                                    • SelectPalette.GDI32(00000000,?,00000000), ref: 00406AE7
                                    • RealizePalette.GDI32(00000000), ref: 00406AED
                                    • SelectPalette.GDI32(?,?,00000000), ref: 00406AFB
                                    • RealizePalette.GDI32(?), ref: 00406B03
                                    • BitBlt.GDI32(00000000,00000000,004072DA,00000000,?,?,00000000,00000000,00CC0020), ref: 00406B22
                                    • SelectPalette.GDI32(00000000,?,00000000), ref: 00406B39
                                    • SelectPalette.GDI32(?,?,00000000), ref: 00406B43
                                    • SelectObject.GDI32(?,?), ref: 00406B4B
                                    • DeleteDC.GDI32(?), ref: 00406B54
                                    • lstrcpynA.KERNEL32(00000000,?,000003FF,?,?,?), ref: 00406BBE
                                    • LoadStringA.USER32(?,?,00000000,000003FF), ref: 00406BD4
                                    • SelectObject.GDI32(00000000), ref: 00406BE7
                                    • lstrlenA.KERNEL32(00000000,?,?,?), ref: 00406BF3
                                    • TextOutA.GDI32(00000000,0000000E,00000007,00000000,00000000), ref: 00406C08
                                    • SelectObject.GDI32(00000000,?), ref: 00406C12
                                    • lstrcpynA.KERNEL32(00000000,?,000003FF,?,?,?), ref: 00406C5E
                                    • LoadStringA.USER32(?,?,00000000,000003FF), ref: 00406C74
                                    • SetTextColor.GDI32(00000000,00000000), ref: 00406C7E
                                    • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 00406C8A
                                    • SelectObject.GDI32(00000000,00000000), ref: 00406C98
                                    • lstrlenA.KERNEL32(00000000,00000000,00000110,?,?,?), ref: 00406CD1
                                    • DrawTextA.USER32(00000000,00000000,00000000,?,?), ref: 00406CE0
                                    • SelectObject.GDI32(00000000,00000000), ref: 00406CE8
                                    • SetTextColor.GDI32(00000000,?), ref: 00406CEE
                                    • SetBkColor.GDI32(00000000,?), ref: 00406CF8
                                    • SetBkMode.GDI32(00000000,?), ref: 00406D02
                                    • EndPaint.USER32(?,00000000,?,?,?), ref: 00406D12
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Select$Object$Palette$ColorText$Rect$Client$DialogLoadModePaintRealizeScreenStringlstrcpynlstrlen$BeginCompatibleCreateDeleteDrawItemMessageSendWindow
                                    • String ID:
                                    • API String ID: 2495339399-0
                                    • Opcode ID: 70a1948f605934383ac0826acf733074179f260bd10e8264eeb456a2f2ae3d74
                                    • Instruction ID: fc9bf2122e16e31c65f0edb3fb32f6a371984d372c80fd78965b2cd2519e2c4a
                                    • Opcode Fuzzy Hash: 70a1948f605934383ac0826acf733074179f260bd10e8264eeb456a2f2ae3d74
                                    • Instruction Fuzzy Hash: B4A10AB2900218BFDF119FA5DC48FEEBBB9EB88300F118465F605A6160DB759A45CF68
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 151 403951-4039d5 GetStartupInfoA 152 403a04-403a0a 151->152 153 4039d7-4039dd 151->153 156 403a10-403a17 152->156 157 403bf6-403bf8 152->157 154 4039fe 153->154 155 4039df-4039e0 153->155 154->152 158 4039e2-4039e3 155->158 159 4039f6-4039fc 155->159 161 403a24 156->161 162 403a19-403a1f 156->162 160 403c67-403c6b 157->160 163 4039e5-4039e6 158->163 164 4039ee-4039f4 158->164 159->152 166 403a2a-403a7c lstrcpyA * 2 call 40377b lstrcatA call 4015dc 161->166 162->161 165 403a21-403a22 162->165 163->152 168 4039e8-4039ec 163->168 164->152 165->166 172 403a8d-403aa9 call 4037a6 call 403c87 166->172 173 403a7e-403a8b lstrcpyA 166->173 168->152 178 403af7-403b2e lstrcpyA wsprintfA 172->178 179 403aab-403ad5 ShellExecuteA 172->179 173->172 180 403b30-403b47 lstrcatA * 2 178->180 181 403b49-403b4f 178->181 182 403c64-403c66 179->182 183 403adb-403af0 call 403ceb WaitForSingleObject 179->183 180->181 184 403b51-403b68 lstrcatA * 2 181->184 185 403b6a-403bab CreateDialogParamA CreateProcessA 181->185 182->160 193 403af2 183->193 184->185 187 403bfa-403c16 185->187 188 403bad-403bc4 call 403ceb WaitForSingleObject 185->188 191 403c18-403c23 187->191 192 403c3e-403c3f 187->192 197 403bc6-403bf0 GetExitCodeProcess CloseHandle * 2 DestroyWindow 188->197 195 403c28-403c32 call 401571 191->195 196 403c44-403c5e MessageBoxA DestroyWindow 192->196 193->157 195->192 199 403c34-403c3c 195->199 196->182 197->157 199->196
                                    APIs
                                    • GetStartupInfoA.KERNEL32(00000044), ref: 004039C7
                                    • lstrcpyA.KERNEL32(?), ref: 00403A37
                                    • lstrcpyA.KERNEL32(?,?), ref: 00403A47
                                    • lstrcatA.KERNEL32(?), ref: 00403A69
                                    • lstrcpyA.KERNEL32(?), ref: 00403A8B
                                    • ShellExecuteA.SHELL32(00000000,open,?,?,?), ref: 00403ACA
                                    • WaitForSingleObject.KERNEL32(00000000,00000064), ref: 00403AE5
                                    • lstrcpyA.KERNEL32(?,?), ref: 00403B05
                                    • wsprintfA.USER32 ref: 00403B1A
                                    • lstrcatA.KERNEL32(?,00416198), ref: 00403B38
                                    • lstrcatA.KERNEL32(?), ref: 00403B47
                                    • lstrcatA.KERNEL32(?,00416198), ref: 00403B59
                                    • lstrcatA.KERNEL32(?), ref: 00403B68
                                    • CreateDialogParamA.USER32(000003F1,00000000,00403C6C,00000000), ref: 00403B7C
                                    • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000044,'@), ref: 00403BA3
                                    • WaitForSingleObject.KERNEL32('@,00000064), ref: 00403BB9
                                    • GetExitCodeProcess.KERNEL32(?,00419184), ref: 00403BCE
                                    • CloseHandle.KERNEL32(?), ref: 00403BDD
                                    • CloseHandle.KERNEL32(?), ref: 00403BE2
                                    • DestroyWindow.USER32 ref: 00403BEA
                                    • MessageBoxA.USER32(00000000,?,Unable to Execute!,00000000), ref: 00403C4C
                                    • DestroyWindow.USER32 ref: 00403C58
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: lstrcat$lstrcpy$CloseCreateDestroyHandleObjectProcessSingleWaitWindow$CodeDialogExecuteExitInfoMessageParamShellStartupwsprintf
                                    • String ID: "%s"$D$Strings$Unable to Execute!$open$'@
                                    • API String ID: 1896985139-3588045727
                                    • Opcode ID: 5dcdf86d8e5bba0ee679ec8469a58437ae7261332dc5fdd2d60144b64f352523
                                    • Instruction ID: 66ff821db165f6eaabc3674bee287e742f63bf39accf5313915da3539a68e934
                                    • Opcode Fuzzy Hash: 5dcdf86d8e5bba0ee679ec8469a58437ae7261332dc5fdd2d60144b64f352523
                                    • Instruction Fuzzy Hash: FB914FB2900259BAEB10DFA5DC89EDA7B7CEB48345F1044B6E605F6290DB749F84CF18
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,00000000,00020019,?,?,00000104,00000000,?,?,?,?,004012AF), ref: 00401346
                                    • RegQueryValueExA.KERNELBASE(?,ProgramFilesDir,00000000,?,?,?,00000104,00000000), ref: 00401386
                                    • lstrlenA.KERNEL32(?,00000104,00000000), ref: 0040138E
                                    • RegQueryValueExA.KERNELBASE(?,CommonFilesDir,00000000,00000001,?,00000104,00000000), ref: 004013BE
                                    • lstrlenA.KERNEL32 ref: 004013C6
                                    • RegCloseKey.KERNELBASE(?,?,?,?,004012AF), ref: 004013DE
                                    • GetWindowsDirectoryA.KERNEL32(00000104,?,00000104,00000000,?,?,?,?,004012AF), ref: 004013EB
                                    • lstrlenA.KERNEL32(?,00000104,00000000,?,?,?,?,004012AF), ref: 004013F7
                                    • lstrcatA.KERNEL32(\SYSTEM32,00000104,00000000,?,?,?,?,004012AF), ref: 0040141D
                                    • lstrlenA.KERNEL32(?,?,?,?,004012AF), ref: 00401425
                                    • GetSystemDirectoryA.KERNEL32(00000104), ref: 00401441
                                    • lstrlenA.KERNEL32(?,?,?,004012AF), ref: 0040144D
                                    • GetTempPathA.KERNELBASE(00000104,?,?,004012AF), ref: 00401469
                                    • lstrlenA.KERNEL32(?,004012AF), ref: 0040149F
                                    • lstrcpyA.KERNEL32(?,004012AF), ref: 004014C2
                                    • lstrcatA.KERNEL32(\TEMP,?,004012AF), ref: 004014CF
                                    • lstrlenA.KERNEL32(?,004012AF), ref: 004014D7
                                      • Part of subcall function 0040163B: CreateDirectoryA.KERNELBASE(?,00000000,75920440), ref: 00401650
                                      • Part of subcall function 0040163B: GetLastError.KERNEL32(759183C0), ref: 00401657
                                    • lstrcpyA.KERNEL32(004012AF), ref: 00401504
                                    • lstrlenA.KERNEL32 ref: 00401522
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: lstrlen$Directory$QueryValuelstrcatlstrcpy$CloseCreateErrorLastOpenPathSystemTempWindows
                                    • String ID: CommonFilesDir$ProgramFilesDir$SOFTWARE\Microsoft\Windows\CurrentVersion$\SYSTEM32$\TEMP
                                    • API String ID: 3643245835-1425596482
                                    • Opcode ID: 7a7cf5b9a03e3ce5dc58744c136864f42bf76c4b58e64c10e60fed243934a54b
                                    • Instruction ID: d982379095fde8ed82a1bd55946deea30657c6daac07a21b0f5c73e41dea9ebd
                                    • Opcode Fuzzy Hash: 7a7cf5b9a03e3ce5dc58744c136864f42bf76c4b58e64c10e60fed243934a54b
                                    • Instruction Fuzzy Hash: 1A512775840205BFEB11AF61FC59DEA3F69EB84314B1080BAF920A61B1DA354DD1EE1D
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • GetWindowLongA.USER32(?,000000F4), ref: 00406611
                                    • SendMessageA.USER32(?,0000004E,00000000,?), ref: 0040662E
                                    • ShowWindow.USER32(?,00000000), ref: 00406645
                                    • GetWindowLongA.USER32(00000000,000000F0), ref: 0040668C
                                    • SetWindowLongA.USER32(0000013D,000000F0,00000000), ref: 0040669E
                                    • GetWindowLongA.USER32(0000013D,000000EC), ref: 004066A9
                                    • SetWindowLongA.USER32(0000013D,000000EC,00000000), ref: 004066B5
                                    • KiUserCallbackDispatcher.NTDLL(0000013D,?), ref: 004066BF
                                    • MapDialogRect.USER32(?,00000000), ref: 004066E9
                                    • SetWindowPos.USER32(0000013D,?,00000000,?,0000013D,000000C1,00000214,?,?,?,?,?,?,?,?,004073B1), ref: 00406704
                                    • SendMessageA.USER32(?,0000004E,00000000,?), ref: 0040671B
                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00406747
                                    • ShowWindow.USER32(?,00000005), ref: 00406751
                                    • SetActiveWindow.USER32(?), ref: 00406758
                                    • GetNextDlgTabItem.USER32(?,00000000,00000000), ref: 00406768
                                    • GetNextDlgTabItem.USER32(?,00000000,00000000), ref: 00406771
                                    • SetFocus.USER32(00000000), ref: 0040677C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Window$Long$ItemMessageNextRectSendShow$ActiveCallbackDialogDispatcherFocusInvalidateUser
                                    • String ID: ,
                                    • API String ID: 2573844063-3772416878
                                    • Opcode ID: b153f59ca5b7461858431d8a5d567d37ac25fc31cda30cf3ba90e90f53e86288
                                    • Instruction ID: 2b528d895d9649f8f0a265b93894987c37fb0192664f912a9a814db509a1952f
                                    • Opcode Fuzzy Hash: b153f59ca5b7461858431d8a5d567d37ac25fc31cda30cf3ba90e90f53e86288
                                    • Instruction Fuzzy Hash: A3516C7180020ABFEF109FA4DC44EAE7BB9FB48364F218275F915B61E0C7759A51CB68
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • GetParent.USER32(?), ref: 00403093
                                    • PostMessageA.USER32(00000000), ref: 0040309A
                                    • GetParent.USER32(?), ref: 004030B1
                                    • SendMessageA.USER32(00000000), ref: 004030B8
                                    • SetDlgItemTextA.USER32(?,0000007D), ref: 0040312C
                                    • GetDlgItemTextA.USER32(?,0000007C,?,00000104), ref: 0040313B
                                    • wsprintfA.USER32 ref: 00403155
                                    • SetDlgItemTextA.USER32(?,0000007C,?), ref: 0040316A
                                    • SendDlgItemMessageA.USER32(?,000003F0,00000404,00000001,00000000), ref: 0040317C
                                    • GetParent.USER32(?), ref: 004031A8
                                    • PostMessageA.USER32(00000000), ref: 004031B5
                                    • PostMessageA.USER32(?,0000040A,00000000,00000000), ref: 004031C1
                                    • GetParent.USER32(?), ref: 004031D0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Message$ItemParent$PostText$Send$wsprintf
                                    • String ID: Dialog1005$N
                                    • API String ID: 4211404388-2088829370
                                    • Opcode ID: 385d41a05be08a04a6751accb1ebbe078d2f04b94d1c8f9ead1acf60f6f12c16
                                    • Instruction ID: 2e69c167ce9b7f60c65e2e85aeddf89bc603a210de4848dba3e05ed8a92d5c18
                                    • Opcode Fuzzy Hash: 385d41a05be08a04a6751accb1ebbe078d2f04b94d1c8f9ead1acf60f6f12c16
                                    • Instruction Fuzzy Hash: B1419EB1940208BFEB105F64DC49EDA3F68EB48755F0081B6FB05AA1E0C7B99EC18B59
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 277 40418b-40420a GetTempFileNameA DeleteFileA call 40163b lstrcatA call 4048d3 282 404213-40422d call 401952 277->282 283 40420c-40420e 277->283 288 404236-404258 call 40776b call 4019f4 282->288 289 40422f-404231 282->289 284 404421-404422 283->284 287 4043d1-4043d5 284->287 294 40427a-404282 288->294 295 40425a-404274 SendDlgItemMessageA 288->295 289->284 296 4043b8-4043c4 call 401a4d 294->296 297 404288-4042c6 wsprintfA call 401952 294->297 295->294 302 4043c6-4043ce call 40781d 296->302 303 4043cf 296->303 304 4043d6-4043ef DeleteFileA call 401a4d 297->304 305 4042cc-4042e1 297->305 302->303 303->287 315 4043f1-4043f9 call 40781d 304->315 316 4043fa-4043fc 304->316 308 404341-404350 call 401a4d 305->308 309 4042e3-4042e9 305->309 320 404352-40435d 308->320 321 404363-404398 call 401571 SetDlgItemTextA call 4056ed 308->321 309->308 313 4042eb-4042f5 309->313 317 4042f7 313->317 318 4042fa-40433f call 401a09 call 401a2b call 403ceb SendDlgItemMessageA 313->318 315->316 316->284 317->318 318->308 318->309 320->321 324 4043fe-40440b 320->324 338 40439d-4043a7 321->338 327 404416-40441f call 401a4d 324->327 328 40440d-404415 call 40781d 324->328 327->284 328->327 338->324 339 4043a9-4043b2 338->339 339->296 339->297
                                    APIs
                                    • GetTempFileNameA.KERNELBASE(pftw,00000000,?,00000000,00000000), ref: 004041C1
                                    • DeleteFileA.KERNELBASE ref: 004041CD
                                      • Part of subcall function 0040163B: CreateDirectoryA.KERNELBASE(?,00000000,75920440), ref: 00401650
                                      • Part of subcall function 0040163B: GetLastError.KERNEL32(759183C0), ref: 00401657
                                    • lstrcatA.KERNEL32 ref: 004041EB
                                      • Part of subcall function 004048D3: LoadStringA.USER32(0000013A,00000000,00000104), ref: 004049AF
                                      • Part of subcall function 004048D3: LoadStringA.USER32(00000144,00000000,00000104), ref: 004049DB
                                      • Part of subcall function 004048D3: wsprintfA.USER32 ref: 00404A0D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: FileLoadString$CreateDeleteDirectoryErrorLastNameTemplstrcatwsprintf
                                    • String ID: %spftw%d.pkg$Dialog1005$J@@$pftw
                                    • API String ID: 977529481-1920795000
                                    • Opcode ID: 0ed790b88debcabbcf2c0c4dc9ab1fe2c2870a2b4e889db047a3f3b812cbb5dc
                                    • Instruction ID: 7395e812f2e2d67a40fc90c130a1dc5fe96fa677d1ac0cd451ebe09cf94fdb73
                                    • Opcode Fuzzy Hash: 0ed790b88debcabbcf2c0c4dc9ab1fe2c2870a2b4e889db047a3f3b812cbb5dc
                                    • Instruction Fuzzy Hash: 37617AB290010ABBDF11AFA5DC4AAEE7B75FB88344F10817AF600721E1D7355E909F59
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 341 4074ee-407522 GetParent call 40646c call 406483 346 4076c4-4076c6 341->346 347 407528-40752b 341->347 348 4076c8-4076cd 346->348 349 4076dd-4076df 346->349 350 4075a8-4075aa 347->350 351 40752d-407532 347->351 354 4076da 348->354 355 4076cf-4076d7 348->355 358 4076e0-4076e4 349->358 352 4075b0-4075bf 350->352 353 4076a7-4076a9 350->353 356 407534-407539 351->356 357 407597-4075a3 351->357 352->353 359 4075c5-4075e1 352->359 361 4076ab-4076b0 353->361 362 4076bf-4076c2 353->362 354->349 355->354 356->353 360 40753f-407544 356->360 357->353 364 4075e3-4075f6 GetWindowTextA 359->364 365 4075f8-407605 359->365 360->353 366 40754a-40754c 360->366 361->362 363 4076b2-4076ba call 40302c 361->363 362->358 371 4076bc 363->371 367 407628-40763c SetWindowTextA 364->367 368 407617-407622 LoadStringA 365->368 369 407607-407615 lstrcpynA 365->369 366->362 370 407552-407556 366->370 372 40765d-407678 GetDlgItem ShowWindow 367->372 373 40763e-40765b GetDlgItem ShowWindow 367->373 368->367 369->367 370->353 374 40755c-407561 370->374 371->362 375 40767a-4076a4 GetDlgItem ShowWindow GetDlgItem KiUserCallbackDispatcher 372->375 373->375 376 407563-40756f 374->376 377 407575-40757c 374->377 375->353 376->358 376->377 377->358 378 407582-407592 CreateSolidBrush 377->378 378->358
                                    APIs
                                    • GetParent.USER32(00000000), ref: 00407502
                                    • CreateSolidBrush.GDI32(00FFFFFF), ref: 00407587
                                    • GetWindowTextA.USER32(00000000,00000000,000000FF), ref: 004075F0
                                    • lstrcpynA.KERNEL32(00000000,?,000000FF), ref: 0040760F
                                    • LoadStringA.USER32(FFFFFF38,?,00000000,000000FF), ref: 00407622
                                    • SetWindowTextA.USER32(?,00000000), ref: 00407632
                                    • GetDlgItem.USER32(00000002,000003EE), ref: 0040764E
                                    • ShowWindow.USER32(00000000), ref: 00407657
                                    • GetDlgItem.USER32(00000002,000003EE), ref: 0040766D
                                    • ShowWindow.USER32(00000000), ref: 00407676
                                    • GetDlgItem.USER32(00000002,000003EC), ref: 00407682
                                    • ShowWindow.USER32(00000000), ref: 00407685
                                    • GetDlgItem.USER32(00000002,00000009), ref: 00407695
                                    • KiUserCallbackDispatcher.NTDLL(00000000), ref: 00407698
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Window$Item$Show$Text$BrushCallbackCreateDispatcherLoadParentSolidStringUserlstrcpyn
                                    • String ID:
                                    • API String ID: 313981350-0
                                    • Opcode ID: 041791cd8a2465a0e9d51acfff1653f12cb51b408331aa254e4f4a8fe5169686
                                    • Instruction ID: 952fe934c92f344715027e103f83f425eea6033b9e99261d50c7042b345195ff
                                    • Opcode Fuzzy Hash: 041791cd8a2465a0e9d51acfff1653f12cb51b408331aa254e4f4a8fe5169686
                                    • Instruction Fuzzy Hash: 2051C331A04609BBDB219F98CC85FEF3B68AF44350F144476F901A72D1C7B9AD90CB2A
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 381 405bed-405c5c GetDC lstrcpynA * 2 EnumFontFamiliesExA 382 405c64-405c88 GetStockObject 381->382 383 405c5e-405c62 381->383 385 405c92-405ca4 GetObjectA 382->385 386 405c8a-405c90 GetStockObject 382->386 384 405cad-405cd8 lstrcpyA ReleaseDC lstrcmpiA 383->384 387 405cac 385->387 388 405ca6 385->388 386->385 386->387 387->384 388->387
                                    APIs
                                    • GetDC.USER32(00000000), ref: 00405C17
                                    • lstrcpynA.KERNEL32(?,?,00000020,?,00000000,00000000), ref: 00405C35
                                    • lstrcpynA.KERNEL32(?,?,00000020,?,00000000,00000000), ref: 00405C40
                                    • EnumFontFamiliesExA.GDI32(0040620B,?,00405CD9,?,00000000), ref: 00405C53
                                    • GetStockObject.GDI32(00000011), ref: 00405C84
                                    • GetStockObject.GDI32(0000000D), ref: 00405C8C
                                    • GetObjectA.GDI32(00000000,0000003C,?), ref: 00405C9C
                                    • lstrcpyA.KERNEL32(?,System,?,00000000,00000000), ref: 00405CB0
                                    • ReleaseDC.USER32(00000000,0040620B), ref: 00405CBA
                                    • lstrcmpiA.KERNEL32(SYSTEM,?), ref: 00405CC8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Object$Stocklstrcpyn$EnumFamiliesFontReleaselstrcmpilstrcpy
                                    • String ID: SYSTEM$System
                                    • API String ID: 2556058953-688511314
                                    • Opcode ID: c5eea25b0d741f80b2c6bcf28a79b3fa3a04ea880aa51f862a5f94b3c39db87b
                                    • Instruction ID: 7dd27a5178d1e08b42ec084e3c3a6f2266fef2bf0e316c8d2748d12359363053
                                    • Opcode Fuzzy Hash: c5eea25b0d741f80b2c6bcf28a79b3fa3a04ea880aa51f862a5f94b3c39db87b
                                    • Instruction Fuzzy Hash: 51314832A04358BBEB119FE0DC48EDEBF79EB48300F10847AF605B7290D6749A499F65
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • GetDC.USER32(?), ref: 004064F3
                                    • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 00406502
                                    • GetObjectA.GDI32(00000000,0000003C,?), ref: 0040650F
                                      • Part of subcall function 004060D3: GetModuleHandleA.KERNEL32(00000000,?,?,00000032,?,?,?,00000000), ref: 00406127
                                      • Part of subcall function 004060D3: LoadStringA.USER32(00000000,?,?,?), ref: 0040612E
                                      • Part of subcall function 004060D3: lstrcpyA.KERNEL32(00000008,00000001,00000000,?,?,?,00000000), ref: 0040617E
                                    • GetSystemDefaultLCID.KERNEL32 ref: 00406544
                                      • Part of subcall function 00405BED: GetDC.USER32(00000000), ref: 00405C17
                                      • Part of subcall function 00405BED: lstrcpynA.KERNEL32(?,?,00000020,?,00000000,00000000), ref: 00405C35
                                      • Part of subcall function 00405BED: lstrcpynA.KERNEL32(?,?,00000020,?,00000000,00000000), ref: 00405C40
                                      • Part of subcall function 00405BED: EnumFontFamiliesExA.GDI32(0040620B,?,00405CD9,?,00000000), ref: 00405C53
                                      • Part of subcall function 00405BED: lstrcpyA.KERNEL32(?,System,?,00000000,00000000), ref: 00405CB0
                                      • Part of subcall function 00405BED: ReleaseDC.USER32(00000000,0040620B), ref: 00405CBA
                                      • Part of subcall function 00405BED: lstrcmpiA.KERNEL32(SYSTEM,?), ref: 00405CC8
                                    • GetDeviceCaps.GDI32(?,0000005A), ref: 00406579
                                    • MulDiv.KERNEL32(00000008,00000000), ref: 00406587
                                    • GetSystemDefaultLCID.KERNEL32 ref: 0040658E
                                    • CreateFontIndirectA.GDI32(?), ref: 0040659F
                                    • GetObjectA.GDI32(00000000,0000003C,?), ref: 004065BA
                                    • GetDeviceCaps.GDI32(?,0000005A), ref: 004065C7
                                    • MulDiv.KERNEL32(?,00000000), ref: 004065CD
                                    • ReleaseDC.USER32(00000008,?), ref: 004065DB
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: CapsDefaultDeviceFontObjectReleaseSystemlstrcpylstrcpyn$CreateEnumFamiliesHandleIndirectLoadMessageModuleSendStringlstrcmpi
                                    • String ID:
                                    • API String ID: 1623091726-0
                                    • Opcode ID: e1dfa40ea0ffacd3ca2ada7c7710cf468c10dca00596c29ea435bd83520f0f91
                                    • Instruction ID: 609a1c20bff0b9910610f013399c120fa44f5cf8fa70069b7f407c84b5bb52be
                                    • Opcode Fuzzy Hash: e1dfa40ea0ffacd3ca2ada7c7710cf468c10dca00596c29ea435bd83520f0f91
                                    • Instruction Fuzzy Hash: 86415AB2900219AFEF11DFA4DC45ADE7BB8EB08340F104566FA05A72E0DB74AA54CB64
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 403 404424-404469 404 404476 403->404 405 40446b-404471 403->405 407 40447c-404490 call 407fa0 404->407 405->404 406 404473-404474 405->406 406->407 410 404492-404499 407->410 411 4044a9-404508 call 40163b call 40377b call 4046a2 call 40eb42 407->411 410->411 413 40449b-4044a8 call 407fa0 410->413 423 404511-404518 411->423 424 40450a-40450c 411->424 413->411 426 404530-404564 wsprintfA call 4015dc 423->426 427 40451a-40451e call 404745 423->427 425 40469f-4046a0 424->425 428 40468f-404693 425->428 434 404683-40468e call 40f645 426->434 435 40456a-404570 426->435 432 404523-404527 427->432 432->426 433 404529-40452b 432->433 433->425 434->428 436 404575-404590 call 401952 435->436 441 404694-40469d call 401a4d 436->441 442 404596-4045a8 call 40ebd2 436->442 441->425 442->441 447 4045ae-4045ba 442->447 448 4045ea-404621 wsprintfA call 40fb0b 447->448 449 4045bc-4045e8 SendDlgItemMessageA * 3 447->449 452 404623-40462a 448->452 453 404637-404649 call 401a4d 448->453 449->448 454 404634 452->454 455 40462c-40462f 452->455 453->434 458 40464b-40464e 453->458 454->453 455->454 458->434 459 404650-404673 wsprintfA call 4015dc 458->459 461 404678-40467d 459->461 461->434 461->436
                                    APIs
                                    • wsprintfA.USER32 ref: 0040454C
                                      • Part of subcall function 004015DC: FindFirstFileA.KERNELBASE(00000000,00000000,%spftw%d.pkg,75A78400), ref: 00401605
                                      • Part of subcall function 004015DC: FindClose.KERNELBASE(00000000), ref: 0040162F
                                      • Part of subcall function 00401952: lstrlenA.KERNEL32(00000000,00000000,?,00000003,00401883,?,00000000,00000100,?,?,00000000,004012FE), ref: 00401997
                                      • Part of subcall function 00401952: lstrcpyA.KERNEL32(00000003,00000004,?,?,00000000,004012FE), ref: 004019BC
                                      • Part of subcall function 00401952: CreateFileA.KERNELBASE(00000000,C0000000,00000003,00000000,00000004,00000080,00000000,00000000,?,00000003,00401883,?,00000000,00000100,?,?), ref: 004019D0
                                      • Part of subcall function 00401952: MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 004019E8
                                    • SendDlgItemMessageA.USER32(%A@,000003F0,00000401,00000000,?), ref: 004045CD
                                    • SendDlgItemMessageA.USER32(?,000003F0,00000404,00000001,00000000), ref: 004045DB
                                    • SendDlgItemMessageA.USER32(?,000003F0,00000402,00000000,00000000), ref: 004045E8
                                    • wsprintfA.USER32 ref: 004045F9
                                    • wsprintfA.USER32 ref: 00404665
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Message$ItemSendwsprintf$FileFind$CloseCreateFirstlstrcpylstrlen
                                    • String ID: %A@$%A@$%spftw%d.pkg$pftw%d.pkg
                                    • API String ID: 42388595-1843496611
                                    • Opcode ID: 3d49e72301dc018bc6c969ac1b49e7030676b420362100454581667539b6c844
                                    • Instruction ID: 49eb9655d431b7bcf88a192744e78e241b3edace99c140e404ea6af17988fc9b
                                    • Opcode Fuzzy Hash: 3d49e72301dc018bc6c969ac1b49e7030676b420362100454581667539b6c844
                                    • Instruction Fuzzy Hash: 3461B4B1900209BFEF109F91DC85EEA7B79EB44354F10847BF604B21E0EA799E95CB18
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 487 4027f1-40285a wsprintfA call 401571 490 40288b-4028a3 call 401571 487->490 491 40285c-40286a lstrlenA 487->491 498 4028d4-4028da 490->498 499 4028a5-4028b3 lstrlenA 490->499 493 402871-402878 call 40776b 491->493 494 40286c-40286f 491->494 496 40287b-402885 lstrcpyA 493->496 494->496 496->490 503 402936-402970 498->503 504 4028dc-4028f6 call 40776b call 401571 498->504 501 4028b5-4028b8 499->501 502 4028ba-4028c1 call 40776b 499->502 505 4028c4-4028ce lstrcpyA 501->505 502->505 511 4028fb-402904 504->511 505->498 512 402906-402913 lstrcpyA 511->512 513 402919-402933 wsprintfA 511->513 512->513 513->503
                                    APIs
                                    • wsprintfA.USER32 ref: 0040283C
                                      • Part of subcall function 00401571: wsprintfA.USER32 ref: 00401596
                                      • Part of subcall function 00401571: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00419320,?,?,00000200), ref: 004015B7
                                    • lstrlenA.KERNEL32(?), ref: 00402863
                                    • lstrcpyA.KERNEL32(00000000,?), ref: 00402885
                                    • lstrlenA.KERNEL32(?), ref: 004028AC
                                    • lstrcpyA.KERNEL32(?,?), ref: 004028CE
                                    • lstrcpyA.KERNEL32(?), ref: 00402913
                                    • wsprintfA.USER32 ref: 00402931
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: lstrcpywsprintf$lstrlen$PrivateProfileString
                                    • String ID: %s - %s$,0@$Dialog%d$WizardButtons
                                    • API String ID: 923603523-2644693989
                                    • Opcode ID: 781e1498d10d83ad1cc8538abbe553f448d24adbc7246be26fdccfe347053502
                                    • Instruction ID: ae416f118de633b210f00ddd2158329967910d9fa9d077686bf249958386c81e
                                    • Opcode Fuzzy Hash: 781e1498d10d83ad1cc8538abbe553f448d24adbc7246be26fdccfe347053502
                                    • Instruction Fuzzy Hash: 7E4151B1D00209BFDB15DF95DC88DEA7BB8FB48314F1081BAE505A72A1D7349A85CF58
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 514 404745-404791 515 404792-4047a7 wsprintfA call 4015dc 514->515 518 4048b3-4048ba 515->518 519 4047ad-4047b8 call 401000 515->519 520 4048c0-4048c9 call 4048d3 518->520 521 4048bc-4048bf 518->521 524 4047bd-4047c3 519->524 525 4048ce-4048d2 520->525 526 4047c5-4047cb 524->526 527 4047cd-4047d1 524->527 528 4047d3-4047e4 526->528 527->528 529 4047e6-4048ad LoadStringA call 401571 GetSystemDirectoryA lstrcpynA wsprintfA MessageBoxA 527->529 528->515 529->518
                                    APIs
                                    • wsprintfA.USER32 ref: 00404792
                                      • Part of subcall function 004015DC: FindFirstFileA.KERNELBASE(00000000,00000000,%spftw%d.pkg,75A78400), ref: 00401605
                                      • Part of subcall function 004015DC: FindClose.KERNELBASE(00000000), ref: 0040162F
                                      • Part of subcall function 00401000: CreateFileA.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000,75A78400,004047BD,00000000), ref: 00401020
                                      • Part of subcall function 00401000: CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 00401042
                                      • Part of subcall function 00401000: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000000,%spftw%d.pkg), ref: 00401056
                                      • Part of subcall function 00401000: UnmapViewOfFile.KERNEL32(00000000), ref: 0040109E
                                      • Part of subcall function 00401000: CloseHandle.KERNEL32(?), ref: 004010AC
                                      • Part of subcall function 00401000: CloseHandle.KERNEL32(?), ref: 004010B6
                                    • LoadStringA.USER32(0000013E,00000000,00000104), ref: 00404841
                                    • GetSystemDirectoryA.KERNEL32(00000000,00000104), ref: 00404865
                                    • lstrcpynA.KERNEL32(00000000,00000000,00000004), ref: 0040487B
                                    • wsprintfA.USER32 ref: 00404896
                                    • MessageBoxA.USER32(00000000,00000000,00000010), ref: 004048AD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: File$Close$CreateFindHandleViewwsprintf$DirectoryFirstLoadMappingMessageStringSystemUnmaplstrcpyn
                                    • String ID: %A@$%spftw%d.pkg$Strings
                                    • API String ID: 814168234-124962998
                                    • Opcode ID: b378b66249f1ed45d30dd01d6e94924b2461d07a404b5bd2480ae3f7ef76c8b7
                                    • Instruction ID: 3a60f80278c83084e42fb48556ae581fd7f3180a9f390374849cb4a4bb09e3ae
                                    • Opcode Fuzzy Hash: b378b66249f1ed45d30dd01d6e94924b2461d07a404b5bd2480ae3f7ef76c8b7
                                    • Instruction Fuzzy Hash: F0415EB290011CBBDF21DB94DC45BDA7B7DEB88314F1084F6E609A2090D7759B89CF95
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • GetTempFileNameA.KERNELBASE(ext,00000000,?,?,0000000A,00000000), ref: 00402184
                                      • Part of subcall function 00401952: lstrlenA.KERNEL32(00000000,00000000,?,00000003,00401883,?,00000000,00000100,?,?,00000000,004012FE), ref: 00401997
                                      • Part of subcall function 00401952: lstrcpyA.KERNEL32(00000003,00000004,?,?,00000000,004012FE), ref: 004019BC
                                      • Part of subcall function 00401952: CreateFileA.KERNELBASE(00000000,C0000000,00000003,00000000,00000004,00000080,00000000,00000000,?,00000003,00401883,?,00000000,00000100,?,?), ref: 004019D0
                                      • Part of subcall function 00401952: MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 004019E8
                                      • Part of subcall function 00401A2B: WriteFile.KERNELBASE(?,00000000,004021B8,?,00000000,?,m#@,004021B8,00000000,m#@), ref: 00401A42
                                      • Part of subcall function 00401A4D: FindCloseChangeNotification.KERNELBASE(?,004021BE,00000000,00000000,m#@,?), ref: 00401A51
                                    • LZOpenFileA.LZ32(?,?,00000000), ref: 004021D0
                                    • LZOpenFileA.LZ32(?,?,00001001,?,?,00000000), ref: 004021E6
                                    • LZCopy.LZ32(00000000,00000000,?,?,00001001,?,?,00000000), ref: 004021EF
                                    • LZClose.LZ32(00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 004021F7
                                    • LZClose.LZ32(00000000,00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 004021FD
                                    • DeleteFileA.KERNELBASE(?,00000000,00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 00402209
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: File$Close$Open$ChangeCopyCreateDeleteFindMessageNameNotificationTempWritelstrcpylstrlen
                                    • String ID: ext$m#@
                                    • API String ID: 1045786863-149627764
                                    • Opcode ID: eb4f5a5c8cfe5ff9e2a62ded80a8525dca085609a74331ca921e1065c217cea2
                                    • Instruction ID: 37fafabac2902fe61ae521d7d8b16c42e7feb678f73ea287e5b3e97fc98784bd
                                    • Opcode Fuzzy Hash: eb4f5a5c8cfe5ff9e2a62ded80a8525dca085609a74331ca921e1065c217cea2
                                    • Instruction Fuzzy Hash: E911E2729001187BDB21BAB5CC86DDA7B7CAF58344F0009B6F704B2191DAB89E944BB8
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • lstrcpyA.KERNEL32(00000000,00000000,00000000,?), ref: 0040407D
                                    • lstrlenA.KERNEL32(00000000), ref: 0040408A
                                    • SetDlgItemTextA.USER32(0000007D), ref: 004040C3
                                    • wsprintfA.USER32 ref: 004040E3
                                    • wsprintfA.USER32 ref: 00404154
                                    • DeleteFileA.KERNELBASE(00000000), ref: 00404172
                                      • Part of subcall function 00403921: lstrlenA.KERNEL32(00000000,000000FF,00000000,0040402A,?), ref: 0040392D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: lstrlenwsprintf$DeleteFileItemTextlstrcpy
                                    • String ID: %spftw%d.pkg$Dialog1005
                                    • API String ID: 2849724783-944770651
                                    • Opcode ID: 569d142c374f7805c8f468c0e2e85409093a568a23b96ae35723b2d0d35583e3
                                    • Instruction ID: e43462d48800e17df173a174fda31fa65a04315a7e97b911f313c469df955f1f
                                    • Opcode Fuzzy Hash: 569d142c374f7805c8f468c0e2e85409093a568a23b96ae35723b2d0d35583e3
                                    • Instruction Fuzzy Hash: 254192B2800215BBEB209F65EC9DBC63768E794315F1080BAF745B61E1D77899C4CF18
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetWindow.USER32(?,00000005), ref: 00403618
                                    • wsprintfA.USER32 ref: 00403628
                                      • Part of subcall function 00401571: wsprintfA.USER32 ref: 00401596
                                      • Part of subcall function 00401571: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00419320,?,?,00000200), ref: 004015B7
                                    • GetWindowTextA.USER32(?,00000000,00000104), ref: 00403658
                                    • SetWindowTextA.USER32(?,00000000), ref: 0040367D
                                    • GetWindowLongA.USER32(00000000,000000F4), ref: 00403686
                                    • SetWindowTextA.USER32(00000000), ref: 004036AF
                                    • GetWindow.USER32(00000000,00000002), ref: 004036B4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Window$Text$wsprintf$LongPrivateProfileString
                                    • String ID: Dialog%d
                                    • API String ID: 3814457349-3309310893
                                    • Opcode ID: c5f2ab4f334631180f2137bef046b2f60b20d648babca52483c3e1491144c113
                                    • Instruction ID: e263e44d26657123b273d041be93f3f127470eaa16270553318b2b66abc9c37f
                                    • Opcode Fuzzy Hash: c5f2ab4f334631180f2137bef046b2f60b20d648babca52483c3e1491144c113
                                    • Instruction Fuzzy Hash: 1B21F43290020C7BEF209FA4CC45FDB7F7CAB44350F1044B2FB05B21A1DA759A848A99
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00406196: __EH_prolog.LIBCMT ref: 0040619B
                                      • Part of subcall function 00406196: GetSystemDefaultLCID.KERNEL32(?,?), ref: 004061E5
                                      • Part of subcall function 00406196: CreateDialogIndirectParamA.USER32(?,?,00000008,?,?), ref: 00406230
                                    • IsWindow.USER32(00000000), ref: 0040606D
                                    • PeekMessageA.USER32(00000000,00000000,00000000,00000000,00000001), ref: 00406088
                                    • IsDialogMessageA.USER32(00000000,00000000,?,?,?,00000084,00000000), ref: 00406094
                                    • TranslateMessage.USER32(00000000), ref: 004060A2
                                    • DispatchMessageA.USER32(00000000), ref: 004060AC
                                    • IsWindow.USER32(00000000), ref: 004060B8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Message$DialogWindow$CreateDefaultDispatchH_prologIndirectParamPeekSystemTranslate
                                    • String ID: C'@$IDD_WIZ97SHEET
                                    • API String ID: 789772741-550462368
                                    • Opcode ID: 16582abbd2d05707cec10e2e163ade774e528ee2d35c6412a62a6113d03423ae
                                    • Instruction ID: 84b8a41ca844e5542d629e3667ca48bb5d6acccf7cf2b346e658b22a85aebe8a
                                    • Opcode Fuzzy Hash: 16582abbd2d05707cec10e2e163ade774e528ee2d35c6412a62a6113d03423ae
                                    • Instruction Fuzzy Hash: CE210332A00206ABEF20AFA5DC44FAB37ACAF40350F02853AF516E31D1D779E8558769
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateFileA.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000,75A78400,004047BD,00000000), ref: 00401020
                                    • CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 00401042
                                    • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000000,%spftw%d.pkg), ref: 00401056
                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 0040109E
                                    • CloseHandle.KERNEL32(?), ref: 004010AC
                                    • CloseHandle.KERNEL32(?), ref: 004010B6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: File$CloseCreateHandleView$MappingUnmap
                                    • String ID: %spftw%d.pkg$MSCF
                                    • API String ID: 3514913828-2673492247
                                    • Opcode ID: 9f50e63ae1eb70ee655d743fb2fedba8c9770559a8fbc225cef819399dd4b71c
                                    • Instruction ID: 47b0074874d2728df109501d801ce9f3c9d16d009d0715c8722b3e6ecbb975ff
                                    • Opcode Fuzzy Hash: 9f50e63ae1eb70ee655d743fb2fedba8c9770559a8fbc225cef819399dd4b71c
                                    • Instruction Fuzzy Hash: 0D2150B5900209FFDB205F68DC89DAE7B79FB44764F608225F954A72E0D7305E81CB54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • #17.COMCTL32(?,00000000), ref: 00402480
                                    • LoadStringA.USER32(00000004,00000104,?,00000000), ref: 004024CD
                                    • GetDesktopWindow.USER32 ref: 004024E1
                                    • MessageBoxA.USER32(00000000,?,00000000), ref: 004024E8
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: DesktopLoadMessageStringWindow
                                    • String ID:
                                    • API String ID: 3689829364-0
                                    • Opcode ID: dbd1bbc7aeb96fea79db30d5021b22c788f82dce282525793555f5a9d78348cf
                                    • Instruction ID: c83e1f6c3561fcd687293b7f0781a3222e8ce415cd838d42ff1c0a8004795fcf
                                    • Opcode Fuzzy Hash: dbd1bbc7aeb96fea79db30d5021b22c788f82dce282525793555f5a9d78348cf
                                    • Instruction Fuzzy Hash: D2A13E71900206EBEF10DF94EE9D9EA76B8B708305F60457BE605A22D0D3B95E81CF5D
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 004046A2: lstrcpynA.KERNEL32(00000000,00000000,00000104,00000000,00000000,00404905,?,00000000,?,00000000,00000000), ref: 004046B2
                                      • Part of subcall function 00404A84: LoadStringA.USER32(0000013B,?,00404995,00000040), ref: 00404AD8
                                    • LoadStringA.USER32(0000013A,00000000,00000104), ref: 004049AF
                                      • Part of subcall function 00401571: wsprintfA.USER32 ref: 00401596
                                      • Part of subcall function 00401571: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00419320,?,?,00000200), ref: 004015B7
                                    • LoadStringA.USER32(00000144,00000000,00000104), ref: 004049DB
                                    • wsprintfA.USER32 ref: 00404A0D
                                    • MessageBoxA.USER32(00404205,00000000,00000015), ref: 00404A54
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: String$Load$wsprintf$MessagePrivateProfilelstrcpyn
                                    • String ID: %s%s$Strings
                                    • API String ID: 2647973942-1828133090
                                    • Opcode ID: fcf187b66785ea68423b4af7b646346d1fc2d5028035556723eafbae194c9d58
                                    • Instruction ID: 9a3ef04a435794679c8436cfb3a97d1107f7b0519c8ba5a52dc0917aa4290845
                                    • Opcode Fuzzy Hash: fcf187b66785ea68423b4af7b646346d1fc2d5028035556723eafbae194c9d58
                                    • Instruction Fuzzy Hash: EB419FB2A0011C7BEF219A54CC45FDB7B7CEB89300F0044F6E609A2091E6B59F948FA9
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CharNextA.USER32(00000000,?,?,00000000), ref: 00404D0F
                                    • LoadStringA.USER32(00000032,?,00000104), ref: 00404D47
                                    • wsprintfA.USER32 ref: 00404D5B
                                    • SetDlgItemTextA.USER32(0000007D), ref: 00404D72
                                    • SendDlgItemMessageA.USER32(000003F0,00000405,00000000,00000000), ref: 00404D8A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Item$CharLoadMessageNextSendStringTextwsprintf
                                    • String ID: Dialog1005
                                    • API String ID: 1769985620-3824541873
                                    • Opcode ID: e782107566a497ce592bb4b90031fead05d17ec80b4a926d9f4447149b3bb32c
                                    • Instruction ID: c71cc86d41504b87904c40b2f50f9c18ea4996e1ec1fbb4c2e53e5c008375184
                                    • Opcode Fuzzy Hash: e782107566a497ce592bb4b90031fead05d17ec80b4a926d9f4447149b3bb32c
                                    • Instruction Fuzzy Hash: CE1108B6540115BFEB105B64EC89FD63B3CEB84355F0080B6FB04A10B0D7755EC5CA19
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CompareStringA.KERNELBASE(00000400,00000001,00000000,?,.exe,?,75918A60,759183C0,?,00000000,00403AA5,?,?), ref: 00403CB7
                                    • CompareStringA.KERNEL32(00000400,00000001,00000000,?,.com,?,?,.exe,?,75918A60,759183C0,?,00000000,00403AA5,?,?), ref: 00403CC8
                                    • CompareStringA.KERNEL32(00000400,00000001,00000000,?,.bat,?,?,.com,?,?,.exe,?,75918A60,759183C0,?,00000000), ref: 00403CD9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: CompareString
                                    • String ID: .bat$.com$.exe
                                    • API String ID: 1825529933-1058830844
                                    • Opcode ID: efaf551c60bfc76f387ceb56c8ff9f28987c9f0c399ed9a8758b3074e40fe7ed
                                    • Instruction ID: 113246e96917ed49ae189ba37df39d7f3cd93302057888e15942f565e104e4b2
                                    • Opcode Fuzzy Hash: efaf551c60bfc76f387ceb56c8ff9f28987c9f0c399ed9a8758b3074e40fe7ed
                                    • Instruction Fuzzy Hash: BDF03A7238C60D3AF9202956AC85FB77E1CE793BAAF26012BB600F51D5C99B6C815078
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00403CEB: PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00403D12
                                      • Part of subcall function 00403CEB: TranslateMessage.USER32(?), ref: 00403D1C
                                      • Part of subcall function 00403CEB: DispatchMessageA.USER32(?), ref: 00403D26
                                      • Part of subcall function 00403CEB: Sleep.KERNEL32(000003E8,?,00000000,00000000,?,?,?,00404F90,00000007,?,00401111), ref: 00403D38
                                    • wsprintfA.USER32 ref: 00401AB7
                                      • Part of subcall function 00404B38: lstrcpyA.KERNEL32(00000000,?,?,?,00000000), ref: 00404B6B
                                      • Part of subcall function 00404B38: lstrcpyA.KERNEL32(?,?), ref: 00404B96
                                      • Part of subcall function 00404B38: lstrcatA.KERNEL32(?,00000000), ref: 00404BC2
                                      • Part of subcall function 00404B38: lstrcatA.KERNEL32(?,00000000), ref: 00404BEB
                                    • GetFileAttributesA.KERNELBASE(?), ref: 00401BC9
                                    • SetFileAttributesA.KERNELBASE(?,00000000), ref: 00401BD9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Message$AttributesFilelstrcatlstrcpy$DispatchPeekSleepTranslatewsprintf
                                    • String ID: %spftw%d.pkg$f"
                                    • API String ID: 2142701919-951990753
                                    • Opcode ID: de4fa1b0da78696ffa17dc4e345f50bf08ac5172b3318fc52e60d72be88cbba6
                                    • Instruction ID: 8445dc0856fc6b04738d8f8a3347dd6cc71b69cb5284f10ad5c25d2ca85690c2
                                    • Opcode Fuzzy Hash: de4fa1b0da78696ffa17dc4e345f50bf08ac5172b3318fc52e60d72be88cbba6
                                    • Instruction Fuzzy Hash: 80419472904105ABEF209FA1DC45DD637B8EB14315F1084BBF645A71E0EB78EA84CF19
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00401571: wsprintfA.USER32 ref: 00401596
                                      • Part of subcall function 00401571: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00419320,?,?,00000200), ref: 004015B7
                                    • GetModuleHandleA.KERNEL32(00000000,?,?,00000032,?,?,?,00000000), ref: 00406127
                                    • LoadStringA.USER32(00000000,?,?,?), ref: 0040612E
                                    • lstrcpyA.KERNEL32(00000008,00000001,00000000,?,?,?,00000000), ref: 0040617E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: String$HandleLoadModulePrivateProfilelstrcpywsprintf
                                    • String ID: Fonts$MS SHELL DLG
                                    • API String ID: 4179438950-934462964
                                    • Opcode ID: 7fa676c014f14c51b8086228d03af6a8f0984bb9bd464ba2ed825c326e535300
                                    • Instruction ID: d873c3e7190b859a56b7cccbf97da63b17165eb4fd6a3f53e83971f600e22734
                                    • Opcode Fuzzy Hash: 7fa676c014f14c51b8086228d03af6a8f0984bb9bd464ba2ed825c326e535300
                                    • Instruction Fuzzy Hash: EC212732944214BFDB209F60DC45BCA7B78EF54344F1184BAFAC5BB181DAB49EC58B54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00401952: lstrlenA.KERNEL32(00000000,00000000,?,00000003,00401883,?,00000000,00000100,?,?,00000000,004012FE), ref: 00401997
                                      • Part of subcall function 00401952: lstrcpyA.KERNEL32(00000003,00000004,?,?,00000000,004012FE), ref: 004019BC
                                      • Part of subcall function 00401952: CreateFileA.KERNELBASE(00000000,C0000000,00000003,00000000,00000004,00000080,00000000,00000000,?,00000003,00401883,?,00000000,00000100,?,?), ref: 004019D0
                                      • Part of subcall function 00401952: MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 004019E8
                                    • DosDateTimeToFileTime.KERNEL32(?,?,00000000), ref: 00404C6B
                                    • LocalFileTimeToFileTime.KERNEL32(00000000,00000000,?,?,00000000), ref: 00404C87
                                    • SetFileTime.KERNELBASE(?,00000000,00000000,00000000,?,?,00000000), ref: 00404C9E
                                    • CloseHandle.KERNEL32(?,?,?,00000000), ref: 00404CA7
                                    • SetFileAttributesA.KERNELBASE(?,?,?,?,00000000,?), ref: 00404CB5
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: File$Time$AttributesCloseCreateDateHandleLocalMessagelstrcpylstrlen
                                    • String ID:
                                    • API String ID: 4208775115-0
                                    • Opcode ID: ebbced0eb6c78b058afe26e3869266b29f7a9388894ddee28ad68586819b0a38
                                    • Instruction ID: 269c7380ee0df3cfe1183c77adcbf54c03864f8311ff517cd3c37f68a2f07e0f
                                    • Opcode Fuzzy Hash: ebbced0eb6c78b058afe26e3869266b29f7a9388894ddee28ad68586819b0a38
                                    • Instruction Fuzzy Hash: 1D113D76900208BBEB119FA5DC44BEF7BBCEB48311F108526B615E60A0E774A6488B58
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00401571: wsprintfA.USER32 ref: 00401596
                                      • Part of subcall function 00401571: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00419320,?,?,00000200), ref: 004015B7
                                    • SetDlgItemTextA.USER32(?,00003023,00000000), ref: 00403586
                                    • SetDlgItemTextA.USER32(?,00003024,00000000), ref: 004035AE
                                    • SetDlgItemTextA.USER32(?,00000002,00000000), ref: 004035D3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: ItemText$PrivateProfileStringwsprintf
                                    • String ID: WizardButtons
                                    • API String ID: 3553643764-2007458381
                                    • Opcode ID: 5d8cf5c3b1e1f3d1dde48ba725e3fbd331248b19c42c8d2cb4ac486d6fe3ad0e
                                    • Instruction ID: 196da576c5262e2994c31f6345d3ba33fe791dc0de205ea025dc6736d56e2ca6
                                    • Opcode Fuzzy Hash: 5d8cf5c3b1e1f3d1dde48ba725e3fbd331248b19c42c8d2cb4ac486d6fe3ad0e
                                    • Instruction Fuzzy Hash: B011A5B6A001187BEB219655DD86FEB7A7CDB45740F4000B2FB48B50D1F7B4DF848A68
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetTempFileNameA.KERNELBASE(plf,00000000,00000000,0000000A,00401FC3,0000000A,?), ref: 004022E4
                                      • Part of subcall function 0040214D: GetTempFileNameA.KERNELBASE(ext,00000000,?,?,0000000A,00000000), ref: 00402184
                                      • Part of subcall function 0040214D: LZOpenFileA.LZ32(?,?,00000000), ref: 004021D0
                                      • Part of subcall function 0040214D: LZOpenFileA.LZ32(?,?,00001001,?,?,00000000), ref: 004021E6
                                      • Part of subcall function 0040214D: LZCopy.LZ32(00000000,00000000,?,?,00001001,?,?,00000000), ref: 004021EF
                                      • Part of subcall function 0040214D: LZClose.LZ32(00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 004021F7
                                      • Part of subcall function 0040214D: LZClose.LZ32(00000000,00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 004021FD
                                      • Part of subcall function 0040214D: DeleteFileA.KERNELBASE(?,00000000,00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 00402209
                                    • MessageBoxA.USER32(00000000,LoadLanguage Failed,00000000,00000000), ref: 0040230C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: File$CloseNameOpenTemp$CopyDeleteMessage
                                    • String ID: LoadLanguage Failed$plf
                                    • API String ID: 2993821907-1067850953
                                    • Opcode ID: b68bb56ad5b5d08d37a3054ed6979a4a5f9f4918480bd3a447e2e75037a98cf9
                                    • Instruction ID: 2b130eaaa4c54ce3c068a24f26149f3ec9363dd36da041eee895be21f19a2100
                                    • Opcode Fuzzy Hash: b68bb56ad5b5d08d37a3054ed6979a4a5f9f4918480bd3a447e2e75037a98cf9
                                    • Instruction Fuzzy Hash: 07F08272905221BFDB116B62BD0DDC73F98DB05760714C83AF908D51E0C6798C80CB9D
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • lstrcpyA.KERNEL32(00000000,?,?,?,00000000), ref: 00404B6B
                                    • lstrcpyA.KERNEL32(?,?), ref: 00404B96
                                    • lstrcatA.KERNEL32(?,00000000), ref: 00404BC2
                                    • lstrcatA.KERNEL32(?,00000000), ref: 00404BEB
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: lstrcatlstrcpy
                                    • String ID:
                                    • API String ID: 3905823039-0
                                    • Opcode ID: 3b6201db1c773d14bb4b1647addf89dc911567dc690f99bfd35510f5ed7ea330
                                    • Instruction ID: 446dfe0292c7d0e27dd5254ab13fd3b53556e6226aa3c883b9b12f3790f888e7
                                    • Opcode Fuzzy Hash: 3b6201db1c773d14bb4b1647addf89dc911567dc690f99bfd35510f5ed7ea330
                                    • Instruction Fuzzy Hash: 0411E4F69002187BEB11A661DC89FEB3BBCDBD1714F1400BAE700661C0D7B8A9858A65
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • lstrlenA.KERNEL32(00000000,00000000,?,00000003,00401883,?,00000000,00000100,?,?,00000000,004012FE), ref: 00401997
                                    • lstrcpyA.KERNEL32(00000003,00000004,?,?,00000000,004012FE), ref: 004019BC
                                    • CreateFileA.KERNELBASE(00000000,C0000000,00000003,00000000,00000004,00000080,00000000,00000000,?,00000003,00401883,?,00000000,00000100,?,?), ref: 004019D0
                                    • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 004019E8
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: CreateFileMessagelstrcpylstrlen
                                    • String ID:
                                    • API String ID: 4286855257-0
                                    • Opcode ID: 5b671f45c5922309950577d9e4a993b1f03730124747234d8c415865f126d7b9
                                    • Instruction ID: c2aca7e15f5e73640223127f1eb2599ab19ff3082041843bac52e75051f449e0
                                    • Opcode Fuzzy Hash: 5b671f45c5922309950577d9e4a993b1f03730124747234d8c415865f126d7b9
                                    • Instruction Fuzzy Hash: 8C1129F13407407BF73143549C6AF6B6688CB86B60F14843BF782B62E1C2B85C44C61E
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LoadIconA.USER32(00000067), ref: 004029A8
                                    • SendMessageA.USER32(?,00000080,00000001,00000000), ref: 004029C2
                                    • LoadImageA.USER32(00000067,00000001,00000010,00000010,00000040), ref: 004029D4
                                    • SendMessageA.USER32(?,00000080,00000000,00000000), ref: 004029DF
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: LoadMessageSend$IconImage
                                    • String ID:
                                    • API String ID: 1393091567-0
                                    • Opcode ID: 1127d066a9a079b5ac641bf353bc12e5867fe46f22f97036c4049b44267abd5d
                                    • Instruction ID: 772ec9a517134738b54367a812e488cfc8db10b7416eacc07e4cf7a9ddb561bb
                                    • Opcode Fuzzy Hash: 1127d066a9a079b5ac641bf353bc12e5867fe46f22f97036c4049b44267abd5d
                                    • Instruction Fuzzy Hash: AD01A7B13442017AE5345B25DD4EFAB2B59E784750F00883AB645B51D0C5F96C808529
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00403D12
                                    • TranslateMessage.USER32(?), ref: 00403D1C
                                    • DispatchMessageA.USER32(?), ref: 00403D26
                                    • Sleep.KERNEL32(000003E8,?,00000000,00000000,?,?,?,00404F90,00000007,?,00401111), ref: 00403D38
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Message$DispatchPeekSleepTranslate
                                    • String ID:
                                    • API String ID: 3768732053-0
                                    • Opcode ID: 661e7a4634f03f24257837f2183ac16bf8df8669cf2cac33de9a1c45f528de3e
                                    • Instruction ID: 6c7b8863f6345d6e20287f0ea837fb8c9bfe8b9fcc5c24ae34afbc029aa6836b
                                    • Opcode Fuzzy Hash: 661e7a4634f03f24257837f2183ac16bf8df8669cf2cac33de9a1c45f528de3e
                                    • Instruction Fuzzy Hash: 00F03C72A0020EABDF009FE5EC84EDB7B7CEB44785F008436B601A6191E7789A458BA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,00408BC5,00000000), ref: 004012A4
                                      • Part of subcall function 00401324: RegOpenKeyExA.KERNELBASE(80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,00000000,00020019,?,?,00000104,00000000,?,?,?,?,004012AF), ref: 00401346
                                      • Part of subcall function 00401324: RegQueryValueExA.KERNELBASE(?,ProgramFilesDir,00000000,?,?,?,00000104,00000000), ref: 00401386
                                      • Part of subcall function 00401324: lstrlenA.KERNEL32(?,00000104,00000000), ref: 0040138E
                                      • Part of subcall function 00401324: RegQueryValueExA.KERNELBASE(?,CommonFilesDir,00000000,00000001,?,00000104,00000000), ref: 004013BE
                                      • Part of subcall function 00401324: lstrlenA.KERNEL32 ref: 004013C6
                                      • Part of subcall function 00401324: RegCloseKey.KERNELBASE(?,?,?,?,004012AF), ref: 004013DE
                                      • Part of subcall function 00401324: GetWindowsDirectoryA.KERNEL32(00000104,?,00000104,00000000,?,?,?,?,004012AF), ref: 004013EB
                                      • Part of subcall function 00401324: lstrlenA.KERNEL32(?,00000104,00000000,?,?,?,?,004012AF), ref: 004013F7
                                      • Part of subcall function 00401324: lstrcatA.KERNEL32(\SYSTEM32,00000104,00000000,?,?,?,?,004012AF), ref: 0040141D
                                      • Part of subcall function 00401324: lstrlenA.KERNEL32(?,?,?,?,004012AF), ref: 00401425
                                      • Part of subcall function 00401324: GetSystemDirectoryA.KERNEL32(00000104), ref: 00401441
                                      • Part of subcall function 00401324: lstrlenA.KERNEL32(?,?,?,004012AF), ref: 0040144D
                                      • Part of subcall function 00401324: GetTempPathA.KERNELBASE(00000104,?,?,004012AF), ref: 00401469
                                    • LoadLibraryA.KERNELBASE(RICHED32.DLL), ref: 004012B4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: lstrlen$DirectoryQueryValue$CloseFileLibraryLoadModuleNameOpenPathSystemTempWindowslstrcat
                                    • String ID: RICHED32.DLL
                                    • API String ID: 547321053-2327432079
                                    • Opcode ID: b5298b0aec93942d84276e264ebddd478d59f16a44d5af2d7613963b2035cc90
                                    • Instruction ID: e8c3c66050100f970db8e801bc83eaab9c5d1169ee5e8ae169496de5508522ef
                                    • Opcode Fuzzy Hash: b5298b0aec93942d84276e264ebddd478d59f16a44d5af2d7613963b2035cc90
                                    • Instruction Fuzzy Hash: D731D171945342ABEB20AF69ACD99D63BD4A646300724843FE944F33F1D63D5C81DB1E
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004057FB
                                    • ReadFile.KERNELBASE(000000FF,000000FF,00008000,00000000,00000000), ref: 00405813
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: File$PointerRead
                                    • String ID: J@@
                                    • API String ID: 3154509469-82435985
                                    • Opcode ID: a800e2e337af46ec9954634b9a15e1ff94e4372e5983c9854da707d1c24907d8
                                    • Instruction ID: 811b83ac386f0b8140744a64d377088be80c7880a4b9c62dba65896f462de773
                                    • Opcode Fuzzy Hash: a800e2e337af46ec9954634b9a15e1ff94e4372e5983c9854da707d1c24907d8
                                    • Instruction Fuzzy Hash: B711037280010CFEDF11AF95DC44CEEBB79EB443A4B1082BAF914A21A0DA355E619FA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog.LIBCMT ref: 0040619B
                                      • Part of subcall function 00405853: GetModuleHandleA.KERNEL32(00000000,?,00000000,?,00000000,004061B6,?,?), ref: 00405861
                                      • Part of subcall function 00405853: FindResourceA.KERNEL32(00000000,00000005,00000005), ref: 00405870
                                      • Part of subcall function 00405853: LoadResource.KERNEL32(00000000,00000000,?,00000000,004061B6,?,?), ref: 0040587A
                                      • Part of subcall function 00405853: SizeofResource.KERNEL32(00000000,00000000,?,00000000,004061B6,?,?), ref: 00405884
                                      • Part of subcall function 00405853: LockResource.KERNEL32(00000000,00000000,?,00000000,004061B6,?,?), ref: 0040588C
                                      • Part of subcall function 004060D3: GetModuleHandleA.KERNEL32(00000000,?,?,00000032,?,?,?,00000000), ref: 00406127
                                      • Part of subcall function 004060D3: LoadStringA.USER32(00000000,?,?,?), ref: 0040612E
                                      • Part of subcall function 004060D3: lstrcpyA.KERNEL32(00000008,00000001,00000000,?,?,?,00000000), ref: 0040617E
                                    • GetSystemDefaultLCID.KERNEL32(?,?), ref: 004061E5
                                      • Part of subcall function 00405BED: GetDC.USER32(00000000), ref: 00405C17
                                      • Part of subcall function 00405BED: lstrcpynA.KERNEL32(?,?,00000020,?,00000000,00000000), ref: 00405C35
                                      • Part of subcall function 00405BED: lstrcpynA.KERNEL32(?,?,00000020,?,00000000,00000000), ref: 00405C40
                                      • Part of subcall function 00405BED: EnumFontFamiliesExA.GDI32(0040620B,?,00405CD9,?,00000000), ref: 00405C53
                                      • Part of subcall function 00405BED: lstrcpyA.KERNEL32(?,System,?,00000000,00000000), ref: 00405CB0
                                      • Part of subcall function 00405BED: ReleaseDC.USER32(00000000,0040620B), ref: 00405CBA
                                      • Part of subcall function 00405BED: lstrcmpiA.KERNEL32(SYSTEM,?), ref: 00405CC8
                                      • Part of subcall function 0040597E: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000020,00000000,00000000), ref: 004059EE
                                    • CreateDialogIndirectParamA.USER32(?,?,00000008,?,?), ref: 00406230
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Resource$HandleLoadModulelstrcpylstrcpyn$ByteCharCreateDefaultDialogEnumFamiliesFindFontH_prologIndirectLockMultiParamReleaseSizeofStringSystemWidelstrcmpi
                                    • String ID:
                                    • API String ID: 938626887-0
                                    • Opcode ID: 80e09413f9028084bf0d7828cf7b76e75b0fed112919dfa2c6c92134a651f1e9
                                    • Instruction ID: 8a10cad3bbeea1d87699bacc1f6c3ee9e8d3a7719e1535b1e695cb0f8f8a9340
                                    • Opcode Fuzzy Hash: 80e09413f9028084bf0d7828cf7b76e75b0fed112919dfa2c6c92134a651f1e9
                                    • Instruction Fuzzy Hash: CD215E7390021DABDF01DFE4DC05ADEBB75FB08314F04852AFA15B6191D7749618CB54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateDirectoryA.KERNELBASE(?,00000000,75920440), ref: 00401650
                                    • GetLastError.KERNEL32(759183C0), ref: 00401657
                                    • CreateDirectoryA.KERNELBASE(?,00000000), ref: 004016B3
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: CreateDirectory$ErrorLast
                                    • String ID:
                                    • API String ID: 2485089472-0
                                    • Opcode ID: 3f053bf5bea062890f42532f1520c623f8a9ca378c39dd448f053a2f825242d3
                                    • Instruction ID: 661ad9fd237ec56f3df49d468b84fde0e81a974af5a9da59ba43814b4b0c27a0
                                    • Opcode Fuzzy Hash: 3f053bf5bea062890f42532f1520c623f8a9ca378c39dd448f053a2f825242d3
                                    • Instruction Fuzzy Hash: 9A012B76604119BBDF105674DD80FEB3BAC9B54314F240977EA01F61F0E6BADAC1498C
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 004011F8: GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,00408BC5,00000000), ref: 004012A4
                                      • Part of subcall function 004011F8: LoadLibraryA.KERNELBASE(RICHED32.DLL), ref: 004012B4
                                    • GetDesktopWindow.USER32 ref: 004010FD
                                    • ExitProcess.KERNEL32 ref: 0040114B
                                      • Part of subcall function 00402451: #17.COMCTL32(?,00000000), ref: 00402480
                                    • GetDesktopWindow.USER32 ref: 00401126
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: DesktopWindow$ExitFileLibraryLoadModuleNameProcess
                                    • String ID:
                                    • API String ID: 917893701-0
                                    • Opcode ID: f477bb86eae3c26e8658dcccb6cc0551c09a20985b70aca5335406c2fde74ee1
                                    • Instruction ID: 549e45b7be703b5688b96765c682e5d816b542ff94772dd2204d035cb76a3e28
                                    • Opcode Fuzzy Hash: f477bb86eae3c26e8658dcccb6cc0551c09a20985b70aca5335406c2fde74ee1
                                    • Instruction Fuzzy Hash: FC01AC70900302ABEB206F71DC0A7A63659A74C705F00447AFA54EA1F1EB79C890DB1F
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • WriteFile.KERNELBASE(?,00000000,004021B8,?,00000000,?,m#@,004021B8,00000000,m#@), ref: 00401A42
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID: m#@
                                    • API String ID: 3934441357-2000402320
                                    • Opcode ID: 239aaa9fddb0784b9e6d2011fcf3e73944f16980745ead2914e0688b44147654
                                    • Instruction ID: ff58616cd18e9f54923a046936ab337dbac59f7d5f6332c0d39ec99e68f1edf3
                                    • Opcode Fuzzy Hash: 239aaa9fddb0784b9e6d2011fcf3e73944f16980745ead2914e0688b44147654
                                    • Instruction Fuzzy Hash: 33D0923650020DFBCF01CFC1DD05FCDBBB9AB08359F208059FA15A6160C3B5AB14AB58
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • wsprintfA.USER32 ref: 00401596
                                    • GetPrivateProfileStringA.KERNEL32(00000000,00000000,00419320,?,?,00000200), ref: 004015B7
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: PrivateProfileStringwsprintf
                                    • String ID:
                                    • API String ID: 1475573541-0
                                    • Opcode ID: 6db46dc4b2c069692788c40032b024345843f4abd3f89ea5053308749e50f04f
                                    • Instruction ID: 1d47c89879f72ce21fe6aecbd2b9423a727f37bbeb196241ba6b6104720c8123
                                    • Opcode Fuzzy Hash: 6db46dc4b2c069692788c40032b024345843f4abd3f89ea5053308749e50f04f
                                    • Instruction Fuzzy Hash: C3F01C36910149BFDF018FA0EC09ECE7BBAEB44308F088575F901E10A0D3B5AA94DB59
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • DestroyWindow.USER32(?,00000001,?,?,00406F6A,?,00000002), ref: 004062F8
                                    • DestroyWindow.USER32(?,00000001,?,?,00406F6A,?,00000002), ref: 00406309
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: DestroyWindow
                                    • String ID:
                                    • API String ID: 3375834691-0
                                    • Opcode ID: e8797e66ddb81812f0447d970c044af0befd95f15c2158ea1703d74a08190fe6
                                    • Instruction ID: 1c15a9f937f02390afd48099750d5d0b0adc8ff09a5663d6174ecd59a8c09f23
                                    • Opcode Fuzzy Hash: e8797e66ddb81812f0447d970c044af0befd95f15c2158ea1703d74a08190fe6
                                    • Instruction Fuzzy Hash: 34F05E75104711AFD7209F65D88494BB7E8BF80364712487EF89393551C739F8558A58
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • HeapCreate.KERNELBASE(00000000,00001000,00000000,00408B56,00000000), ref: 00408DD7
                                      • Part of subcall function 00408C7E: GetVersionExA.KERNEL32 ref: 00408C9D
                                    • HeapDestroy.KERNEL32 ref: 00408E16
                                      • Part of subcall function 00408E23: HeapAlloc.KERNEL32(00000000,00000140,00408DFF,000003F8), ref: 00408E30
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Heap$AllocCreateDestroyVersion
                                    • String ID:
                                    • API String ID: 2507506473-0
                                    • Opcode ID: 15752618eaa67df8867ba0b733f289bdc55c6db42efdff9a4a4266f2e1cb5a3a
                                    • Instruction ID: 5ec496ff2d57110847aaf83a932fa4fb4a3567f2be9e9f4278caedae1f890211
                                    • Opcode Fuzzy Hash: 15752618eaa67df8867ba0b733f289bdc55c6db42efdff9a4a4266f2e1cb5a3a
                                    • Instruction Fuzzy Hash: E0F09B746443015ADF211730EE0A7A73690DB90781F24883FF541E85F1EF788AC095DD
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateFileA.KERNELBASE(00000001,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000000,0040439D,?), ref: 0040570A
                                      • Part of subcall function 004057CE: SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004057FB
                                      • Part of subcall function 004057CE: ReadFile.KERNELBASE(000000FF,000000FF,00008000,00000000,00000000), ref: 00405813
                                    • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00405721
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: File$ChangeCloseCreateFindNotificationPointerRead
                                    • String ID:
                                    • API String ID: 2405668454-0
                                    • Opcode ID: 4d63c269f70d4390485089aa8b52250387eb2d7af6ec514c67dfc9a70a4bc32e
                                    • Instruction ID: 8973e50cfdb9d5e7b27c815addd36d226a9b0b1cd2d5849c0a33de1e31b9b376
                                    • Opcode Fuzzy Hash: 4d63c269f70d4390485089aa8b52250387eb2d7af6ec514c67dfc9a70a4bc32e
                                    • Instruction Fuzzy Hash: 62E08632200510B6D2213337BC4EF9F1969DBC6B75F11023AF954B71E1CA240D42996D
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00401952: lstrlenA.KERNEL32(00000000,00000000,?,00000003,00401883,?,00000000,00000100,?,?,00000000,004012FE), ref: 00401997
                                      • Part of subcall function 00401952: lstrcpyA.KERNEL32(00000003,00000004,?,?,00000000,004012FE), ref: 004019BC
                                      • Part of subcall function 00401952: CreateFileA.KERNELBASE(00000000,C0000000,00000003,00000000,00000004,00000080,00000000,00000000,?,00000003,00401883,?,00000000,00000100,?,?), ref: 004019D0
                                      • Part of subcall function 00401952: MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 004019E8
                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,004012FE), ref: 00401894
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: File$CreateMessageSizelstrcpylstrlen
                                    • String ID:
                                    • API String ID: 1768807334-0
                                    • Opcode ID: ba683c36329ebd5c12a3503d4c113f1796d716ff42b8173f5f13e82fbe4b8083
                                    • Instruction ID: 7fde7cd1fd42be9bee95f0f8088171eb16aca717885cc3f3d47f3dcf4bb3c1ff
                                    • Opcode Fuzzy Hash: ba683c36329ebd5c12a3503d4c113f1796d716ff42b8173f5f13e82fbe4b8083
                                    • Instruction Fuzzy Hash: 1711047260110136E62277B66C9AEAB365CDBC2B28B10003FF210761F3EA7D4981C6AD
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,?,00000000,0040778D,000000E0,0040777A,?,0040C24D,00000100,?,00000000), ref: 00407815
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: 52b67cc09943b20c3e3e846a34fb564854ae18eb31f8aafc148e39bbf900065e
                                    • Instruction ID: a0bc0ecc14e734f5302ea0703eda57b2a11f479267f013852bcf34c34eb9d99c
                                    • Opcode Fuzzy Hash: 52b67cc09943b20c3e3e846a34fb564854ae18eb31f8aafc148e39bbf900065e
                                    • Instruction Fuzzy Hash: BDF0D133E0812056DA20AA18BC847CB6344AB047A0F1A4137FC40BB6D0DB38BC8192DE
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ReadFile.KERNELBASE(00000000,00000000,00000040,00000000,00000000,00000030,?,00401C5B,00000000,?,00000040,00000000,00000000), ref: 00401A20
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: FileRead
                                    • String ID:
                                    • API String ID: 2738559852-0
                                    • Opcode ID: e275cc5cf057dca071872d07aa4f7b8be72a0eca3b65c716a397254941740e22
                                    • Instruction ID: 6c631456760f93cadece321c574bb2e578ac0fc92485c39130ae30d1b34e3525
                                    • Opcode Fuzzy Hash: e275cc5cf057dca071872d07aa4f7b8be72a0eca3b65c716a397254941740e22
                                    • Instruction Fuzzy Hash: 00D06C7650020DFBCF01CF81DD05BCD7BB9AB08359F208094BA15A61A0C275AA14AB54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetFileAttributesA.KERNELBASE(?,0040148E,?,?,004012AF), ref: 004015C7
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: AttributesFile
                                    • String ID:
                                    • API String ID: 3188754299-0
                                    • Opcode ID: 13c288df28cfc23e53323314f48aca43ccb76ee05be7f7a1cd51ecb78494425c
                                    • Instruction ID: 7cd9cedf266a29ec73d6d98e6508669140cfd745b043f7aada7d6f14f7265389
                                    • Opcode Fuzzy Hash: 13c288df28cfc23e53323314f48aca43ccb76ee05be7f7a1cd51ecb78494425c
                                    • Instruction Fuzzy Hash: AFB092B2524440669A100A31EC1908A3961BBE1736FD44BB0F132D10F0DB3AC850E608
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetFilePointer.KERNELBASE(00000040,00000040,00000000,00000000,00401C65,00000000,?,00000000,00000000,?,00000040,00000000,00000000,00000000), ref: 00401A02
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: FilePointer
                                    • String ID:
                                    • API String ID: 973152223-0
                                    • Opcode ID: 3baff38a61fe862db88c90cc868c0035024b8da1d849f7fcbc2e79a1a3747b19
                                    • Instruction ID: 94f6d2033a5b4d094583f7ef99c4ceab800015b8f3ea0729bdfbd370bf6826c1
                                    • Opcode Fuzzy Hash: 3baff38a61fe862db88c90cc868c0035024b8da1d849f7fcbc2e79a1a3747b19
                                    • Instruction Fuzzy Hash: 4BB09231008341BFCF028F40CC08F1ABBA2BBC8311F108C18B2A0800B0C3328064EB06
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindCloseChangeNotification.KERNELBASE(?,004021BE,00000000,00000000,m#@,?), ref: 00401A51
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: ChangeCloseFindNotification
                                    • String ID:
                                    • API String ID: 2591292051-0
                                    • Opcode ID: 52fce458fff5567b58069289f2d453148072e90a75d11efe014cbcdd217c0b85
                                    • Instruction ID: 7e56071f2918fb3d4f101ed1cbf5dc6322686cea8861f72c9fe3cdc518f1ad18
                                    • Opcode Fuzzy Hash: 52fce458fff5567b58069289f2d453148072e90a75d11efe014cbcdd217c0b85
                                    • Instruction Fuzzy Hash: 42900230404100ABCE015B60DE0D4497A71ABD5702B40C464A05540130D7314850EA05
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • lstrcpyA.KERNEL32(?,?,?,00000000,00000000), ref: 00405229
                                    • lstrcatA.KERNEL32(?,*.*,?,00000000,00000000), ref: 0040523D
                                      • Part of subcall function 004053A3: lstrcpyA.KERNEL32(00000000,pft,759183C0,?,?,00405245,?,?,00000000), ref: 004053BD
                                    • DeleteFileA.KERNEL32(02293618,?,00000000,00000000), ref: 00405261
                                    • FindFirstFileA.KERNEL32(?,00000000,?,00000000,00000000), ref: 00405275
                                    • lstrcpyA.KERNEL32(?,?,?,00000000,00000000), ref: 004052A5
                                    • lstrcatA.KERNEL32(?,0000002E,?,00000000,00000000), ref: 004052B5
                                    • lstrcatA.KERNEL32(?,004161DC,?,00000000,00000000), ref: 004052C3
                                    • FindNextFileA.KERNEL32(?,00000001,?,00000000,00000000), ref: 0040533F
                                    • FindClose.KERNEL32(?,?,00000000,00000000), ref: 00405350
                                    • lstrcpyA.KERNEL32(?,?,?,00000000,00000000), ref: 0040535E
                                    • lstrlenA.KERNEL32(?,?,00000000,00000000), ref: 00405367
                                    • RemoveDirectoryA.KERNEL32(?,?,00000000,00000000), ref: 0040537C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: lstrcpy$FileFindlstrcat$CloseDeleteDirectoryFirstNextRemovelstrlen
                                    • String ID: *.*$.
                                    • API String ID: 3886115242-358234090
                                    • Opcode ID: 94ba93457ffaf0926791161aa8943e11bb4a6f2d899caf678770b6d536c129fb
                                    • Instruction ID: b2a5be81e960dc5e5d3dc78c18d97a63b6495a78830bc4849fa12ecd557dc283
                                    • Opcode Fuzzy Hash: 94ba93457ffaf0926791161aa8943e11bb4a6f2d899caf678770b6d536c129fb
                                    • Instruction Fuzzy Hash: 95514E7690425DAADF609BA0DC4CBDB7BBCEF14344F1044F6E588E2190DBB89AC48F18
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: +$+$-$-$0$0$0$0$0$1$1$9$9$9$9$9$9$C$E$c$e
                                    • API String ID: 0-1157002505
                                    • Opcode ID: bb799671fa6b50ba392b328ad04e11525641ca85e373b087eda3a3f36b40bdce
                                    • Instruction ID: 1c0183d1d6be7a0c93b7e6c822ddc527d2e9cd0e54fde0bb51759277dbb9a051
                                    • Opcode Fuzzy Hash: bb799671fa6b50ba392b328ad04e11525641ca85e373b087eda3a3f36b40bdce
                                    • Instruction Fuzzy Hash: A5E1E431E54619CEEB248F96C8157FE77B1AB44300F28887BD401BA2C1C77D89A6DB59
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LoadLibraryA.KERNEL32(MPR.DLL,WNetUseConnectionA,00000000,00000000,?,?,?,?,?,?,00405EA0,?,?,00000104), ref: 00405F42
                                    • GetProcAddress.KERNEL32(00000000), ref: 00405F49
                                    • lstrlenA.KERNEL32(?,00000000,?,?,?,?,?,?,00405EA0,?,?,00000104), ref: 00405F65
                                    • lstrlenA.KERNEL32(?,?,?,?,?,?,?,00405EA0,?,?,00000104), ref: 00405F6F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: lstrlen$AddressLibraryLoadProc
                                    • String ID: MPR.DLL$WNetUseConnectionA
                                    • API String ID: 2152392224-731280364
                                    • Opcode ID: b2bfcfde93f0aefcdbae2b8097cef43690196a8aa040f1ac1b2b23d04b61f145
                                    • Instruction ID: 2df1312ff3df17567c6720b571f4f60b44d7d1377049fddeba0ed5e79ec9949e
                                    • Opcode Fuzzy Hash: b2bfcfde93f0aefcdbae2b8097cef43690196a8aa040f1ac1b2b23d04b61f145
                                    • Instruction Fuzzy Hash: C6115272945209BFDB01DFA48C84ADFBBBCEF48354F10447AF501F7140D6B59A448B68
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetVersionExA.KERNEL32 ref: 00408C9D
                                    • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 00408CD2
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00408D32
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: EnvironmentFileModuleNameVariableVersion
                                    • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                    • API String ID: 1385375860-4131005785
                                    • Opcode ID: d23cf6847e199eebc820496ae82c46ddc1876c9e5f4b261ac0c0e6cc39450e22
                                    • Instruction ID: 341856302fce649cad1bd69c9006db57c34e8e311e2eb2d21f44f7a9f7913118
                                    • Opcode Fuzzy Hash: d23cf6847e199eebc820496ae82c46ddc1876c9e5f4b261ac0c0e6cc39450e22
                                    • Instruction Fuzzy Hash: A3312471905248A9EB3196706D85BDE37689F22304F2445FFD1C5F62C2DE398EC98B29
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleA.KERNEL32(00000000,?,00000000,?,00000000,004061B6,?,?), ref: 00405861
                                    • FindResourceA.KERNEL32(00000000,00000005,00000005), ref: 00405870
                                    • LoadResource.KERNEL32(00000000,00000000,?,00000000,004061B6,?,?), ref: 0040587A
                                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000,004061B6,?,?), ref: 00405884
                                    • LockResource.KERNEL32(00000000,00000000,?,00000000,004061B6,?,?), ref: 0040588C
                                      • Part of subcall function 004058EA: GlobalAlloc.KERNEL32(00000040,?,?,0040589A,00000000,?,00000000,004061B6,?,?), ref: 004058FA
                                      • Part of subcall function 004058EA: GlobalLock.KERNEL32(00000000,?,00000000,004061B6,?,?), ref: 00405908
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Resource$GlobalLock$AllocFindHandleLoadModuleSizeof
                                    • String ID:
                                    • API String ID: 2547615424-0
                                    • Opcode ID: 64049fa6a90299799c9591256d6634443795024e177185bab79d319aff96fbdf
                                    • Instruction ID: c458e21da43a12acd01c859062edc889918caf26909489e76d6c58577b730de9
                                    • Opcode Fuzzy Hash: 64049fa6a90299799c9591256d6634443795024e177185bab79d319aff96fbdf
                                    • Instruction Fuzzy Hash: A1E0C0723001146FD2006BA6AC4CEBB7E6CDBC9B96B01803AF705C6151DB650C159779
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetLastError.KERNEL32(00000000,0041921C,000000FF,00000000,00000000,00000000,C0000000,004019E5,00000000,00000000,?,?,00000000,004012FE), ref: 0040240E
                                    • FormatMessageA.KERNEL32(00001000,00000000,00000000,?,?,00000000,004012FE), ref: 0040241C
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: ErrorFormatLastMessage
                                    • String ID:
                                    • API String ID: 3479602957-0
                                    • Opcode ID: 57c63c4cc7d61dc8b3abb6b655e743cde684f497abf7c5094e473f5fa5bd20e7
                                    • Instruction ID: 4d989eaf9860f94faa80a3f2f7407def3c44d8569251cefcad220fe8eb13efcd
                                    • Opcode Fuzzy Hash: 57c63c4cc7d61dc8b3abb6b655e743cde684f497abf7c5094e473f5fa5bd20e7
                                    • Instruction Fuzzy Hash: E2F05572B8AB513AFA2086A11C0CFA7BB4CDF00B4AF004076F640AB1C0C7F89C018299
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetProcessHeap.KERNEL32(00000008,00000000,00406366,0000003C,?,00000000,00000000,?,00406030,00000000,?,00000084), ref: 0040632D
                                    • HeapAlloc.KERNEL32(00000000,?,00406030,00000000,?,00000084), ref: 00406334
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Heap$AllocProcess
                                    • String ID:
                                    • API String ID: 1617791916-0
                                    • Opcode ID: eb4e9fc4c42c4f78903dce9f1abd93b4a767cf65bfd3da389922a8311ad5be25
                                    • Instruction ID: b016835f3a1967844e17eb53f5785cd62b06befbf02c6c4687b53648e1476c47
                                    • Opcode Fuzzy Hash: eb4e9fc4c42c4f78903dce9f1abd93b4a767cf65bfd3da389922a8311ad5be25
                                    • Instruction Fuzzy Hash: 99C04C75545210BBDF015BA4AE0C78A7AA4BBF4702F04C874B14A920A0CB788854EB15
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetUnhandledExceptionFilter.KERNEL32(Function_0000D63C), ref: 0040D687
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled
                                    • String ID:
                                    • API String ID: 3192549508-0
                                    • Opcode ID: 148fc3403a1ef9a4d3e7c05b611685d2b7c2983337c65b2b7689ac94ed6ebf66
                                    • Instruction ID: 9d3d302c50e943549161ffe321ed58b7546418842d49b4665dfc9cccca3efeb6
                                    • Opcode Fuzzy Hash: 148fc3403a1ef9a4d3e7c05b611685d2b7c2983337c65b2b7689ac94ed6ebf66
                                    • Instruction Fuzzy Hash: 2AA022F08C0200BBC3000FA0BE8C0C03FB0A280322F20803AF000B02A0FF3000808E0E
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetUnhandledExceptionFilter.KERNEL32 ref: 0040D699
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled
                                    • String ID:
                                    • API String ID: 3192549508-0
                                    • Opcode ID: be8b24e4ec7b6cf308ad4792cd6931a3c75a009ffad83c12280d18f5809e1ab3
                                    • Instruction ID: e6f3b23c3e93498903f4c1933abf6af2ecb0d93331f88b21125e122b8c3521ac
                                    • Opcode Fuzzy Hash: be8b24e4ec7b6cf308ad4792cd6931a3c75a009ffad83c12280d18f5809e1ab3
                                    • Instruction Fuzzy Hash:
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3e5c1480ebf96d88667c82a863206106daadea97e2caa0adaed8bda7a6dcae2e
                                    • Instruction ID: d013edc53b048966aed11bb9bb466ef5eeec4d48ff6a603f818bb9cfb15c4095
                                    • Opcode Fuzzy Hash: 3e5c1480ebf96d88667c82a863206106daadea97e2caa0adaed8bda7a6dcae2e
                                    • Instruction Fuzzy Hash: 12D1C070A047099BDB24CF55CA946FFB7F2AB94304F20881ED09397681D7B8BAC5CB58
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: be544484410ebdf090dbf57a5fb0333a56b84f97c11134d6bb3ee01dec6f5455
                                    • Instruction ID: 3bc46b9157f85938e6f33af7fdda9890bd697447e99165382c9f8c45263c8257
                                    • Opcode Fuzzy Hash: be544484410ebdf090dbf57a5fb0333a56b84f97c11134d6bb3ee01dec6f5455
                                    • Instruction Fuzzy Hash: D5C12431A002588FCF18CF68C5805ED7BA2FF89354B25866AED25C7344D7B9E8C6CB84
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6a63f3b9f9e9d09e5679d4b4521a6557f7ca2f57f57b9ac7ab0d7c6b8fc8ae5b
                                    • Instruction ID: dbf238756eba69b4c3cac5d0e48e2a463811b0ec17ebfe0bafe1e2bafb5e29f2
                                    • Opcode Fuzzy Hash: 6a63f3b9f9e9d09e5679d4b4521a6557f7ca2f57f57b9ac7ab0d7c6b8fc8ae5b
                                    • Instruction Fuzzy Hash: 28C19D71904226DBCB19CF18C1902A9FBB2BB54310B19819FD8965B382D7B8EDD1DFD8
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 85e52312518f2438f01d1aa1d96664aed1a70c8dde6b066cb46e3a9bf0cde43d
                                    • Instruction ID: af19e254c245111d0f8f5bf42b3ea7533422fbbf13c2c7f089db164b61ca7913
                                    • Opcode Fuzzy Hash: 85e52312518f2438f01d1aa1d96664aed1a70c8dde6b066cb46e3a9bf0cde43d
                                    • Instruction Fuzzy Hash: 2BB1DC316052959BCB19CF28D5B02EEBFB0BF45314F1882AED896AB742C3745AD5C7C4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4a6c193b7edb33f067406bda432f2902fcacfd2058d46393713cdf65cc855e3b
                                    • Instruction ID: fd85bc66e9e30e4eccc97984b1453113da8c28ad804a1e500a7d6795cd0419a1
                                    • Opcode Fuzzy Hash: 4a6c193b7edb33f067406bda432f2902fcacfd2058d46393713cdf65cc855e3b
                                    • Instruction Fuzzy Hash: 89A19671A052559FCB19CF58C1A11EEFB70FF05314F1882AEC896AB742C2746A95CBC4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0080bb08aeebae534fe30b8d89d7baf555abb4f97079667fb81ad710f3dc8e04
                                    • Instruction ID: 8d9163ab76747138792596526c08719b9a98c423760e3ac0d5f16697c58711bb
                                    • Opcode Fuzzy Hash: 0080bb08aeebae534fe30b8d89d7baf555abb4f97079667fb81ad710f3dc8e04
                                    • Instruction Fuzzy Hash: 5B81A635A056959FCB09CF58C1E02EDBBB0FF16314F1882AED996AB342C3745A95CBC4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fac211542a3869dc8880f68233b4de0dfb7fb2ced29cb3492eb621ecda2867df
                                    • Instruction ID: 1c05ce3321806919d2e6f3ca094ad830d96b8d9766cf131dc5ff6bc171574d79
                                    • Opcode Fuzzy Hash: fac211542a3869dc8880f68233b4de0dfb7fb2ced29cb3492eb621ecda2867df
                                    • Instruction Fuzzy Hash: 3461E4316101998BDF28DE6CC4904EE77E2EFC9341B24896EEDA2C7351DA35D986CB84
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetDC.USER32(?), ref: 00403234
                                      • Part of subcall function 004035DA: GetWindow.USER32(?,00000005), ref: 00403618
                                      • Part of subcall function 004035DA: wsprintfA.USER32 ref: 00403628
                                      • Part of subcall function 004035DA: GetWindowTextA.USER32(?,00000000,00000104), ref: 00403658
                                      • Part of subcall function 004035DA: SetWindowTextA.USER32(?,00000000), ref: 0040367D
                                      • Part of subcall function 004035DA: GetWindowLongA.USER32(00000000,000000F4), ref: 00403686
                                      • Part of subcall function 004035DA: SetWindowTextA.USER32(00000000), ref: 004036AF
                                      • Part of subcall function 004035DA: GetWindow.USER32(00000000,00000002), ref: 004036B4
                                      • Part of subcall function 00405647: FindResourceA.KERNEL32(00000076,00000002,00000000), ref: 00405652
                                      • Part of subcall function 00405647: LoadResource.KERNEL32(00000000), ref: 00405667
                                      • Part of subcall function 00405647: LockResource.KERNEL32(00000000), ref: 0040566E
                                      • Part of subcall function 00405647: GetDC.USER32(?), ref: 00405680
                                      • Part of subcall function 00405647: SelectPalette.GDI32(00000000,00000000), ref: 00405699
                                      • Part of subcall function 00405647: RealizePalette.GDI32(00000000), ref: 004056A0
                                      • Part of subcall function 00405647: CreateDIBitmap.GDI32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 004056B8
                                      • Part of subcall function 00405647: SendDlgItemMessageA.USER32(?,00000085,00000172,00000000,00000000), ref: 004056CF
                                      • Part of subcall function 00405647: ReleaseDC.USER32(?,00000000), ref: 004056DC
                                      • Part of subcall function 00405647: DeleteObject.GDI32(00000000), ref: 004056E3
                                      • Part of subcall function 00401571: wsprintfA.USER32 ref: 00401596
                                      • Part of subcall function 00401571: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00419320,?,?,00000200), ref: 004015B7
                                    • wsprintfA.USER32 ref: 0040329C
                                    • SetDlgItemTextA.USER32(?,00000064), ref: 004032B0
                                    • wsprintfA.USER32 ref: 004032DC
                                    • SetDlgItemTextA.USER32(?,00000065), ref: 004032EC
                                    • LoadStringA.USER32(00000148,00000000,00000104), ref: 0040331C
                                    • GetDeviceCaps.GDI32(00000110,0000005A), ref: 00403362
                                    • MulDiv.KERNEL32(00000008,00000000), ref: 0040336C
                                    • lstrcpyA.KERNEL32(?,00000001), ref: 0040337C
                                    • GetSystemDefaultLCID.KERNEL32 ref: 00403382
                                    • CreateFontIndirectA.GDI32(00000000), ref: 00403397
                                    • SendDlgItemMessageA.USER32(?,00000064,00000030,00000000,00000000), ref: 004033AB
                                    • ReleaseDC.USER32(?,00000000), ref: 004033BD
                                    • GetParent.USER32(FFFFFF38), ref: 004033DE
                                    • LoadStringA.USER32(00000149,00000000,00000104), ref: 00403430
                                    • SendMessageA.USER32(00000000,00000473,00000000,00000000), ref: 00403445
                                    • GetDlgItem.USER32(00000000,00000002), ref: 00403450
                                    • EnableWindow.USER32(00000000), ref: 00403457
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Window$ItemText$wsprintf$LoadMessageResourceSendString$CreatePaletteRelease$BitmapCapsDefaultDeleteDeviceEnableFindFontIndirectLockLongObjectParentPrivateProfileRealizeSelectSystemlstrcpy
                                    • String ID: Dialog1006$FinishButton$Fonts$N
                                    • API String ID: 278050392-2850110493
                                    • Opcode ID: ebd1d3011ec86586ee6211cfa0aed7c3fccf565099f751f75716c4befd822aeb
                                    • Instruction ID: 0f4dd7da18540b1e2da193ac709c2a3681961cc389230ee1b59677f665cb3b39
                                    • Opcode Fuzzy Hash: ebd1d3011ec86586ee6211cfa0aed7c3fccf565099f751f75716c4befd822aeb
                                    • Instruction Fuzzy Hash: C2618172900219BBEB219F61EC49FDA3B79EB48311F0080B5FB09B91E0D7759A84CB59
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetDC.USER32(?), ref: 00406838
                                    • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 00406856
                                    • GetObjectA.GDI32(00000000,0000003C,?), ref: 00406866
                                    • CreateFontIndirectA.GDI32(?), ref: 00406877
                                    • SelectObject.GDI32(?,00000000), ref: 00406887
                                    • GetDlgItem.USER32(?,000003EE), ref: 004068A0
                                    • GetWindowTextA.USER32(00000000,?,?), ref: 004068A3
                                    • GetTextExtentPointA.GDI32(?,?,00000000,?), ref: 004068BF
                                    • SelectObject.GDI32(?,?), ref: 004068CB
                                    • DeleteObject.GDI32(00000000), ref: 004068CE
                                    • ReleaseDC.USER32(?,?), ref: 004068DB
                                    • GetDlgItem.USER32(?,000003ED), ref: 004068EB
                                    • GetWindowRect.USER32(00000000), ref: 004068EE
                                    • ScreenToClient.USER32(?,?), ref: 004068F9
                                    • GetDlgItem.USER32(?,000003EE), ref: 0040692A
                                    • MoveWindow.USER32(00000000,?,?,?), ref: 0040692D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Object$ItemWindow$SelectText$ClientCreateDeleteExtentFontIndirectMessageMovePointRectReleaseScreenSend
                                    • String ID:
                                    • API String ID: 1906446766-3916222277
                                    • Opcode ID: 140fdfe0ed9b392c28a0a4deb838aa954a173129a5d87e1ebc9878c902ee89ca
                                    • Instruction ID: dfe959b9b812f797f2b715098574d691e9e25971b7a3a140fbd83e00e2a8bb36
                                    • Opcode Fuzzy Hash: 140fdfe0ed9b392c28a0a4deb838aa954a173129a5d87e1ebc9878c902ee89ca
                                    • Instruction Fuzzy Hash: 81412772D00209BFEF019FE4DD49EEEBF7DEB88350F008165F605A61A0D774AA498B64
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000004(MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 00405419
                                    • GetPrivateProfileSectionA.KERNEL32(rename,00000000,00007CFF,wininit.ini), ref: 0040546C
                                    • GetShortPathNameA.KERNEL32(00000000,?,00000104), ref: 00405483
                                    • lstrcpyA.KERNEL32(?,00000000), ref: 00405497
                                    • WritePrivateProfileStringA.KERNEL32(rename,NUL,?,wininit.ini), ref: 004054AF
                                    • lstrcatA.KERNEL32(00000000,NUL), ref: 004054CD
                                    • lstrcatA.KERNEL32(00000000,00416204), ref: 004054D7
                                    • lstrcatA.KERNEL32(00000000,?), ref: 004054E3
                                    • lstrcatA.KERNEL32(00000000,00419324), ref: 004054ED
                                    • WritePrivateProfileSectionA.KERNEL32(rename,00000000,wininit.ini), ref: 004054F8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: lstrcat$PrivateProfile$SectionWrite$FileMoveNamePathShortStringlstrcpy
                                    • String ID: NUL$rename$wininit.ini
                                    • API String ID: 2575390381-3118012028
                                    • Opcode ID: 9ac8b413ca368b5b40f5896d70141537ef0516c3c2dc5c4a77b09dbd9535744c
                                    • Instruction ID: 400a8396ce9eee186ee2c416e91e94f91ecf9d1195689743a5c9ea24b6730561
                                    • Opcode Fuzzy Hash: 9ac8b413ca368b5b40f5896d70141537ef0516c3c2dc5c4a77b09dbd9535744c
                                    • Instruction Fuzzy Hash: 562171B19002587BDB119B64DD48FEB3F6DEB99740F0140F6FA08A6190D7B8AEC18F94
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetParent.USER32(0001046E), ref: 00404DB3
                                    • IsWindowEnabled.USER32(?), ref: 00404DC9
                                    • EnableWindow.USER32(?,00000000), ref: 00404DD5
                                    • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,?,?,?,?,00401BA4,?,?), ref: 00404E15
                                    • UpdateWindow.USER32(00000000), ref: 00404E1C
                                    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00404E47
                                    • IsDialogMessageA.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,00401BA4,?,?), ref: 00404E54
                                    • TranslateMessage.USER32(?), ref: 00404E62
                                    • DispatchMessageA.USER32(?), ref: 00404E6C
                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000097,?,?,?,?,?), ref: 00404E8B
                                    • EnableWindow.USER32(?,00000001), ref: 00404E9C
                                    • GetActiveWindow.USER32 ref: 00404EA6
                                    • SetActiveWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,00401BA4,?,?), ref: 00404EB1
                                    • DestroyWindow.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?,00401BA4,?,?), ref: 00404EB8
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Window$Message$ActiveEnable$DestroyDialogDispatchEnabledParentPeekShowTranslateUpdate
                                    • String ID:
                                    • API String ID: 1591417340-0
                                    • Opcode ID: 5f03419bcf9a846febc37eb5a7d009ba96a6c5b3958d015304fc3008d5e49d68
                                    • Instruction ID: aa2987de32b8d278d39830922d6abc3ef3ae7c9058600372be9b3ffc5e8eb5f8
                                    • Opcode Fuzzy Hash: 5f03419bcf9a846febc37eb5a7d009ba96a6c5b3958d015304fc3008d5e49d68
                                    • Instruction Fuzzy Hash: 7E4199B1500205AFDB109F94DCC89DF7BB8BB84350F1085B6F601F62E0D7799E818BA9
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetSystemDefaultLCID.KERNEL32(?,00000000), ref: 00403E58
                                      • Part of subcall function 00401571: wsprintfA.USER32 ref: 00401596
                                      • Part of subcall function 00401571: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00419320,?,?,00000200), ref: 004015B7
                                    • LoadStringA.USER32(00000148,00000000,00000104), ref: 00403EA1
                                    • wsprintfA.USER32 ref: 00403F22
                                    • SetWindowTextA.USER32(?,00000000), ref: 00403F31
                                    • SendMessageA.USER32(?,00000444,00000001,0000003C), ref: 00403F4B
                                    • wsprintfA.USER32 ref: 00403F78
                                    • SendMessageA.USER32(?,000000C2,00000000,00000000), ref: 00403F8F
                                    • SendMessageA.USER32(?,000000C2,00000000,004161CC), ref: 00403F9C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: MessageSendwsprintf$String$DefaultLoadPrivateProfileSystemTextWindow
                                    • String ID: <$Dialog1000$Fonts
                                    • API String ID: 873754150-1366194858
                                    • Opcode ID: a234f1e347060823b79bfe9113ee22340477f8fcb7f18a0ba1dca640f1ead0e2
                                    • Instruction ID: 1db5739fd0262a55d5a275016a2cc092b59be0e7a1e0744c3b973cfa6a4d4b3a
                                    • Opcode Fuzzy Hash: a234f1e347060823b79bfe9113ee22340477f8fcb7f18a0ba1dca640f1ead0e2
                                    • Instruction Fuzzy Hash: 7041A672900218BAEB21DB91DC45FDE7B7CEB49710F0001B6FA0DB60A1E7759A45CBA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetDlgItemTextA.USER32(?,000003E8,00000000), ref: 00402D72
                                    • CheckDlgButton.USER32(?,0000006B,00000001), ref: 00402D85
                                    • CheckDlgButton.USER32(?,00000065,00000001), ref: 00402D9A
                                    • GetParent.USER32(?), ref: 00402DD6
                                    • PostMessageA.USER32(00000000,00000470,00000000,00000002), ref: 00402DF6
                                    • IsDlgButtonChecked.USER32(?,0000006B), ref: 00402E0C
                                    • IsDlgButtonChecked.USER32(?,00000065), ref: 00402E39
                                    • GetDlgItemTextA.USER32(?,000003E8,00000000,00000104), ref: 00402E70
                                      • Part of subcall function 004037C2: GetDlgItemTextA.USER32(?,?,00000104), ref: 004037EA
                                      • Part of subcall function 004037C2: SHBrowseForFolderA.SHELL32(00000000), ref: 00403806
                                      • Part of subcall function 004037C2: SHGetPathFromIDListA.SHELL32(00000000), ref: 0040381D
                                      • Part of subcall function 004037C2: SetDlgItemTextA.USER32(?,?), ref: 0040382D
                                      • Part of subcall function 004037C2: SHGetMalloc.SHELL32(00000000), ref: 00403837
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: ButtonItemText$CheckChecked$BrowseFolderFromListMallocMessageParentPathPost
                                    • String ID: e
                                    • API String ID: 3205614594-4024072794
                                    • Opcode ID: 1900e6281d902b9428a3544bccc7ff9323e9c21a002ba5e09522e24a50349864
                                    • Instruction ID: c6ff34ee2d12b29278a15c8f8de870ba6f64bf5916b4560a4751b3d646c6fd37
                                    • Opcode Fuzzy Hash: 1900e6281d902b9428a3544bccc7ff9323e9c21a002ba5e09522e24a50349864
                                    • Instruction Fuzzy Hash: 2A41B231640205BBEB215F24ED4DB9A3B68AB44761F108237FA14B91E0D7F95D82869D
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindResourceA.KERNEL32(00000076,00000002,00000000), ref: 00405652
                                    • LoadResource.KERNEL32(00000000), ref: 00405667
                                    • LockResource.KERNEL32(00000000), ref: 0040566E
                                    • GetDC.USER32(?), ref: 00405680
                                    • SelectPalette.GDI32(00000000,00000000), ref: 00405699
                                    • RealizePalette.GDI32(00000000), ref: 004056A0
                                    • CreateDIBitmap.GDI32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 004056B8
                                    • SendDlgItemMessageA.USER32(?,00000085,00000172,00000000,00000000), ref: 004056CF
                                    • ReleaseDC.USER32(?,00000000), ref: 004056DC
                                    • DeleteObject.GDI32(00000000), ref: 004056E3
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Resource$Palette$BitmapCreateDeleteFindItemLoadLockMessageObjectRealizeReleaseSelectSend
                                    • String ID:
                                    • API String ID: 716246171-0
                                    • Opcode ID: 38f544a413b6b44f4c141e57701c1e807826da5ed5ff07d7fecdedc205d325a4
                                    • Instruction ID: 04f100853902a9fe9b0590c99cd79adfdfeefb215ec9547315a300f0042b13e0
                                    • Opcode Fuzzy Hash: 38f544a413b6b44f4c141e57701c1e807826da5ed5ff07d7fecdedc205d325a4
                                    • Instruction Fuzzy Hash: 84113C72245210BBE2215B62FD0DFAB7F69EB88741F008435FB46A51A0C77188148B69
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetWindowLongA.USER32(?,000000F0), ref: 00403D71
                                    • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00403D88
                                    • lstrlenA.KERNEL32(00000000,?,00000000), ref: 00403D91
                                    • SendMessageA.USER32(?,00000449,00000002,00000000), ref: 00403DD3
                                    • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00403DE1
                                    • SendMessageA.USER32(?,000000B1,000000FF,00000000), ref: 00403DEF
                                    • SetFocus.USER32(?,?,00000000), ref: 00403DF4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: LongWindow$MessageSend$Focuslstrlen
                                    • String ID: {\rtf1
                                    • API String ID: 1463997157-3715308267
                                    • Opcode ID: 32ce0f2a4504c01460ade79483ce9beec71bba947468537b1dff4b5a83aba0c4
                                    • Instruction ID: fb3658837487b4d0274175eb31ed7e35a08a9877adb6185ffc8a238d7c8c3237
                                    • Opcode Fuzzy Hash: 32ce0f2a4504c01460ade79483ce9beec71bba947468537b1dff4b5a83aba0c4
                                    • Instruction Fuzzy Hash: 81117F75900209BFDF019F69CC45BEEBBB8EB45361F208335FA25B61E0D7705A448A94
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,00000080,00000000,%spftw%d.pkg,75A78400,0040410D,00000000,?), ref: 00405B20
                                    • GetFileSize.KERNEL32(00000000,00000000,00000001), ref: 00405B30
                                    • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00405B41
                                    • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000), ref: 00405B54
                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 00405B74
                                    • CloseHandle.KERNEL32(00000000), ref: 00405B7B
                                    • CloseHandle.KERNEL32(00000000), ref: 00405B83
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                                    • String ID: %spftw%d.pkg
                                    • API String ID: 1223616889-1047716302
                                    • Opcode ID: 8dd7c9c4dd6dfd8909f98cb308c390d20275b95fcda290dcbe7fac9b4d04d3ad
                                    • Instruction ID: 92b5050ad223bed8466b22819fc30c0b444472c830c296ef74e4ce8055e5494e
                                    • Opcode Fuzzy Hash: 8dd7c9c4dd6dfd8909f98cb308c390d20275b95fcda290dcbe7fac9b4d04d3ad
                                    • Instruction Fuzzy Hash: EC0188711012247BD2301772AC4DFEB7E6CEFDABB5F004535F60AA11A1D6755841C6F4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,0040C625,?,Microsoft Visual C++ Runtime Library,00012010,?,00414714,?,004161CC,?,?,?,Runtime Error!Program: ), ref: 0040D7DF
                                    • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 0040D7F7
                                    • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 0040D808
                                    • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 0040D815
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                    • API String ID: 2238633743-4044615076
                                    • Opcode ID: 2f45db8a982cf454b95c1fe4bf1dc65959b3e9954dac1e6db55de9973a1e787c
                                    • Instruction ID: 1ead94f1624d2a98a459ab4abdef513b641aab28b74f73ca356311b0248242ab
                                    • Opcode Fuzzy Hash: 2f45db8a982cf454b95c1fe4bf1dc65959b3e9954dac1e6db55de9973a1e787c
                                    • Instruction Fuzzy Hash: BA019273A00211AFC711AFF5DC809977FD9A6C9740700803BE514F21A1E7788C05CB28
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LCMapStringW.KERNEL32(00000000,00000100,00414360,00000001,00000000,00000000,00000103,00000001,00000000,?,00407EB0,00200020,00000000,?,00000000,00000000), ref: 0040C7BA
                                    • LCMapStringA.KERNEL32(00000000,00000100,0041435C,00000001,00000000,00000000,?,00407EB0,00200020,00000000,?,00000000,00000000,00000001), ref: 0040C7D6
                                    • LCMapStringA.KERNEL32(00000000,?,00000000,00200020,00407EB0,?,00000103,00000001,00000000,?,00407EB0,00200020,00000000,?,00000000,00000000), ref: 0040C81F
                                    • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,00407EB0,00200020,00000000,?,00000000,00000000), ref: 0040C857
                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,00407EB0,00200020,00000000,?,00000000), ref: 0040C8AF
                                    • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,00407EB0,00200020,00000000,?,00000000), ref: 0040C8C5
                                    • LCMapStringW.KERNEL32(00000000,?,00407EB0,00000000,00407EB0,?,?,00407EB0,00200020,00000000,?,00000000), ref: 0040C8F8
                                    • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,00407EB0,00200020,00000000,?,00000000), ref: 0040C960
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: String$ByteCharMultiWide
                                    • String ID:
                                    • API String ID: 352835431-0
                                    • Opcode ID: 2833639efa36ac3f41bff09b50ceed3d9e7c7c02cac28e88731f6914761ca15b
                                    • Instruction ID: 8f4717ef94387bcd4920df582b6b5af949e7dd481edcc3b5973512d6dd1bf37e
                                    • Opcode Fuzzy Hash: 2833639efa36ac3f41bff09b50ceed3d9e7c7c02cac28e88731f6914761ca15b
                                    • Instruction Fuzzy Hash: EA514C72500209FFCF228F54DC85ADF7BB9FB49750F24822AF915B11A0D3398961DB69
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetParent.USER32(?), ref: 00402B2D
                                    • GetDlgItem.USER32(00000000), ref: 00402B34
                                    • IsDlgButtonChecked.USER32(?,00000079), ref: 00402B41
                                    • EnableWindow.USER32(00000000,00000000), ref: 00402B49
                                    • GetDlgItem.USER32(?,000003EA), ref: 00402B59
                                    • SendMessageA.USER32(00000000,00000443,00000000,00FFFFFF), ref: 00402B6E
                                    • CheckRadioButton.USER32(?,00000079,0000007A,0000007A), ref: 00402BA1
                                    • PostMessageA.USER32(?,00000470,00000000,00000002), ref: 00402BE3
                                    • PostMessageA.USER32(?,00000111,00000000,00000000), ref: 00402BF1
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Message$ButtonItemPost$CheckCheckedEnableParentRadioSendWindow
                                    • String ID:
                                    • API String ID: 1484406288-0
                                    • Opcode ID: 1e868fafdcf448363762029474e2d2e17c190ad6a5515d649147fe1cc5c1713d
                                    • Instruction ID: 3fadb27ac01f9d55b5e437ac79b00a2ae6f70f31f0c5a17a1eaf18bb3532f87e
                                    • Opcode Fuzzy Hash: 1e868fafdcf448363762029474e2d2e17c190ad6a5515d649147fe1cc5c1713d
                                    • Instruction Fuzzy Hash: 0221C431240204BBEB245F64ED4EFAA3B64AB04751F048171FA05BE1E0C7F8AD80975D
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 0040C56E
                                    • GetStdHandle.KERNEL32(000000F4,00414714,00000000,?,00000000,00000000), ref: 0040C644
                                    • WriteFile.KERNEL32(00000000), ref: 0040C64B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: File$HandleModuleNameWrite
                                    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                    • API String ID: 3784150691-4022980321
                                    • Opcode ID: 96749eb4b26ce01e73468dfa637d0779e17ea3168b736927295669d157ce0f3e
                                    • Instruction ID: 5b8ac133ff3fd9ac2faa98b2c88071a27cf057afa519fce47c5ba6ea14c808a4
                                    • Opcode Fuzzy Hash: 96749eb4b26ce01e73468dfa637d0779e17ea3168b736927295669d157ce0f3e
                                    • Instruction Fuzzy Hash: D131D772A40219AFDF20EB64CC85FDA73ACDB86304F10057BF555F61C1EA78E9848A5E
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00408B7B), ref: 0040C125
                                    • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00408B7B), ref: 0040C139
                                    • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00408B7B), ref: 0040C165
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00408B7B), ref: 0040C19D
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00408B7B), ref: 0040C1BF
                                    • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00408B7B), ref: 0040C1D8
                                    • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00408B7B), ref: 0040C1EB
                                    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 0040C229
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                    • String ID:
                                    • API String ID: 1823725401-0
                                    • Opcode ID: 7a873bf3284d8b59d312db343a87460b93aee6134abf32e47e98bb67c3b3bd03
                                    • Instruction ID: 50c388e47401c603b81313386e4b3569f087f0677a5a2fb1675687ffe347ed7f
                                    • Opcode Fuzzy Hash: 7a873bf3284d8b59d312db343a87460b93aee6134abf32e47e98bb67c3b3bd03
                                    • Instruction Fuzzy Hash: A23108B2908250EFE7207FB45CC887B769CE695348725073FF545E33C1D6385C8286AA
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SendDlgItemMessageA.USER32(?,00000085,?,?,?), ref: 00402A2A
                                    • GetParent.USER32(?), ref: 00402A47
                                    • GetDlgItem.USER32(00000000), ref: 00402A4E
                                    • SetFocus.USER32(00000000), ref: 00402A55
                                    • GetDlgItem.USER32(?,000003FD), ref: 00402A68
                                    • SendMessageA.USER32(00000000,00000443,00000000,00FFFFFF), ref: 00402A7D
                                    • PostMessageA.USER32(?,00000470,00000000,00000002), ref: 00402AE3
                                    • PostMessageA.USER32(?,00000111,00000006,00000000), ref: 00402AF1
                                      • Part of subcall function 00403DFF: GetSystemDefaultLCID.KERNEL32(?,00000000), ref: 00403E58
                                      • Part of subcall function 00403DFF: LoadStringA.USER32(00000148,00000000,00000104), ref: 00403EA1
                                      • Part of subcall function 00403DFF: wsprintfA.USER32 ref: 00403F22
                                      • Part of subcall function 00403DFF: SetWindowTextA.USER32(?,00000000), ref: 00403F31
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Message$Item$PostSend$DefaultFocusLoadParentStringSystemTextWindowwsprintf
                                    • String ID:
                                    • API String ID: 3232642914-0
                                    • Opcode ID: e2aadf2555547aa086d2dcc2efc96fa0815761600a52c305fbcbf72d0412ac55
                                    • Instruction ID: 411f8c5412464ce1c5da251ff220fcf511123735ae4c70419b61e6621006dc6a
                                    • Opcode Fuzzy Hash: e2aadf2555547aa086d2dcc2efc96fa0815761600a52c305fbcbf72d0412ac55
                                    • Instruction Fuzzy Hash: B4218231340205BBDB315F64DE4DFAA3B25AB08751F008172F605B91E0CFF99E91AE59
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetDC.USER32 ref: 00406D40
                                    • SelectPalette.GDI32(00000000,?,00000000), ref: 00406D52
                                    • RealizePalette.GDI32(00000000), ref: 00406D5F
                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?,?,?,004074BF,00000000), ref: 00406D6A
                                    • UpdateWindow.USER32 ref: 00406D71
                                    • SelectPalette.GDI32(00000000,?,00000001), ref: 00406D7E
                                    • RealizePalette.GDI32(00000000), ref: 00406D81
                                    • ReleaseDC.USER32(?,00000000), ref: 00406D85
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Palette$RealizeSelect$InvalidateRectReleaseUpdateWindow
                                    • String ID:
                                    • API String ID: 1074785300-0
                                    • Opcode ID: 51b02ec3ecb783dcfab73b078d36a97d6bb2cd92b2bd9021bab8269bdc21bd79
                                    • Instruction ID: 37e544b1d06a43e96b9325451c1a806623bb03ce21380c46575fc6c521384163
                                    • Opcode Fuzzy Hash: 51b02ec3ecb783dcfab73b078d36a97d6bb2cd92b2bd9021bab8269bdc21bd79
                                    • Instruction Fuzzy Hash: 3D014F32201210ABD6119F529C84FBB7B69EF8A791F054069FA05971E0C775985187A9
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetDC.USER32(?), ref: 004055F2
                                    • SelectPalette.GDI32(00000000,00000000), ref: 00405609
                                    • RealizePalette.GDI32(00000000), ref: 00405616
                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?,?,00402997,?), ref: 00405621
                                    • UpdateWindow.USER32(?), ref: 00405628
                                    • SelectPalette.GDI32(00000000,?,00000001), ref: 00405635
                                    • RealizePalette.GDI32(00000000), ref: 00405638
                                    • ReleaseDC.USER32(?,00000000), ref: 0040563C
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Palette$RealizeSelect$InvalidateRectReleaseUpdateWindow
                                    • String ID:
                                    • API String ID: 1074785300-0
                                    • Opcode ID: af2c7741e775901df5624680ce04b076a8e6c9c989b16fdda67ca0354942fc6c
                                    • Instruction ID: b8cc776660985edf29c93cd6a729609e3accba79b9f20cdf6b2e840687a0fa23
                                    • Opcode Fuzzy Hash: af2c7741e775901df5624680ce04b076a8e6c9c989b16fdda67ca0354942fc6c
                                    • Instruction Fuzzy Hash: 79F09632101215BFD3205B91AC48FDB7B6DEFC9791F008475F605511A1C7759840CBBD
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • MapDialogRect.USER32(?,?), ref: 00406971
                                    • GetClientRect.USER32(?,?), ref: 0040697C
                                    • GetDlgItem.USER32(?,000003EC), ref: 0040698C
                                    • GetWindowRect.USER32(00000000), ref: 00406993
                                    • ScreenToClient.USER32(?,00000000), ref: 004069A4
                                    • ScreenToClient.USER32(?,?), ref: 004069AB
                                    • GetObjectA.GDI32(?,00000018,00000000), ref: 004069DF
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: ClientRect$Screen$DialogItemObjectWindow
                                    • String ID:
                                    • API String ID: 2622344874-0
                                    • Opcode ID: 9bd8c297c69239ad4304326fe2c78b8d0b652b2f0bf96f10c17a1553f3c14471
                                    • Instruction ID: 9ef960dc9f026529a5d00d26eff85435bc7d679c88585d4bebc251973b7572d6
                                    • Opcode Fuzzy Hash: 9bd8c297c69239ad4304326fe2c78b8d0b652b2f0bf96f10c17a1553f3c14471
                                    • Instruction Fuzzy Hash: A6314D72A00619AFEB00DFB8DC449EEB7F8FF48301B058539EA06E3250D734A9058B55
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetProcAddress.KERNEL32(00000000,PackageStartup), ref: 004023B1
                                    • GetProcAddress.KERNEL32(UnpackFile,00000008), ref: 004023CC
                                    • GetProcAddress.KERNEL32(PackageShutdown,00000008), ref: 004023E7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: AddressProc
                                    • String ID: PackageShutdown$PackageStartup$UnpackFile
                                    • API String ID: 190572456-2228215052
                                    • Opcode ID: 6ea395b99c198f7da2486e322cd6128c0d89822ffa4f7716d822e5920a793bbc
                                    • Instruction ID: 3a92a82f39b8aad7fb114ae9dfcc3d12dd7ff95cbd216f38c092ee301832bfd0
                                    • Opcode Fuzzy Hash: 6ea395b99c198f7da2486e322cd6128c0d89822ffa4f7716d822e5920a793bbc
                                    • Instruction Fuzzy Hash: FCF01870685212BEE7614B75BE1D7E37B94AB54750F048077ED80E12E1D7BCCC81A65C
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetStringTypeW.KERNEL32(00000001,00414360,00000001,00000000,00000103,00000001,00000000,00407EB0,00200020,00000000,?,00000000,00000000,00000001), ref: 0040A16E
                                    • GetStringTypeA.KERNEL32(00000000,00000001,0041435C,00000001,?,?,00000000,00000000,00000001), ref: 0040A188
                                    • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,00407EB0,00200020,00000000,?,00000000,00000000,00000001), ref: 0040A1BC
                                    • MultiByteToWideChar.KERNEL32(00407EB0,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,00407EB0,00200020,00000000,?,00000000,00000000,00000001), ref: 0040A1F4
                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040A24A
                                    • GetStringTypeW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040A25C
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: StringType$ByteCharMultiWide
                                    • String ID:
                                    • API String ID: 3852931651-0
                                    • Opcode ID: 20265833c327ce34363aa2e764294fa681e98ed8e96c5020b563225e9bc71b3b
                                    • Instruction ID: b501cfa6c74910f9cc0f0af42280e6b1b224ee3cb96f6093f406aaf26d2919fc
                                    • Opcode Fuzzy Hash: 20265833c327ce34363aa2e764294fa681e98ed8e96c5020b563225e9bc71b3b
                                    • Instruction Fuzzy Hash: B6418D72600319AFCF119F94DC859EF7F79FB09750F14853AF911A6290D3398960CBAA
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindResourceA.KERNEL32(00000000,00000000,00000002), ref: 0040554F
                                    • LoadResource.KERNEL32(00000000,00000000,?,?,00402711,00000084,?,00000000), ref: 00405557
                                    • LockResource.KERNEL32(00000000,?,?,00402711,00000084,?,00000000), ref: 0040555E
                                    • LocalAlloc.KERNEL32(00000000,00000000,?,?,00402711,00000084,?,00000000), ref: 00405586
                                    • CreatePalette.GDI32(00000000), ref: 004055C8
                                    • LocalFree.KERNEL32(00000000,?,?,00402711,00000084,?,00000000), ref: 004055D2
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Resource$Local$AllocCreateFindFreeLoadLockPalette
                                    • String ID:
                                    • API String ID: 3492113042-0
                                    • Opcode ID: 6e433d10c1f4bd14630e313f8dd8bf703d190bb4948349c208632a9ada8de3ee
                                    • Instruction ID: 893e98016c5667574ef3d14f18bd773cf7b48ce466f1602ad7ef4289a2d11189
                                    • Opcode Fuzzy Hash: 6e433d10c1f4bd14630e313f8dd8bf703d190bb4948349c208632a9ada8de3ee
                                    • Instruction Fuzzy Hash: 1711E176104340ABD7108F65DCC8AEB7FB8EF09345B0980B9EA46DB392C635C908CB24
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetDlgItem.USER32(?,000003E8), ref: 00402CD6
                                    • EnableWindow.USER32(00000000), ref: 00402CDF
                                    • GetDlgItem.USER32(?,000003E8), ref: 00402CE7
                                    • EnableWindow.USER32(00000000), ref: 00402CEA
                                    • GetDlgItem.USER32(?,00000067), ref: 00402CF3
                                    • EnableWindow.USER32(00000000), ref: 00402CF6
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: EnableItemWindow
                                    • String ID:
                                    • API String ID: 3833022359-0
                                    • Opcode ID: bf15a4d5e91e4f40b4ea0cea495a14d278cfe4df83884963169fe406cd847c85
                                    • Instruction ID: 2bacc87bf2bb0f9aeee99420032e611666a37cdbd6b7a60443870ee4aabb1c55
                                    • Opcode Fuzzy Hash: bf15a4d5e91e4f40b4ea0cea495a14d278cfe4df83884963169fe406cd847c85
                                    • Instruction Fuzzy Hash: CBE012A250431C7BD7106BA6EC44C6BBF5DEBC5395F154466F250930608A366C158A71
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetDlgItemTextA.USER32(?,000003E8,00000000), ref: 00402F2A
                                    • GetParent.USER32(?), ref: 00402F69
                                    • PostMessageA.USER32(00000000,00000470,00000000,00000002), ref: 00402F89
                                    • GetDlgItemTextA.USER32(?,000003E8,00000000,00000104), ref: 00402FB6
                                      • Part of subcall function 004037C2: GetDlgItemTextA.USER32(?,?,00000104), ref: 004037EA
                                      • Part of subcall function 004037C2: SHBrowseForFolderA.SHELL32(00000000), ref: 00403806
                                      • Part of subcall function 004037C2: SHGetPathFromIDListA.SHELL32(00000000), ref: 0040381D
                                      • Part of subcall function 004037C2: SetDlgItemTextA.USER32(?,?), ref: 0040382D
                                      • Part of subcall function 004037C2: SHGetMalloc.SHELL32(00000000), ref: 00403837
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: ItemText$BrowseFolderFromListMallocMessageParentPathPost
                                    • String ID: g
                                    • API String ID: 1010951078-30677878
                                    • Opcode ID: 59fad4f732fd7f3f9307d6f6e0e48df16501f0181cc388118d658c956fd271a9
                                    • Instruction ID: bb5131771f340208206b64948a43ed7839d98c06b0a4ee75a7bc2f7d9d2b0a65
                                    • Opcode Fuzzy Hash: 59fad4f732fd7f3f9307d6f6e0e48df16501f0181cc388118d658c956fd271a9
                                    • Instruction Fuzzy Hash: CC31C831644202BBEB205F24DD4DF9A3B68AB407A1F108237FA14B91E1C7F99D81A64D
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LoadStringA.USER32(?,00000000,00000200), ref: 004034E7
                                    • LoadStringA.USER32(?,00000000,00000032), ref: 004034F8
                                    • lstrcpyA.KERNEL32(00000000,02293758), ref: 0040350A
                                    • MessageBoxA.USER32(00401109,00000000,00000000,?), ref: 00403521
                                      • Part of subcall function 00401571: wsprintfA.USER32 ref: 00401596
                                      • Part of subcall function 00401571: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00419320,?,?,00000200), ref: 004015B7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: String$Load$MessagePrivateProfilelstrcpywsprintf
                                    • String ID: Strings
                                    • API String ID: 3605897094-2066174825
                                    • Opcode ID: 88341ff01efdd57a0230ca2c81fd7040983aabfc14176a083dd012bb044f6532
                                    • Instruction ID: 3744ca10a7814bb748675778f2318439a8a3d9ae79a94d59a9326146c4a0c273
                                    • Opcode Fuzzy Hash: 88341ff01efdd57a0230ca2c81fd7040983aabfc14176a083dd012bb044f6532
                                    • Instruction Fuzzy Hash: 86216D32901119BEEB12DFA0EC49FDA3BA9AB44300F0440B2F905A60A0D779AF54CB59
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • lstrcpyA.KERNEL32(00000000,?,?,00000104), ref: 004036EF
                                      • Part of subcall function 00405D15: lstrcpyA.KERNEL32(?,?,?,?,004011E8,?,?,?,?,00000000,00401317,?), ref: 00405D4B
                                    • lstrlenA.KERNEL32(00000000), ref: 00403716
                                    • lstrcatA.KERNEL32(00000000,00000000), ref: 0040374C
                                    • GetFileAttributesA.KERNEL32(00000000), ref: 00403759
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: lstrcpy$AttributesFilelstrcatlstrlen
                                    • String ID: :
                                    • API String ID: 310069060-336475711
                                    • Opcode ID: 17735bbab4ea3fe31dc5a0b2eed266c691286273a1aebd8bb7780a30ebf06901
                                    • Instruction ID: fd0a01e19d01ccbfc19555c9fc43d0b78a4f851554ef8117f1799297a7bbdefc
                                    • Opcode Fuzzy Hash: 17735bbab4ea3fe31dc5a0b2eed266c691286273a1aebd8bb7780a30ebf06901
                                    • Instruction Fuzzy Hash: 221186F2C001186BDF20AB75DD8CACA7B6CEB54311F1089B6E284E7180D7B8DBC48A54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetStartupInfoA.KERNEL32(?), ref: 0040C295
                                    • GetFileType.KERNEL32(00000800), ref: 0040C33B
                                    • GetStdHandle.KERNEL32(-000000F6), ref: 0040C394
                                    • GetFileType.KERNEL32(00000000), ref: 0040C3A2
                                    • SetHandleCount.KERNEL32 ref: 0040C3D9
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: FileHandleType$CountInfoStartup
                                    • String ID:
                                    • API String ID: 1710529072-0
                                    • Opcode ID: 6d00c089b8a2315fbb41edcebb8bc82723ba67600105e5232af204000f713424
                                    • Instruction ID: d39144794a7c6c825988b68a1d0366ecdbaaab8c1d933fb19de1a66655f9f46e
                                    • Opcode Fuzzy Hash: 6d00c089b8a2315fbb41edcebb8bc82723ba67600105e5232af204000f713424
                                    • Instruction Fuzzy Hash: FA511771A14304CBD7218B28DCC479A7B90EB55760F15C77EE8A6E72E0D73898458749
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetParent.USER32(?), ref: 00402C0E
                                    • GetDlgItem.USER32(00000000,00003024), ref: 00402C40
                                    • EnableWindow.USER32(00000000), ref: 00402C47
                                    • PostMessageA.USER32(00000000,00000470,00000000,00000002), ref: 00402C98
                                    • PostMessageA.USER32(?,00000111,00000404,00000000), ref: 00402CA7
                                      • Part of subcall function 00403863: GetDlgItem.USER32(?,00000404), ref: 0040386C
                                      • Part of subcall function 00403863: GetWindowTextA.USER32(00000000,00000080), ref: 00403882
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: ItemMessagePostWindow$EnableParentText
                                    • String ID:
                                    • API String ID: 2496947184-0
                                    • Opcode ID: 0920bde40f279914459a91c00be91bf2e2071d90273375be4cee29146c4d4e0a
                                    • Instruction ID: 133644a7fa8984f9a38a7b752acf1feba21ba144d4065a928660ac08491e6c22
                                    • Opcode Fuzzy Hash: 0920bde40f279914459a91c00be91bf2e2071d90273375be4cee29146c4d4e0a
                                    • Instruction Fuzzy Hash: 9D11EC7160820067F1215B249E4DF7F6B689B85760F148537F601FA2E0C7FC5D41455E
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetDlgItemTextA.USER32(?,?,00000104), ref: 004037EA
                                    • SHBrowseForFolderA.SHELL32(00000000), ref: 00403806
                                    • SHGetPathFromIDListA.SHELL32(00000000), ref: 0040381D
                                    • SetDlgItemTextA.USER32(?,?), ref: 0040382D
                                    • SHGetMalloc.SHELL32(00000000), ref: 00403837
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: ItemText$BrowseFolderFromListMallocPath
                                    • String ID:
                                    • API String ID: 2720712886-0
                                    • Opcode ID: 6ba4210ce5c44972cbea0a62a5ecf3cbf3faa24621dc5d10556818ae92d67d87
                                    • Instruction ID: 0a21b9deaa8ac9300e9da6ca98691e222711bbe4bf10c040fd0671f6d0f4f36a
                                    • Opcode Fuzzy Hash: 6ba4210ce5c44972cbea0a62a5ecf3cbf3faa24621dc5d10556818ae92d67d87
                                    • Instruction Fuzzy Hash: 63117C76500109BBDF009F94EC48ADE3BB9FF88351F008069F914EB260C778D981CBA8
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • lstrcpyA.KERNEL32(00000000,00401FCE,0000000A,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00402343
                                    • lstrcatA.KERNEL32(ext.dll,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00402354
                                      • Part of subcall function 0040214D: GetTempFileNameA.KERNELBASE(ext,00000000,?,?,0000000A,00000000), ref: 00402184
                                      • Part of subcall function 0040214D: LZOpenFileA.LZ32(?,?,00000000), ref: 004021D0
                                      • Part of subcall function 0040214D: LZOpenFileA.LZ32(?,?,00001001,?,?,00000000), ref: 004021E6
                                      • Part of subcall function 0040214D: LZCopy.LZ32(00000000,00000000,?,?,00001001,?,?,00000000), ref: 004021EF
                                      • Part of subcall function 0040214D: LZClose.LZ32(00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 004021F7
                                      • Part of subcall function 0040214D: LZClose.LZ32(00000000,00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 004021FD
                                      • Part of subcall function 0040214D: DeleteFileA.KERNELBASE(?,00000000,00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 00402209
                                    • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0040237A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: File$CloseOpen$CopyDeleteLibraryLoadNameTemplstrcatlstrcpy
                                    • String ID: ext.dll
                                    • API String ID: 2593742186-767477686
                                    • Opcode ID: 49587b6e2dbfb0e66ac34c7e94e9a7acf5d0e4641a30af379a49bd5a6786fa10
                                    • Instruction ID: df4ef179d70a8bab862c9f3126dff634cce098dfb0557d0ef8915ba1c07caf68
                                    • Opcode Fuzzy Hash: 49587b6e2dbfb0e66ac34c7e94e9a7acf5d0e4641a30af379a49bd5a6786fa10
                                    • Instruction Fuzzy Hash: 96F0A572400302BBEB016FB0EE5D9C53FA1AB49391B14C4B9FD49952B0EA7588D09B0E
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LoadLibraryA.KERNEL32(MPR.DLL,WNetCancelConnectionA,00405F15,?), ref: 00405FDF
                                    • GetProcAddress.KERNEL32(00000000), ref: 00405FE6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID: MPR.DLL$WNetCancelConnectionA
                                    • API String ID: 2574300362-1448443596
                                    • Opcode ID: 0be5d8f2d7996cab7d4df4048a0b0863c50ad6c818e55a9eedf0d06f05eb293b
                                    • Instruction ID: 68d045de471b50b1614cbb163fabf985cf20a8ff32a27f948d08598c887d4ab0
                                    • Opcode Fuzzy Hash: 0be5d8f2d7996cab7d4df4048a0b0863c50ad6c818e55a9eedf0d06f05eb293b
                                    • Instruction Fuzzy Hash: 6DC01270384301BADD1027B19C09FD63916ABD0B01F5084A5B101E40E0C7FDC4C1A61C
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleA.KERNEL32(KERNEL32,0040830C), ref: 0040AED0
                                    • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0040AEE0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProc
                                    • String ID: IsProcessorFeaturePresent$KERNEL32
                                    • API String ID: 1646373207-3105848591
                                    • Opcode ID: de5fe31e997ba962d53d551606d77ce3f6201435d4edbb480daef343e904dc2b
                                    • Instruction ID: becdb2791673a1baec4d8d6731a5747a7440f07b871a71b0bb268612feb913f1
                                    • Opcode Fuzzy Hash: de5fe31e997ba962d53d551606d77ce3f6201435d4edbb480daef343e904dc2b
                                    • Instruction Fuzzy Hash: 18C012B0388300A2DA109BB2EC09BA72908ABC4B42F208432B506F11C4EA68C120806F
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,00408E0C), ref: 00409695
                                    • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,00408E0C), ref: 004096B9
                                    • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,00408E0C), ref: 004096D3
                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,00408E0C), ref: 00409794
                                    • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,00408E0C), ref: 004097AB
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: AllocVirtual$FreeHeap
                                    • String ID:
                                    • API String ID: 714016831-0
                                    • Opcode ID: 49a98caae418f61196f391d86b63dca86b72c772b6ed51c11c33fe000d8449dd
                                    • Instruction ID: 89f0a977a38399401ffd879a30759e7964da469ab762546d4917c1c1f9d9f554
                                    • Opcode Fuzzy Hash: 49a98caae418f61196f391d86b63dca86b72c772b6ed51c11c33fe000d8449dd
                                    • Instruction Fuzzy Hash: 1131E272540702EFD3209F28EC44BA2B7A0EB84754F11857AE565A73D2E778AC40CB4C
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • WriteFile.KERNEL32(?,?,?,00000000,00000000,00000001,?,?), ref: 0040CB39
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: FileWrite
                                    • String ID:
                                    • API String ID: 3934441357-0
                                    • Opcode ID: 0a9ff05cde040f737af7b2970a6209008d03e1732c38138b7156a403acf9b288
                                    • Instruction ID: fa53058aa8ef7eacbe48970695de94bb601e94315c09a2380e08095f96fe8c19
                                    • Opcode Fuzzy Hash: 0a9ff05cde040f737af7b2970a6209008d03e1732c38138b7156a403acf9b288
                                    • Instruction Fuzzy Hash: BE518F71A00248EFDB11CF68D9C5BEE7BB4FB45340F2082BAE815AB2D1D7349A41DB59
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetVersion.KERNEL32 ref: 00408B1D
                                      • Part of subcall function 00408DC6: HeapCreate.KERNELBASE(00000000,00001000,00000000,00408B56,00000000), ref: 00408DD7
                                      • Part of subcall function 00408DC6: HeapDestroy.KERNEL32 ref: 00408E16
                                    • GetCommandLineA.KERNEL32 ref: 00408B6B
                                    • GetStartupInfoA.KERNEL32(?), ref: 00408B96
                                    • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00408BB9
                                      • Part of subcall function 00408C12: ExitProcess.KERNEL32 ref: 00408C2F
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                    • String ID:
                                    • API String ID: 2057626494-0
                                    • Opcode ID: d510aa4885f37058ec0ef47d0757d0fa9bf18efd2d9e68eb83a826f5eccc6951
                                    • Instruction ID: 896ec4e5aa4b8a2976dd6cbb5118bab6ec5fd747d74f1aa10b8b753c1c72eb94
                                    • Opcode Fuzzy Hash: d510aa4885f37058ec0ef47d0757d0fa9bf18efd2d9e68eb83a826f5eccc6951
                                    • Instruction Fuzzy Hash: 7A2181B19007159EDB08AFA6DD59AAE7BB8EF48704F10813EF905B72D1DB3849408B9D
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetDesktopWindow.USER32 ref: 0040625F
                                    • GetWindowRect.USER32(?,?), ref: 00406276
                                    • GetWindowRect.USER32(00000000,?), ref: 00406283
                                    • SetWindowPos.USER32(?,00000000,?,00000000,00000000,00000000,00000205), ref: 004062CD
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Window$Rect$Desktop
                                    • String ID:
                                    • API String ID: 2751908114-0
                                    • Opcode ID: abdaf45adecf57a9a03b7666bdb353c5cdc635f94b50f5a8c8ddd39188418c6f
                                    • Instruction ID: d404da5adbb321e8670e2982a1216062f1589296a2eaed2c3d5b3e2b1b5da81d
                                    • Opcode Fuzzy Hash: abdaf45adecf57a9a03b7666bdb353c5cdc635f94b50f5a8c8ddd39188418c6f
                                    • Instruction Fuzzy Hash: 8D115B31A0011AAFDF04DFBCCD4ABEE7BF9AB48300F098269B915E6194D674E9408B54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetCPInfo.KERNEL32(?,00000000), ref: 00409EEB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: Info
                                    • String ID: $
                                    • API String ID: 1807457897-3032137957
                                    • Opcode ID: 27c527f3b9f98d3ac852974d80fa4755831a64004ac93b2d34c5505e22373bf3
                                    • Instruction ID: 892fc819eea14caa453426140a60edf0b9309335270a2ade329b636b987c79a8
                                    • Opcode Fuzzy Hash: 27c527f3b9f98d3ac852974d80fa4755831a64004ac93b2d34c5505e22373bf3
                                    • Instruction Fuzzy Hash: 4941257140425C5AEB159B24CD49BFB3FE9DB0A704F1400F6D289E71D2C3394969CBAE
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetTempFileNameA.KERNEL32(welcome,00000000,00000000,?,0000000A), ref: 0040224C
                                      • Part of subcall function 0040214D: GetTempFileNameA.KERNELBASE(ext,00000000,?,?,0000000A,00000000), ref: 00402184
                                      • Part of subcall function 0040214D: LZOpenFileA.LZ32(?,?,00000000), ref: 004021D0
                                      • Part of subcall function 0040214D: LZOpenFileA.LZ32(?,?,00001001,?,?,00000000), ref: 004021E6
                                      • Part of subcall function 0040214D: LZCopy.LZ32(00000000,00000000,?,?,00001001,?,?,00000000), ref: 004021EF
                                      • Part of subcall function 0040214D: LZClose.LZ32(00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 004021F7
                                      • Part of subcall function 0040214D: LZClose.LZ32(00000000,00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 004021FD
                                      • Part of subcall function 0040214D: DeleteFileA.KERNELBASE(?,00000000,00000000,00000000,00000000,?,?,00001001,?,?,00000000), ref: 00402209
                                      • Part of subcall function 00401952: lstrlenA.KERNEL32(00000000,00000000,?,00000003,00401883,?,00000000,00000100,?,?,00000000,004012FE), ref: 00401997
                                      • Part of subcall function 00401952: lstrcpyA.KERNEL32(00000003,00000004,?,?,00000000,004012FE), ref: 004019BC
                                      • Part of subcall function 00401952: CreateFileA.KERNELBASE(00000000,C0000000,00000003,00000000,00000004,00000080,00000000,00000000,?,00000003,00401883,?,00000000,00000100,?,?), ref: 004019D0
                                      • Part of subcall function 00401952: MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 004019E8
                                    • DeleteFileA.KERNEL32(00000000), ref: 004022B3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: File$CloseDeleteNameOpenTemp$CopyCreateMessagelstrcpylstrlen
                                    • String ID: welcome
                                    • API String ID: 1679127067-936075699
                                    • Opcode ID: a2eeb2acc6741e96da506680db1937c08e86463e84d4dcfb1fba7e765caa47df
                                    • Instruction ID: dd9fe5d97780a883ac17640bb97f0082d237e1fc7efabfc3c5cd99da4cd25e5c
                                    • Opcode Fuzzy Hash: a2eeb2acc6741e96da506680db1937c08e86463e84d4dcfb1fba7e765caa47df
                                    • Instruction Fuzzy Hash: EE114CB2D0021477CF20AB71DD49FC63BAC9B44310F1004B6F748F60D0E6F896848A68
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00409290,?,?,?,00000100,?,00000000), ref: 004094F0
                                    • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00409290,?,?,?,00000100,?,00000000), ref: 00409524
                                    • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00409290,?,?,?,00000100,?,00000000), ref: 0040953E
                                    • HeapFree.KERNEL32(00000000,?,?,00000000,00409290,?,?,?,00000100,?,00000000), ref: 00409555
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.3344968887.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                    • Associated: 00000005.00000002.3344902063.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345071718.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345156495.0000000000416000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345242693.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000005.00000002.3345326529.000000000041D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_400000_cltw10100a.jbxd
                                    Similarity
                                    • API ID: AllocHeap$FreeVirtual
                                    • String ID:
                                    • API String ID: 3499195154-0
                                    • Opcode ID: 434cea2566e82a3843e6ccb88b0a035efd3b5e81a060f5c2c3ea8190fc9587c9
                                    • Instruction ID: 9e5264e086b127680553acff16b804ae64e108c4fc7ad2de7a2763fecc11b05d
                                    • Opcode Fuzzy Hash: 434cea2566e82a3843e6ccb88b0a035efd3b5e81a060f5c2c3ea8190fc9587c9
                                    • Instruction Fuzzy Hash: 68114C71200700AFC7219F1AEC499A27BB6FF947A07108939F552D79F1D7709881CF88
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Execution Graph

                                    Execution Coverage:7.7%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:4.5%
                                    Total number of Nodes:2000
                                    Total number of Limit Nodes:52
                                    execution_graph 56386 c5fc80 IsIconic 56387 c5fcab 56386->56387 56388 c5fd4a 56386->56388 56409 c6d9d3 98 API calls 3 library calls 56387->56409 56399 c6bef4 56388->56399 56391 c5fcb5 SendMessageW GetSystemMetrics GetSystemMetrics GetClientRect DrawIcon 56410 c6da27 99 API calls 3 library calls 56391->56410 56396 c5fd38 56411 d683fc 56396->56411 56398 c5fd46 56400 c6bf00 __EH_prolog3_GS 56399->56400 56419 c6d9d3 98 API calls 3 library calls 56400->56419 56402 c6bf25 56427 c6da27 99 API calls 3 library calls 56402->56427 56403 c6bf0b 56403->56402 56420 c7202c 56403->56420 56406 c6bf31 56428 d69b08 56406->56428 56409->56391 56410->56396 56412 d68406 IsDebuggerPresent 56411->56412 56413 d68404 56411->56413 56483 d7b453 56412->56483 56413->56398 56416 d704a0 SetUnhandledExceptionFilter UnhandledExceptionFilter 56417 d704c5 GetCurrentProcess TerminateProcess 56416->56417 56418 d704bd __call_reportfault 56416->56418 56417->56398 56418->56417 56419->56403 56431 c7e4ec 56420->56431 56422 c72040 56423 c72049 56422->56423 56447 c69376 56422->56447 56442 c6fd72 56423->56442 56427->56406 56429 d683fc __getdrive 5 API calls 56428->56429 56430 d69b12 56429->56430 56430->56430 56433 c7e4f8 __EH_prolog3 56431->56433 56432 c7e546 56469 c7dfa7 EnterCriticalSection 56432->56469 56433->56432 56434 c69376 ctype 2 API calls 56433->56434 56451 c7e21d TlsAlloc 56433->56451 56455 c7e105 EnterCriticalSection 56433->56455 56434->56433 56439 c7e56c ~_Task_impl 56439->56422 56440 c7e559 56476 c7e2c4 9 API calls 4 library calls 56440->56476 56443 c6fda3 CallWindowProcW 56442->56443 56444 c6fd81 56442->56444 56445 c6fdb6 56443->56445 56444->56443 56446 c6fd8f DefWindowProcW 56444->56446 56445->56402 56446->56445 56481 d69c56 RaiseException 56447->56481 56449 c69391 __EH_prolog3 56482 c7df74 LocalAlloc RaiseException ctype 56449->56482 56452 c7e24e InitializeCriticalSection 56451->56452 56453 c7e249 56451->56453 56452->56433 56477 c6933e RaiseException __CxxThrowException@8 56453->56477 56457 c7e128 56455->56457 56456 c7e1e7 _memset 56458 c7e1fe LeaveCriticalSection 56456->56458 56457->56456 56459 c7e176 GlobalHandle GlobalUnlock 56457->56459 56460 c7e161 ctype 56457->56460 56458->56433 56478 c6868e 56459->56478 56462 c7e169 GlobalAlloc 56460->56462 56464 c7e1a0 56462->56464 56463 c7e194 GlobalReAlloc 56463->56464 56465 c7e1c7 GlobalLock 56464->56465 56466 c7e1ab GlobalHandle GlobalLock 56464->56466 56467 c7e1b9 LeaveCriticalSection 56464->56467 56465->56456 56466->56467 56480 c6933e RaiseException __CxxThrowException@8 56467->56480 56470 c7dfc2 56469->56470 56471 c7dfe9 LeaveCriticalSection 56469->56471 56470->56471 56473 c7dfc7 TlsGetValue 56470->56473 56472 c7dff2 56471->56472 56472->56439 56472->56440 56473->56471 56474 c7dfd3 56473->56474 56474->56471 56475 c7dfd8 LeaveCriticalSection 56474->56475 56475->56472 56476->56439 56479 c686a3 ctype 56478->56479 56479->56463 56481->56449 56483->56416 56484 c7fc62 56485 c7fc6e 56484->56485 56486 c69376 ctype 2 API calls 56485->56486 56487 c7fc79 56485->56487 56486->56485 56492 c55420 56487->56492 56491 c7fc91 ctype 56493 c5544f ctype 56492->56493 56494 c554a0 56493->56494 56495 c55488 56493->56495 56509 c556f0 56494->56509 56516 c694c3 31 API calls ctype 56495->56516 56498 c55491 56499 c5549e 56498->56499 56517 c551e0 75 API calls 2 library calls 56498->56517 56501 d68e8b 56499->56501 56502 d68f03 56501->56502 56503 d68e9a 56501->56503 56681 d68db7 77 API calls 4 library calls 56502->56681 56505 d69d23 __chsize_nolock 66 API calls 56503->56505 56506 d68eb1 56503->56506 56507 d68ea6 56505->56507 56506->56491 56680 d70663 11 API calls __gmtime64_s 56507->56680 56510 c55702 ctype 56509->56510 56511 c5570f 56509->56511 56510->56499 56515 c5578a 56511->56515 56518 c55620 56511->56518 56526 d68480 66 API calls 3 library calls 56511->56526 56527 d6840b 56511->56527 56515->56499 56516->56498 56517->56499 56519 c55630 56518->56519 56520 c55638 56519->56520 56524 c55643 56519->56524 56536 c55550 56520->56536 56522 c55670 56522->56511 56524->56522 56542 c555e0 56524->56542 56526->56511 56530 d68418 _memmove 56527->56530 56532 d6841c _memset 56527->56532 56528 d68422 56529 d69d23 __chsize_nolock 66 API calls 56528->56529 56531 d68427 56529->56531 56530->56511 56679 d70663 11 API calls __gmtime64_s 56531->56679 56532->56528 56532->56530 56533 d68467 56532->56533 56533->56530 56535 d69d23 __chsize_nolock 66 API calls 56533->56535 56535->56531 56537 c5556b 56536->56537 56546 c68602 56537->56546 56538 c55579 56539 d6840b _memcpy_s 66 API calls 56538->56539 56540 c555a3 56539->56540 56540->56511 56543 c555f6 56542->56543 56544 c55606 56542->56544 56543->56544 56652 c68653 56543->56652 56544->56522 56547 c68616 56546->56547 56549 c68612 56546->56549 56550 d69251 56547->56550 56549->56538 56551 d692ce 56550->56551 56562 d6925f 56550->56562 56574 d74ad1 DecodePointer 56551->56574 56553 d692d4 56554 d69d23 __chsize_nolock 65 API calls 56553->56554 56566 d692c6 56554->56566 56556 d6928d RtlAllocateHeap 56556->56562 56556->56566 56558 d692ba 56571 d69d23 56558->56571 56562->56556 56562->56558 56563 d692b8 56562->56563 56564 d6926a 56562->56564 56570 d74ad1 DecodePointer 56562->56570 56565 d69d23 __chsize_nolock 65 API calls 56563->56565 56564->56562 56567 d6f669 66 API calls __NMSG_WRITE 56564->56567 56568 d6f4ba 66 API calls 7 library calls 56564->56568 56569 d6c41c GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 56564->56569 56565->56566 56566->56549 56567->56564 56568->56564 56570->56562 56575 d6ff6f GetLastError 56571->56575 56573 d69d28 56573->56563 56574->56553 56589 d6fe2d TlsGetValue 56575->56589 56578 d6ffdc SetLastError 56578->56573 56581 d6ffa2 DecodePointer 56582 d6ffb7 56581->56582 56583 d6ffd3 56582->56583 56584 d6ffbb 56582->56584 56611 d68b67 56583->56611 56598 d6febb 56584->56598 56588 d6ffd9 56588->56578 56590 d6fe42 DecodePointer TlsSetValue 56589->56590 56591 d6fe5d 56589->56591 56590->56591 56591->56578 56592 d73802 56591->56592 56594 d7380b 56592->56594 56595 d6ff9a 56594->56595 56596 d73829 Sleep 56594->56596 56617 d77a61 56594->56617 56595->56578 56595->56581 56597 d7383e 56596->56597 56597->56594 56597->56595 56626 d6a820 56598->56626 56600 d6fec7 GetModuleHandleW 56627 d774d1 56600->56627 56602 d6ff05 InterlockedIncrement 56634 d6ff5d 56602->56634 56605 d774d1 __lock 64 API calls 56606 d6ff26 56605->56606 56637 d73fd2 InterlockedIncrement 56606->56637 56608 d6ff44 56612 d68b72 HeapFree 56611->56612 56613 d68b9b __dosmaperr 56611->56613 56612->56613 56614 d68b87 56612->56614 56613->56588 56615 d69d23 __chsize_nolock 64 API calls 56614->56615 56616 d68b8d GetLastError 56615->56616 56616->56613 56618 d77a6d 56617->56618 56624 d77a88 56617->56624 56619 d77a79 56618->56619 56618->56624 56620 d69d23 __chsize_nolock 65 API calls 56619->56620 56622 d77a7e 56620->56622 56621 d77a9b HeapAlloc 56623 d77ac2 56621->56623 56621->56624 56622->56594 56623->56594 56624->56621 56624->56623 56625 d74ad1 _malloc DecodePointer 56624->56625 56625->56624 56626->56600 56628 d774e6 56627->56628 56629 d774f9 EnterCriticalSection 56627->56629 56630 d7740f __mtinitlocknum 65 API calls 56628->56630 56629->56602 56631 d774ec 56630->56631 56631->56629 56632 d6c6be __amsg_exit 65 API calls 56631->56632 56633 d774f8 56632->56633 56633->56629 56635 d773f8 _doexit LeaveCriticalSection 56634->56635 56636 d6ff1f 56635->56636 56636->56605 56638 d73ff3 56637->56638 56639 d73ff0 InterlockedIncrement 56637->56639 56640 d74000 56638->56640 56641 d73ffd InterlockedIncrement 56638->56641 56639->56638 56642 d7400d 56640->56642 56643 d7400a InterlockedIncrement 56640->56643 56641->56640 56644 d74017 InterlockedIncrement 56642->56644 56645 d7401a 56642->56645 56643->56642 56644->56645 56646 d74033 InterlockedIncrement 56645->56646 56647 d74043 InterlockedIncrement 56645->56647 56648 d7404e InterlockedIncrement 56645->56648 56646->56645 56647->56645 56648->56608 56653 c68664 56652->56653 56654 c68660 56652->56654 56656 d6958b 56653->56656 56654->56544 56657 d69596 56656->56657 56658 d695a1 56656->56658 56659 d69251 _malloc 66 API calls 56657->56659 56660 d695a9 56658->56660 56668 d695b6 56658->56668 56662 d6959e 56659->56662 56661 d68b67 _free 66 API calls 56660->56661 56676 d695b1 __dosmaperr 56661->56676 56662->56654 56663 d695ee 56678 d74ad1 DecodePointer 56663->56678 56664 d695be RtlReAllocateHeap 56664->56668 56664->56676 56666 d695f4 56669 d69d23 __chsize_nolock 66 API calls 56666->56669 56667 d6961e 56671 d69d23 __chsize_nolock 66 API calls 56667->56671 56668->56663 56668->56664 56668->56667 56673 d69606 56668->56673 56677 d74ad1 DecodePointer 56668->56677 56669->56676 56672 d69623 GetLastError 56671->56672 56672->56676 56674 d69d23 __chsize_nolock 66 API calls 56673->56674 56675 d6960b GetLastError 56674->56675 56675->56676 56676->56654 56677->56668 56678->56666 56679->56530 56680->56506 56681->56506 56682 c63460 56685 c63560 56682->56685 56684 c6346c moneypunct 56722 c64f70 56685->56722 56688 c55420 ctype 104 API calls 56690 c63606 56688->56690 56689 c636f1 56692 c69376 ctype 2 API calls 56689->56692 56693 c65010 109 API calls 56690->56693 56691 c63618 56691->56689 56697 c63665 ctype 56691->56697 56694 c636f6 InitCommonControlsEx 56692->56694 56693->56691 56729 c79cc1 56694->56729 56696 c6374e 56738 c7aaa8 56696->56738 56876 c797ed 103 API calls 3 library calls 56697->56876 56701 c636dd 56701->56684 56703 c6376a 56752 c7b020 WaitForSingleObject 56703->56752 56723 c55420 ctype 104 API calls 56722->56723 56724 c64faf 56723->56724 56879 c64ee0 56724->56879 56728 c6359f 56728->56688 56728->56691 56730 c79ccd __EH_prolog3 56729->56730 56958 c79305 GetModuleFileNameW 56730->56958 56731 c79d06 56735 c55420 ctype 104 API calls 56731->56735 56736 c79d21 ctype ~_Task_impl 56731->56736 56735->56736 56736->56696 56739 c7aab5 56738->56739 56740 c7aacf 56738->56740 57070 c7e013 8 API calls 3 library calls 56739->57070 56742 c6bdd2 ctype 31 API calls 56740->56742 56744 c63755 56742->56744 56743 c7aac4 56743->56740 56745 c69376 ctype 2 API calls 56743->56745 56746 c7af96 56744->56746 56745->56740 56747 c7afa2 __EH_prolog3 56746->56747 56748 c7afaf CreateMutexW 56747->56748 56749 c7afd4 ~_Task_impl 56748->56749 56750 c7afcf 56748->56750 56749->56703 57071 c6d035 RaiseException __CxxThrowException@8 56750->57071 56753 c6378b 56752->56753 56876->56701 56880 c55420 ctype 104 API calls 56879->56880 56881 c64f16 56880->56881 56892 c64c50 56881->56892 56884 c55820 56885 c55838 56884->56885 56889 c55887 56884->56889 56886 c5587b 56885->56886 56887 c55848 56885->56887 56888 c556f0 ctype 69 API calls 56886->56888 56957 c557b0 66 API calls _memcpy_s 56887->56957 56888->56889 56889->56728 56891 c5584e 56891->56728 56893 c64c9e ctype 56892->56893 56894 c55420 ctype 104 API calls 56893->56894 56895 c64ce5 GetModuleHandleW 56894->56895 56896 c64d23 56895->56896 56897 c64d01 GetProcAddress 56895->56897 56899 c64d48 RegOpenKeyExW 56896->56899 56914 c5daf0 71 API calls 3 library calls 56896->56914 56897->56896 56898 c64d13 GetCurrentProcess 56897->56898 56898->56896 56900 c64d68 ctype 56899->56900 56911 c64e64 56899->56911 56906 c64df7 RegQueryValueExW 56900->56906 56907 c64d9e 56900->56907 56902 c64e8e RegCloseKey 56903 c64e95 56902->56903 56904 d683fc __getdrive 5 API calls 56903->56904 56905 c64ed7 56904->56905 56905->56884 56908 c64e44 56906->56908 56910 c64de2 56906->56910 56907->56908 56909 c64da7 RegQueryValueExW 56907->56909 56908->56911 56913 c55820 ctype 69 API calls 56908->56913 56909->56908 56909->56910 56915 c54d90 56910->56915 56911->56902 56911->56903 56913->56911 56914->56899 56918 c54d10 56915->56918 56919 c54d1f 56918->56919 56921 c55620 ctype 69 API calls 56919->56921 56923 c54d7c 56919->56923 56924 d6886f 56919->56924 56927 d686e6 56919->56927 56921->56919 56923->56908 56930 d68813 56924->56930 56926 d68886 56926->56919 56938 d6866d 56927->56938 56929 d686fe 56929->56919 56931 d68846 56930->56931 56932 d68831 56930->56932 56931->56926 56933 d69d23 __chsize_nolock 66 API calls 56932->56933 56934 d68836 56933->56934 56937 d70663 11 API calls __gmtime64_s 56934->56937 56936 d68841 56936->56926 56937->56936 56939 d6868d 56938->56939 56940 d68678 56938->56940 56942 d6869b 56939->56942 56943 d686a8 56939->56943 56941 d69d23 __chsize_nolock 66 API calls 56940->56941 56945 d6867d 56941->56945 56944 d69d23 __chsize_nolock 66 API calls 56942->56944 56955 d68577 97 API calls 3 library calls 56943->56955 56946 d686a0 56944->56946 56954 d70663 11 API calls __gmtime64_s 56945->56954 56956 d70663 11 API calls __gmtime64_s 56946->56956 56949 d686bf 56952 d686e0 56949->56952 56953 d69d23 __chsize_nolock 66 API calls 56949->56953 56950 d68688 56950->56929 56952->56929 56953->56946 56954->56950 56955->56949 56956->56952 56957->56891 56959 c79337 56958->56959 56960 c7936c 56958->56960 56959->56960 56961 c7933b PathFindExtensionW 56959->56961 56962 d683fc __getdrive 5 API calls 56960->56962 56970 c7914f 56961->56970 56964 c7937c 56962->56964 56964->56731 56965 c6bdd2 56964->56965 56966 c7e4ec ctype 25 API calls 56965->56966 56967 c6bde1 56966->56967 56968 c6be04 InterlockedExchange 56967->56968 57069 c7e013 8 API calls 3 library calls 56967->57069 56968->56731 56983 c710ac 56970->56983 56972 c79185 56973 c7918e GetProcAddress 56972->56973 56974 c79239 6 API calls 56972->56974 56973->56974 56981 c791a4 _memset _wcslen 56973->56981 56977 c792b8 56974->56977 56975 c792ed 56978 d683fc __getdrive 5 API calls 56975->56978 56977->56975 56990 c78b33 56977->56990 56979 c792fc 56978->56979 56979->56960 56981->56974 56982 d69d23 __chsize_nolock 66 API calls 56981->56982 57014 d6c8b8 67 API calls __fassign 56981->57014 56982->56981 56984 c710b8 _fgetws 56983->56984 56985 c6bdd2 ctype 31 API calls 56984->56985 56986 c710c6 ActivateActCtx 56985->56986 56987 c710dd LoadLibraryW 56986->56987 56989 c710d9 _fgetws 56986->56989 57015 c71101 56987->57015 56989->56972 56991 c78b60 56990->56991 56992 c78b78 GetLocaleInfoW 56990->56992 57024 d69b26 66 API calls 2 library calls 56991->57024 56993 c78c0e 56992->56993 56994 c78b73 56992->56994 56999 d683fc __getdrive 5 API calls 56993->56999 56996 d69d23 __chsize_nolock 66 API calls 56994->56996 56998 c78b94 56996->56998 56997 c78b6d 57025 c55150 56997->57025 57001 d69d23 __chsize_nolock 66 API calls 56998->57001 57002 c78c1b 56999->57002 57002->56977 57014->56981 57016 c7110f GetLastError 57015->57016 57017 c71119 57015->57017 57018 c7111b DeactivateActCtx 57016->57018 57017->57018 57019 c71131 57018->57019 57020 c7112a SetLastError 57018->57020 57019->56989 57020->57019 57024->56997 57026 c55169 57025->57026 57027 c5515b 57025->57027 57027->57026 57069->56967 57070->56743 57654 c68400 57656 c68421 _wcslwr_s_l_stat 57654->57656 57655 c55620 ctype 69 API calls 57655->57656 57656->57655 57657 d6840b _memcpy_s 66 API calls 57656->57657 57658 c684ac 57656->57658 57657->57656 57659 c8102e SetErrorMode SetErrorMode 57660 c6bdd2 ctype 31 API calls 57659->57660 57661 c8104b 57660->57661 57672 c6b541 GetModuleFileNameW 57661->57672 57664 c6bdd2 ctype 31 API calls 57665 c81060 57664->57665 57666 c8107d 57665->57666 57682 c80e52 57665->57682 57668 c6bdd2 ctype 31 API calls 57666->57668 57669 c81082 57668->57669 57670 c8108e 57669->57670 57671 c7b7ad 33 API calls 57669->57671 57671->57670 57673 c6b582 57672->57673 57681 c6b620 57672->57681 57674 c6b596 CreateActCtxWWorker 57673->57674 57675 c6b589 SetLastError 57673->57675 57677 c6b5e0 CreateActCtxWWorker 57674->57677 57678 c6b5f9 57674->57678 57675->57681 57676 d683fc __getdrive 5 API calls 57679 c6b633 57676->57679 57677->57678 57680 c6b602 CreateActCtxWWorker 57678->57680 57678->57681 57679->57664 57680->57681 57681->57676 57683 c6bdd2 ctype 31 API calls 57682->57683 57684 c80e71 GetModuleFileNameW 57683->57684 57685 c80e99 57684->57685 57686 c80ea2 PathFindExtensionW 57685->57686 57716 c6d051 RaiseException __CxxThrowException@8 57685->57716 57688 c80eb9 57686->57688 57689 c80ebe 57686->57689 57717 c6d051 RaiseException __CxxThrowException@8 57688->57717 57706 c80e0c 57689->57706 57693 c80ee6 57703 c80ef8 57693->57703 57719 d68ba1 57693->57719 57696 c6945b 101 API calls 57696->57703 57697 c8101f 57700 d683fc __getdrive 5 API calls 57697->57700 57702 c8102c 57700->57702 57702->57666 57703->57696 57703->57697 57704 c55150 LocalAlloc RaiseException 57703->57704 57705 d68ba1 66 API calls __wcsdup 57703->57705 57727 c6933e RaiseException __CxxThrowException@8 57703->57727 57728 d69b26 66 API calls 2 library calls 57703->57728 57729 d6c8d2 57703->57729 57704->57703 57705->57703 57707 c80e1c PathFindFileNameW 57706->57707 57708 c80e17 57706->57708 57710 c80e2b lstrlenW 57707->57710 57711 c80e35 57707->57711 57709 c69376 ctype 2 API calls 57708->57709 57709->57707 57712 c80e49 57710->57712 57738 d69b89 57711->57738 57712->57693 57718 c6d051 RaiseException __CxxThrowException@8 57712->57718 57715 c55150 2 API calls 57715->57712 57716->57686 57717->57689 57718->57693 57720 d68bb2 _wcslen 57719->57720 57721 d68bae 57719->57721 57748 d6ca7c 66 API calls 2 library calls 57720->57748 57721->57703 57723 d68bc7 57723->57721 57749 d69b26 66 API calls 2 library calls 57723->57749 57725 d68bda 57725->57721 57750 d70611 57725->57750 57728->57703 57730 d6c8e7 57729->57730 57732 d6c8e0 57729->57732 57731 d69d23 __chsize_nolock 66 API calls 57730->57731 57737 d6c8ec 57731->57737 57732->57730 57734 d6c91c 57732->57734 57735 d6c8f6 57734->57735 57736 d69d23 __chsize_nolock 66 API calls 57734->57736 57735->57703 57736->57737 57759 d70663 11 API calls __gmtime64_s 57737->57759 57742 d69b9b 57738->57742 57739 d69b9f 57740 c80e43 57739->57740 57741 d69d23 __chsize_nolock 66 API calls 57739->57741 57740->57715 57743 d69bbb 57741->57743 57742->57739 57742->57740 57745 d69be2 57742->57745 57747 d70663 11 API calls __gmtime64_s 57743->57747 57745->57740 57746 d69d23 __chsize_nolock 66 API calls 57745->57746 57746->57743 57747->57740 57748->57723 57749->57725 57753 d704e8 57750->57753 57754 d70507 _memset __call_reportfault 57753->57754 57755 d70525 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 57754->57755 57756 d705f3 __call_reportfault 57755->57756 57757 d683fc __getdrive 5 API calls 57756->57757 57758 d7060f GetCurrentProcess TerminateProcess 57757->57758 57758->57721 57759->57735 57760 c66900 57761 c66936 Sleep 57760->57761 57806 c66978 ctype 57760->57806 57762 c66965 Sleep 57761->57762 57763 c66953 Sleep 57761->57763 57762->57806 57763->57762 57763->57763 57764 c66b60 57765 c69376 ctype 2 API calls 57764->57765 57766 c66b65 57765->57766 57767 c64a60 70 API calls 57766->57767 57768 c66b8d 57767->57768 57769 c66da8 Sleep 57768->57769 57771 c54f30 69 API calls 57768->57771 57770 c66dc4 Sleep 57769->57770 57777 c66e09 57769->57777 57772 c62720 113 API calls 57770->57772 57773 c66bbb 57771->57773 57774 c66dd4 GetWindowRect 57772->57774 57775 c64850 122 API calls 57773->57775 57901 c6bfb3 57774->57901 57782 c66bd2 57775->57782 57778 c66a84 Sleep 57780 c62720 113 API calls 57778->57780 57779 c66acb Sleep 57781 c62720 113 API calls 57779->57781 57780->57806 57781->57806 57785 c66c2b 57782->57785 57788 c64850 122 API calls 57782->57788 57786 c66c62 Sleep Sleep 57785->57786 57787 c66c90 57785->57787 57789 c62720 113 API calls 57786->57789 57790 c66cb0 57787->57790 57791 c66c9f Sleep 57787->57791 57792 c66c1e 57788->57792 57793 c66c84 57789->57793 57795 c66d2b 57790->57795 57800 c64a60 70 API calls 57790->57800 57794 c62720 113 API calls 57791->57794 57797 c55820 ctype 69 API calls 57792->57797 57793->57787 57794->57790 57798 c66d5b 57795->57798 57799 c66d39 Sleep Sleep 57795->57799 57796 c66b07 Sleep 57868 c62720 57796->57868 57797->57785 57803 c66d80 57798->57803 57804 c66d6a Sleep 57798->57804 57802 c62720 113 API calls 57799->57802 57805 c66ccd 57800->57805 57802->57798 57803->57769 57808 c62720 113 API calls 57804->57808 57809 c55820 ctype 69 API calls 57805->57809 57806->57764 57806->57766 57806->57778 57806->57779 57806->57796 57807 c66b39 Sleep 57806->57807 57819 c53ee0 57806->57819 57837 c5c5d0 57806->57837 57898 d68a00 67 API calls __fassign 57806->57898 57807->57806 57811 c66d7b 57808->57811 57812 c66cda 57809->57812 57811->57803 57899 c652a0 136 API calls 57812->57899 57814 c66d14 57814->57795 57815 c66d22 57814->57815 57900 c64b90 106 API calls ctype 57815->57900 57820 c53f15 ctype 57819->57820 57821 c556f0 ctype 69 API calls 57820->57821 57824 c53fd1 57821->57824 57822 c53ff9 57823 c55420 ctype 104 API calls 57822->57823 57833 c54006 57823->57833 57824->57822 57825 c556f0 ctype 69 API calls 57824->57825 57825->57822 57826 c54659 57828 c69376 ctype 2 API calls 57826->57828 57827 c54593 Sleep 57827->57806 57829 c54668 57828->57829 57830 c54f30 69 API calls 57830->57833 57831 c54af0 69 API calls 57831->57833 57832 c54c30 69 API calls 57832->57833 57833->57826 57833->57827 57833->57830 57833->57831 57833->57832 57834 c64c50 142 API calls 57833->57834 57835 c556f0 69 API calls ctype 57833->57835 57836 c557b0 66 API calls ctype 57833->57836 57834->57833 57835->57833 57836->57833 57838 c5c60e 57837->57838 57848 c5c658 57837->57848 57840 c51d90 122 API calls 57838->57840 57842 c5c61d 57840->57842 57844 c51d90 122 API calls 57842->57844 57843 c5c70a 57849 c55820 ctype 69 API calls 57843->57849 57845 c5c633 57844->57845 57906 c534b0 57845->57906 57847 c51d90 122 API calls 57850 c5c6d6 57847->57850 57985 c5c930 57848->57985 57852 c5c772 57849->57852 57851 c51d90 122 API calls 57850->57851 57853 c5c6ec 57851->57853 57855 c54af0 69 API calls 57852->57855 57854 c534b0 147 API calls 57853->57854 57854->57843 57856 c5c7b9 57855->57856 57857 c55820 ctype 69 API calls 57856->57857 57858 c5c7c8 57857->57858 57859 c54af0 69 API calls 57858->57859 57860 c5c831 57859->57860 57861 c55820 ctype 69 API calls 57860->57861 57862 c5c840 57861->57862 57990 c532d0 57862->57990 57865 c55420 ctype 104 API calls 57866 c5c8a5 RegCreateKeyExW RegSetValueExW RegCloseKey 57865->57866 57867 c5c90b Sleep 57866->57867 57867->57806 57869 c62767 57868->57869 57870 c62aa6 57868->57870 57871 c628c0 57869->57871 57873 c55420 ctype 104 API calls 57869->57873 57872 d683fc __getdrive 5 API calls 57870->57872 57875 c55420 ctype 104 API calls 57871->57875 57874 c62ada 57872->57874 57876 c62788 57873->57876 57874->57806 57888 c62907 _wcslwr_s_l_stat 57875->57888 58012 c6ea6e 57876->58012 57879 c62a53 SendMessageW 57881 c62a80 57879->57881 57879->57888 58017 c779e6 SendMessageW 57881->58017 57883 c62a97 58020 c718f8 57883->58020 57884 c69376 ctype 2 API calls 57884->57888 57886 c62810 _wcslwr_s_l_stat 57887 c55620 ctype 69 API calls 57886->57887 57886->57888 57891 c62887 SendMessageW 57886->57891 57887->57886 57888->57879 57888->57884 57889 c556f0 69 API calls ctype 57888->57889 57890 c62dc0 105 API calls 57888->57890 57892 c55620 ctype 69 API calls 57888->57892 57893 c62d43 SendMessageW 57888->57893 57894 c62da2 57888->57894 57896 d6840b 66 API calls _memcpy_s 57888->57896 58018 c779e6 SendMessageW 57888->58018 58019 d68a00 67 API calls __fassign 57888->58019 57889->57888 57890->57888 57891->57871 57891->57886 57892->57888 57893->57888 57896->57888 57898->57806 57899->57814 57900->57795 57902 c718f8 25 API calls 57901->57902 57903 c6bfbf 57902->57903 57904 c6bfcc 57903->57904 58065 c6bf89 57903->58065 57904->57777 57907 c534cb ctype __write_nolock 57906->57907 57908 c53535 lstrlenW 57907->57908 57984 c53960 57907->57984 57911 c53544 ctype 57908->57911 57908->57984 57909 d683fc __getdrive 5 API calls 57910 c53ed6 57909->57910 57910->57848 57912 c556f0 ctype 69 API calls 57911->57912 57913 c5363c 57912->57913 57914 c556f0 ctype 69 API calls 57913->57914 57915 c5366c 57914->57915 57917 c5373d 57915->57917 57919 c536a7 57915->57919 57916 c53882 57918 c538cd 57916->57918 57921 c538a1 57916->57921 57976 c536e9 57916->57976 57917->57916 57920 c53805 57917->57920 57924 c53769 57917->57924 57922 c556f0 ctype 69 API calls 57918->57922 57923 c54f30 69 API calls 57919->57923 57920->57916 57943 c53825 57920->57943 58006 c557b0 66 API calls _memcpy_s 57921->58006 57922->57976 57930 c536bf 57923->57930 57931 c54f30 69 API calls 57924->57931 57926 c53905 PathFileExistsW 57928 c53914 57926->57928 57929 c53a52 57926->57929 57927 c53a96 58003 c54c10 57927->58003 57933 c55420 ctype 104 API calls 57928->57933 57937 c54c30 69 API calls 57929->57937 57934 c54c30 69 API calls 57930->57934 57935 c53781 57931->57935 57938 c53924 57933->57938 57939 c536d6 57934->57939 57940 c54c30 69 API calls 57935->57940 57936 c53af8 _memset 57946 c53b08 CreateProcessW 57936->57946 57941 c53a6a 57937->57941 57942 c54af0 69 API calls 57938->57942 57944 c55820 ctype 69 API calls 57939->57944 57945 c53798 57940->57945 57947 c54af0 69 API calls 57941->57947 57948 c53943 57942->57948 57949 c54f30 69 API calls 57943->57949 57944->57976 57950 c55820 ctype 69 API calls 57945->57950 57951 c53b78 57946->57951 57980 c53bc3 57946->57980 57952 c53a83 57947->57952 58007 c652a0 136 API calls 57948->58007 57956 c5383d 57949->57956 57950->57976 57957 c55420 ctype 104 API calls 57951->57957 57958 c55820 ctype 69 API calls 57952->57958 57953 c53c95 WaitForSingleObject 57960 c53cad 57953->57960 57961 c53d4a lstrlenW 57953->57961 57954 c53d89 GetExitCodeProcess 57959 c53da9 57954->57959 57962 c54c30 69 API calls 57956->57962 57963 c53b88 57957->57963 57958->57927 57964 c53dc6 FindCloseChangeNotification 57959->57964 57965 c53dc9 57959->57965 57966 c55420 ctype 104 API calls 57960->57966 57961->57954 57967 c53d5b Sleep 57961->57967 57968 c53853 57962->57968 57969 c54af0 69 API calls 57963->57969 57964->57965 57970 c53dd4 CloseHandle 57965->57970 57965->57984 57971 c53cbd 57966->57971 58010 c54670 105 API calls 3 library calls 57967->58010 57972 c55820 ctype 69 API calls 57968->57972 57973 c53ba7 57969->57973 57970->57984 57975 c54af0 69 API calls 57971->57975 57972->57976 58008 c652a0 136 API calls 57973->58008 57979 c53cdb 57975->57979 57976->57926 57976->57927 57978 c53d74 57978->57954 57981 c53d78 Sleep 57978->57981 58009 c652a0 136 API calls 57979->58009 57980->57953 57980->57954 58011 c54670 105 API calls 3 library calls 57981->58011 57984->57909 57986 c55420 ctype 104 API calls 57985->57986 57987 c5c944 RegOpenKeyExW 57986->57987 57988 c5c967 RegCloseKey 57987->57988 57989 c5c6b2 57987->57989 57988->57989 57989->57843 57989->57847 57991 c55010 66 API calls 57990->57991 57992 c53306 57991->57992 57993 c55010 66 API calls 57992->57993 57994 c53319 57993->57994 57996 c54c30 69 API calls 57994->57996 58002 c53355 57994->58002 57995 c534b0 147 API calls 57997 c533bb 57995->57997 57998 c53335 57996->57998 57997->57865 57997->57867 57999 c54af0 69 API calls 57998->57999 58000 c53345 57999->58000 58001 c55820 ctype 69 API calls 58000->58001 58001->58002 58002->57995 58004 d686e6 _vswprintf_s 97 API calls 58003->58004 58005 c54c26 58004->58005 58005->57936 58006->57976 58007->57984 58008->57980 58009->57984 58010->57978 58011->57978 58013 c6ea8f 58012->58013 58014 c6ea79 GetDlgItem 58012->58014 58024 c720d2 58014->58024 58017->57883 58018->57888 58019->57888 58021 c71904 __EH_prolog3_catch 58020->58021 58022 c6b7ef ctype 25 API calls 58021->58022 58023 c71919 ~_Task_impl 58022->58023 58023->57870 58025 c7205e ~_Task_impl 97 API calls 58024->58025 58026 c720e0 58025->58026 58031 c829bb 58026->58031 58028 c720ec 58043 c6ef1c 58028->58043 58032 c829c7 __EH_prolog3_catch 58031->58032 58042 c829d0 ~_Task_impl 58032->58042 58048 c81466 LocalAlloc RaiseException ctype ~_Task_impl 58032->58048 58034 c829e3 58034->58042 58049 c81466 LocalAlloc RaiseException ctype ~_Task_impl 58034->58049 58036 c829f0 ~_Task_impl 58036->58042 58050 cccd97 58036->58050 58039 c82a2a 58055 c814d9 68 API calls 2 library calls 58039->58055 58042->58028 58044 c627af GetWindowRect 58043->58044 58045 c6ef28 58043->58045 58044->57886 58045->58044 58046 c6ef2e GetParent 58045->58046 58064 c81466 LocalAlloc RaiseException ctype ~_Task_impl 58046->58064 58048->58034 58049->58036 58051 c82a1f 58050->58051 58052 cccda2 58050->58052 58051->58039 58054 c6933e RaiseException __CxxThrowException@8 58051->58054 58056 c967e2 58052->58056 58055->58042 58057 c9680f 58056->58057 58058 c967ee 58056->58058 58060 c69376 ctype 2 API calls 58057->58060 58058->58057 58059 c967f4 58058->58059 58061 c6855b ~_Task_impl 66 API calls 58059->58061 58062 c96814 58060->58062 58063 c96801 58061->58063 58063->58051 58064->58044 58066 c6bf97 58065->58066 58067 c6bfa2 KiUserCallbackDispatcher 58065->58067 58069 c71cc2 58066->58069 58067->57904 58070 c71cd4 PostMessageW 58069->58070 58071 c71ce8 58069->58071 58070->58071 58071->58067 58072 c7340f 58073 c73422 58072->58073 58077 c7341d 58072->58077 58080 c720fe 58073->58080 58076 c73447 DefWindowProcW 58076->58077 58078 c73435 58083 c7330a 58078->58083 58081 c7205e ~_Task_impl 97 API calls 58080->58081 58082 c7210a 58081->58082 58082->58076 58082->58078 58084 c73316 __EH_prolog3_catch_GS 58083->58084 58085 c7e4ec ctype 25 API calls 58084->58085 58086 c7332b 58085->58086 58087 c73342 58086->58087 58088 c69376 ctype 2 API calls 58086->58088 58089 c733a5 58087->58089 58118 c712a3 GetWindowLongW GetWindowRect 58087->58118 58088->58087 58097 c6ff07 58089->58097 58092 c733ce 58094 d69b17 ctype 5 API calls 58092->58094 58095 c7340c 58094->58095 58095->58077 58102 c7202c 27 API calls 58097->58102 58119 c74833 58097->58119 58098 c6ff42 58098->58092 58103 c73269 58098->58103 58099 c6ff2b 58099->58098 58100 c6fd72 2 API calls 58099->58100 58100->58098 58102->58099 58104 c732fa 58103->58104 58105 c73288 58103->58105 58107 d683fc __getdrive 5 API calls 58104->58107 58258 c6eaf8 58105->58258 58109 c73306 58107->58109 58108 c7328f 58108->58104 58110 c73296 GetWindowRect 58108->58110 58109->58092 58110->58104 58111 c732bc 58110->58111 58111->58104 58112 c732c4 GetWindow 58111->58112 58113 c720d2 ctype 98 API calls 58112->58113 58115 c732d5 58113->58115 58114 c732e0 58114->58104 58261 c71986 58114->58261 58115->58114 58116 c6ec76 ctype IsWindowEnabled 58115->58116 58116->58114 58118->58089 58120 c74842 __EH_prolog3 58119->58120 58121 c74880 58120->58121 58122 c7485e 58120->58122 58123 c7486c 58121->58123 58125 c748c7 58121->58125 58126 c748b7 58121->58126 58180 c6b16c 58122->58180 58124 c748aa 58123->58124 58148 c74874 58123->58148 58204 c71225 LocalAlloc LeaveCriticalSection RaiseException ctype 58124->58204 58127 c748cc 58125->58127 58137 c748e0 58125->58137 58129 c720d2 ctype 98 API calls 58126->58129 58197 c7428c 106 API calls ctype 58127->58197 58132 c748bd 58129->58132 58131 c74ac1 ~_Task_impl 58131->58099 58196 c74214 105 API calls 58132->58196 58133 c748dc 58133->58137 58133->58148 58134 c74964 58200 c739f1 EnterCriticalSection LeaveCriticalSection LocalAlloc RaiseException 58134->58200 58135 c74939 58140 c74954 58135->58140 58141 c7493e 58135->58141 58137->58134 58137->58135 58137->58148 58199 c73a2e 114 API calls 58140->58199 58143 c7494a 58141->58143 58198 c739f1 EnterCriticalSection LeaveCriticalSection LocalAlloc RaiseException 58141->58198 58142 c74e68 58143->58148 58185 c711f1 58143->58185 58146 c7495b 58146->58143 58214 c71225 LocalAlloc LeaveCriticalSection RaiseException ctype 58148->58214 58149 c7496b 58149->58143 58151 c74991 RedrawWindow 58149->58151 58151->58143 58152 c74aa6 58203 c71225 LocalAlloc LeaveCriticalSection RaiseException ctype 58152->58203 58155 c749ed 58155->58124 58155->58148 58155->58152 58157 c74b07 58155->58157 58158 c74b23 58155->58158 58159 c74b31 ctype 58155->58159 58160 c74ae3 58155->58160 58161 c74bde 58155->58161 58162 c74adb 58155->58162 58163 c74ba7 ctype 58155->58163 58168 c74e34 58155->58168 58202 c71225 LocalAlloc LeaveCriticalSection RaiseException ctype 58155->58202 58165 c720d2 ctype 98 API calls 58157->58165 58167 c720d2 ctype 98 API calls 58158->58167 58170 c71241 31 API calls 58159->58170 58191 c6b0c2 58160->58191 58166 c720d2 ctype 98 API calls 58161->58166 58205 c6d807 97 API calls ctype 58162->58205 58208 c6d89c 58163->58208 58165->58148 58166->58148 58167->58148 58213 c71225 LocalAlloc LeaveCriticalSection RaiseException ctype 58168->58213 58171 c74b4e 58170->58171 58172 c720fe 97 API calls 58171->58172 58174 c74b60 58172->58174 58175 c74b76 58174->58175 58206 c81466 LocalAlloc RaiseException ctype ~_Task_impl 58174->58206 58207 c7345c 98 API calls 3 library calls 58175->58207 58215 c6e923 58180->58215 58183 c6b189 58183->58123 58186 c71203 58185->58186 58187 c7121b 58186->58187 58188 c69376 ctype 2 API calls 58186->58188 58235 c80d75 58187->58235 58188->58186 58190 c71221 58190->58155 58201 c71225 LocalAlloc LeaveCriticalSection RaiseException ctype 58190->58201 58246 c6e328 58191->58246 58194 c6b0ed 58194->58148 58195 c6fd72 2 API calls 58195->58194 58196->58125 58197->58133 58198->58143 58199->58146 58200->58149 58201->58155 58202->58155 58203->58124 58204->58131 58206->58175 58207->58163 58209 c6d8b4 58208->58209 58210 c6d8a8 58208->58210 58209->58148 58253 c6d853 58210->58253 58212 c6d8ad DeleteDC 58212->58209 58213->58148 58214->58142 58216 c6b185 58215->58216 58217 c6e935 58215->58217 58216->58183 58224 c73e72 58216->58224 58232 c84ae1 68 API calls 58217->58232 58219 c6e93f 58220 c6e971 58219->58220 58221 c6e948 IsWindow 58219->58221 58220->58216 58233 c95f11 LocalAlloc RaiseException 58220->58233 58221->58220 58222 c6e955 SendMessageW 58221->58222 58222->58216 58225 c73ec3 58224->58225 58226 c73e92 58224->58226 58227 c7e4ec ctype 25 API calls 58225->58227 58226->58183 58228 c73ed2 58227->58228 58229 c73edb 58228->58229 58230 c69376 ctype 2 API calls 58228->58230 58229->58226 58234 c73737 99 API calls 2 library calls 58229->58234 58230->58229 58232->58219 58233->58216 58234->58226 58236 c80d8a 58235->58236 58237 c80d85 58235->58237 58239 c80d98 58236->58239 58245 c80d0c InitializeCriticalSection 58236->58245 58238 c69376 ctype 2 API calls 58237->58238 58238->58236 58241 c80daa EnterCriticalSection 58239->58241 58242 c80dd4 EnterCriticalSection 58239->58242 58243 c80dc9 LeaveCriticalSection 58241->58243 58244 c80db6 InitializeCriticalSection 58241->58244 58242->58190 58243->58242 58244->58243 58245->58239 58247 c6e33a 58246->58247 58250 c6ec76 58247->58250 58249 c6b0d9 58249->58195 58251 c6ec86 58250->58251 58252 c6ec7c IsWindowEnabled 58250->58252 58252->58249 58254 c6d860 58253->58254 58256 c6d867 moneypunct 58253->58256 58257 c6d793 97 API calls 3 library calls 58254->58257 58256->58212 58257->58256 58259 c6eafe GetWindowLongW 58258->58259 58260 c6eb0a 58258->58260 58259->58108 58262 c6eaf8 GetWindowLongW 58261->58262 58263 c719a8 58262->58263 58264 c719b1 58263->58264 58265 c719bd GetParent 58263->58265 58266 c719c8 GetWindow 58263->58266 58267 c719ed GetWindowRect 58264->58267 58268 c719d3 58265->58268 58266->58268 58269 c71abe GetParent GetClientRect GetClientRect MapWindowPoints 58267->58269 58270 c71a2b 58267->58270 58268->58267 58271 c719d9 SendMessageW 58268->58271 58278 c71aeb 58269->58278 58272 c71a2f GetWindowLongW 58270->58272 58273 c71a3f 58270->58273 58271->58267 58274 c719eb 58271->58274 58272->58273 58275 c71a53 58273->58275 58276 c71a8f GetWindowRect MonitorFromWindow GetMonitorInfoW CopyRect 58273->58276 58274->58267 58277 c68390 ctype 31 API calls 58275->58277 58276->58278 58279 c71a58 MonitorFromWindow GetMonitorInfoW CopyRect CopyRect 58277->58279 58285 c6ee73 58278->58285 58279->58278 58282 c71b6d 58283 d683fc __getdrive 5 API calls 58282->58283 58284 c71b7a 58283->58284 58284->58104 58286 c6eea5 58285->58286 58287 c6ee7e SetWindowPos 58285->58287 58287->58282 58289 c7512d 58290 c7513d 58289->58290 58293 c74157 58290->58293 58294 c68390 ctype 31 API calls 58293->58294 58295 c74161 58294->58295 58296 c7416f 58295->58296 58307 c7dd9a 8 API calls 58295->58307 58298 c6eaf8 GetWindowLongW 58296->58298 58299 c74176 58298->58299 58300 c74197 58299->58300 58301 c7417d 58299->58301 58303 c7202c 27 API calls 58300->58303 58308 c71fee 27 API calls ctype 58301->58308 58305 c7419e 58303->58305 58304 c74182 58309 c736b8 159 API calls 58304->58309 58307->58296 58308->58304 58309->58300 58310 c75cea 58311 c75cfa 58310->58311 58312 c75d28 58310->58312 58313 c6bdd2 ctype 31 API calls 58311->58313 58314 c75cff 58312->58314 58318 c75da9 58312->58318 58313->58314 58315 c75d0a 58314->58315 58316 c69376 ctype 2 API calls 58314->58316 58320 c75d0f 58314->58320 58317 c6bdd2 ctype 31 API calls 58315->58317 58316->58315 58317->58320 58318->58320 58321 c75bb2 58318->58321 58322 c75bbe 58321->58322 58323 c69376 ctype 2 API calls 58322->58323 58324 c75bf4 58322->58324 58325 c75bce 58322->58325 58323->58322 58327 c5f1b0 GetCurrentProcess OpenProcessToken LookupPrivilegeValueW AdjustTokenPrivileges 58324->58327 58325->58320 58328 c5f216 58327->58328 58329 c5f20c ExitWindowsEx 58327->58329 58330 d683fc __getdrive 5 API calls 58328->58330 58329->58328 58331 c5f220 58330->58331 58331->58325 58332 c6b0a8 58335 c6e98c 58332->58335 58336 c6e9a5 58335->58336 58337 c6e9ac 58336->58337 58338 c6e9dd SendMessageW 58336->58338 58339 c6b0be 58337->58339 58340 c6e9c1 SendMessageW 58337->58340 58338->58339 58340->58339 58341 c6be55 58342 c6be63 58341->58342 58343 c6be86 58341->58343 58344 c720fe 97 API calls 58342->58344 58345 c6be6b 58344->58345 58354 c6a1d1 58345->58354 58355 c6a1e7 58354->58355 58356 c6a1dc 58354->58356 58355->58343 58358 c5f550 58355->58358 58401 c5eeb0 58355->58401 58450 c7c5c5 58355->58450 58458 c67330 58355->58458 58506 c62010 58355->58506 58529 c625b0 58355->58529 58548 c6a188 LocalAlloc RaiseException ctype 58356->58548 58363 c5f587 ctype 58358->58363 58359 c69376 ctype 2 API calls 58364 c5f675 ctype 58359->58364 58362 c5e390 105 API calls 58362->58364 58363->58364 58549 c5c500 58363->58549 58364->58359 58364->58362 58365 c5f937 ctype 58364->58365 58368 c64850 122 API calls 58364->58368 58369 c54af0 69 API calls 58364->58369 58371 c54c30 69 API calls 58364->58371 58380 c556f0 ctype 69 API calls 58364->58380 58556 c5e230 58364->58556 58576 c5e4d0 58364->58576 58616 c557b0 66 API calls _memcpy_s 58364->58616 58366 c5fbfb SendMessageW 58365->58366 58370 c556f0 ctype 69 API calls 58365->58370 58367 c5fc2d 58366->58367 58367->58343 58368->58364 58369->58364 58372 c5f9bc 58370->58372 58371->58364 58373 c54af0 69 API calls 58372->58373 58374 c5f9cd 58373->58374 58375 c55820 ctype 69 API calls 58374->58375 58376 c5f9dd 58375->58376 58377 c54c30 69 API calls 58376->58377 58378 c5fa12 58377->58378 58379 c55820 ctype 69 API calls 58378->58379 58383 c5fa22 ctype 58379->58383 58380->58364 58382 c5fb34 58384 c54af0 69 API calls 58382->58384 58383->58382 58589 c77320 58383->58589 58386 c5fb45 58384->58386 58619 c6eb84 58386->58619 58390 c5fb5d 58625 c76fc6 72 API calls 2 library calls 58390->58625 58391 c5faf8 58391->58382 58611 c76b8b 58391->58611 58394 c5fbd8 58394->58366 58396 c5fbf1 58394->58396 58396->58366 58398 c5fb23 moneypunct 58618 c76e31 72 API calls ctype 58398->58618 58402 c5e230 459 API calls 58401->58402 58403 c5eee4 58402->58403 58404 c718f8 25 API calls 58403->58404 58405 c5eeed 58404->58405 58406 c6ec4f ShowWindow 58405->58406 58407 c5eefa 58406->58407 58408 c6ec4f ShowWindow 58407->58408 58409 c5ef08 CreateFontW 58408->58409 58802 c6daef 58409->58802 58412 c5ef5e ctype 58413 c5e4d0 71 API calls 58412->58413 58414 c5ef93 58413->58414 58808 c5e390 58414->58808 58417 c64a60 70 API calls 58418 c5efb6 58417->58418 58419 c55820 ctype 69 API calls 58418->58419 58420 c5efc5 58419->58420 58821 c655e0 58420->58821 58423 c5f138 58425 c6ec4f ShowWindow 58423->58425 58424 c5f003 58426 c65700 158 API calls 58424->58426 58449 c5f0c7 58425->58449 58427 c5f008 58426->58427 58429 c6ec4f ShowWindow 58427->58429 58428 c6eb84 4 API calls 58430 c5f154 58428->58430 58431 c5f015 58429->58431 58432 c718f8 25 API calls 58430->58432 58433 c64a60 70 API calls 58431->58433 58434 c5f15d 58432->58434 58435 c5f02b 58433->58435 58832 c5eb60 58434->58832 58436 c6eb84 4 API calls 58435->58436 58438 c5f03e 58436->58438 58449->58428 58451 c7c5d3 58450->58451 58452 c7c5d9 58450->58452 58850 d6d30f 58451->58850 58454 c7c601 58452->58454 58863 d69d36 66 API calls __getptd_noexit 58452->58863 58454->58343 58456 c7c5f7 58864 c77883 70 API calls 4 library calls 58456->58864 58459 c67372 58458->58459 58460 c5e230 459 API calls 58459->58460 58461 c67383 58460->58461 58462 c5e4d0 71 API calls 58461->58462 58463 c67394 58462->58463 58464 c5e390 105 API calls 58463->58464 58465 c673a1 58464->58465 58466 c5e390 105 API calls 58465->58466 58467 c673ae ctype 58466->58467 58468 c6765d 58467->58468 58470 c67447 ctype 58467->58470 58471 c64850 122 API calls 58467->58471 58473 c54af0 69 API calls 58467->58473 58476 c54c30 69 API calls 58467->58476 58481 c556f0 ctype 69 API calls 58467->58481 59020 c557b0 66 API calls _memcpy_s 58467->59020 58469 c69376 ctype 2 API calls 58468->58469 58469->58470 58472 c556f0 ctype 69 API calls 58470->58472 58493 c67969 58470->58493 58471->58467 58474 c676cc 58472->58474 58473->58467 58475 c54af0 69 API calls 58474->58475 58477 c676e0 58475->58477 58476->58467 58478 c55820 ctype 69 API calls 58477->58478 58479 c676f2 58478->58479 58480 c54c30 69 API calls 58479->58480 58483 c6772b 58480->58483 58481->58467 58484 c55820 ctype 69 API calls 58483->58484 58485 c6773d ctype 58484->58485 58980 d69087 58485->58980 58488 c6793b 58489 c54af0 69 API calls 58488->58489 58491 c6794f 58489->58491 58492 c6eb84 4 API calls 58491->58492 58492->58493 58493->58343 58494 c677c0 ctype 58996 c7c724 58494->58996 58507 c5e230 459 API calls 58506->58507 58508 c62044 58507->58508 58509 c5e4d0 71 API calls 58508->58509 58510 c6204f 58509->58510 58511 c5e390 105 API calls 58510->58511 58512 c6205f 58511->58512 58513 c5e390 105 API calls 58512->58513 58514 c6206f 58513->58514 58515 c5e390 105 API calls 58514->58515 58518 c6207c ctype 58515->58518 58516 c6210c 58519 c6eb84 4 API calls 58516->58519 58517 c62279 58520 c69376 ctype 2 API calls 58517->58520 58518->58516 58526 c62152 58518->58526 58521 c62118 58519->58521 58522 c62283 GetWindowRect 58520->58522 58521->58343 58524 c54af0 69 API calls 58524->58526 58525 c54c30 69 API calls 58525->58526 58526->58517 58526->58524 58526->58525 58527 c556f0 ctype 69 API calls 58526->58527 59530 d68a00 67 API calls __fassign 58526->59530 59531 c557b0 66 API calls _memcpy_s 58526->59531 58527->58526 58530 c5e230 459 API calls 58529->58530 58531 c625ef 58530->58531 58532 c5e4d0 71 API calls 58531->58532 58533 c625fa 58532->58533 58534 c5e390 105 API calls 58533->58534 58535 c62607 58534->58535 58536 c64a60 70 API calls 58535->58536 58537 c6261c 58536->58537 58538 c6eb84 4 API calls 58537->58538 58539 c62632 58538->58539 58540 c62720 113 API calls 58539->58540 58541 c62661 SendMessageW SendMessageW 58540->58541 58542 c64850 122 API calls 58541->58542 58543 c626a0 58542->58543 58544 d689de _swscanf 66 API calls 58543->58544 58545 c626bc 58544->58545 58546 c626fb 58545->58546 59532 c6ec91 EnableWindow 58545->59532 58546->58343 58548->58355 58550 c5c513 58549->58550 58551 c5c521 58549->58551 58550->58551 58626 c5c9a0 RegOpenKeyExW 58550->58626 58553 c5c53a 58551->58553 58635 c51940 69 API calls ctype 58551->58635 58553->58363 58555 c5c588 58555->58363 58636 c6c32e 58556->58636 58558 c5e24a SendMessageW SendMessageW 58559 c5e364 58558->58559 58560 c5e28f 58558->58560 58561 c6bfb3 27 API calls 58559->58561 58654 c5e650 58560->58654 58563 c5e36b 58561->58563 58566 d683fc __getdrive 5 API calls 58563->58566 58565 c5e29f 58667 c5e8a0 GetWindowLongW 58565->58667 58568 c5e383 58566->58568 58568->58364 58569 c5e2a7 58570 c5e2bc 58569->58570 58571 c5e2ac EnumChildWindows 58569->58571 58572 c5e2c4 GetWindowRect SetRect 58570->58572 58573 c5e319 GetWindowThreadProcessId GetForegroundWindow GetWindowThreadProcessId 58570->58573 58571->58570 58574 c6ee73 SetWindowPos 58572->58574 58573->58563 58575 c5e347 AttachThreadInput KiUserCallbackDispatcher SetFocus 58573->58575 58574->58573 58575->58563 58577 c64a60 70 API calls 58576->58577 58578 c5e509 58577->58578 58579 c64a60 70 API calls 58578->58579 58580 c5e523 58579->58580 58581 c5e5de SetWindowTextW 58580->58581 58582 c54c30 69 API calls 58580->58582 58583 c5e608 58581->58583 58584 c5e576 58582->58584 58583->58364 58585 c54af0 69 API calls 58584->58585 58586 c5e588 58585->58586 58587 c55820 ctype 69 API calls 58586->58587 58588 c5e598 58587->58588 58588->58581 58590 c77363 ctype 58589->58590 58591 c774e6 58590->58591 58595 c7738a 58590->58595 58592 c774d9 58591->58592 58593 c55390 69 API calls 58591->58593 58594 d683fc __getdrive 5 API calls 58592->58594 58593->58592 58596 c5faec 58594->58596 58736 c7711d 58595->58736 58596->58382 58606 c76d82 GetFileSize 58596->58606 58600 c773b9 58601 c774b6 58600->58601 58602 c774bd CreateFileW 58600->58602 58780 c6aac7 58601->58780 58604 c774bb 58602->58604 58604->58592 58787 c770ee 70 API calls ctype 58604->58787 58607 c76da1 GetLastError 58606->58607 58608 c76db9 58606->58608 58607->58608 58609 c76dae GetLastError 58607->58609 58608->58391 58800 c778c9 70 API calls ctype 58609->58800 58612 c76b9d ReadFile 58611->58612 58613 c5fb16 58611->58613 58612->58613 58614 c76bb6 GetLastError 58612->58614 58617 c5ea70 71 API calls ctype 58613->58617 58801 c778c9 70 API calls ctype 58614->58801 58616->58364 58617->58398 58618->58382 58620 c6eb95 IsWindow 58619->58620 58621 c6eb90 58619->58621 58620->58621 58623 c6eba7 SetWindowTextW 58620->58623 58622 c69376 ctype 2 API calls 58621->58622 58621->58623 58622->58620 58623->58390 58625->58394 58627 c5c9d5 58626->58627 58628 c5c9ca RegCloseKey 58626->58628 58629 c5c9ed 58627->58629 58630 c5c9df 58627->58630 58628->58627 58632 c556f0 ctype 69 API calls 58629->58632 58631 c556f0 ctype 69 API calls 58630->58631 58633 c5c9e9 58631->58633 58634 c5c9f7 58632->58634 58633->58551 58634->58551 58635->58555 58637 c6c345 58636->58637 58638 c6c33d 58636->58638 58671 c75b2c 58637->58671 58682 c7562c 58638->58682 58641 c6c343 58642 c6c353 58641->58642 58644 c718f8 25 API calls 58641->58644 58643 c6bf89 2 API calls 58642->58643 58645 c6c35a 58643->58645 58646 c6c365 58644->58646 58645->58558 58646->58642 58647 c6c36b 58646->58647 58648 c6ea6e 99 API calls 58647->58648 58649 c6c375 58648->58649 58650 c6c38f 58649->58650 58697 c6c2d6 31 API calls ctype 58649->58697 58650->58558 58652 c6c380 58698 c6ec4f 58652->58698 58655 c64850 122 API calls 58654->58655 58656 c5e68a 58655->58656 58721 d689de 58656->58721 58660 c5e6fe 58666 c5e297 58660->58666 58725 c5e8f0 106 API calls ctype 58660->58725 58662 c5e711 58662->58666 58726 c5e8f0 106 API calls ctype 58662->58726 58664 c5e724 58664->58666 58727 c5e8f0 106 API calls ctype 58664->58727 58666->58559 58666->58565 58668 c5e8b9 58667->58668 58669 c5e8e2 58668->58669 58670 c5e8be SetWindowLongW SetWindowPos 58668->58670 58669->58569 58670->58569 58672 c75b73 58671->58672 58673 c75b41 58671->58673 58674 c7562c 418 API calls 58672->58674 58675 c6bdd2 ctype 31 API calls 58673->58675 58678 c75b7c 58674->58678 58676 c75b46 FindResourceW 58675->58676 58676->58672 58677 c75b5c LoadResource 58676->58677 58679 c75b8d 58677->58679 58680 c75b6a LockResource 58677->58680 58678->58679 58681 c75b86 FreeResource 58678->58681 58679->58641 58680->58672 58681->58679 58683 c75638 __EH_prolog3 58682->58683 58684 c6855b ~_Task_impl 66 API calls 58683->58684 58694 c7566d ctype 58683->58694 58692 c75648 58684->58692 58685 c757a1 58717 c736b8 159 API calls 58685->58717 58687 c7579c 58687->58685 58688 c757b2 ~_Task_impl 58687->58688 58688->58641 58689 c55420 ctype 104 API calls 58691 c756f2 SendDlgItemMessageW 58689->58691 58690 c75771 SendDlgItemMessageA 58690->58694 58691->58694 58701 c82861 58692->58701 58694->58685 58694->58687 58694->58689 58694->58690 58695 c75731 SendDlgItemMessageW 58694->58695 58716 c82100 68 API calls 3 library calls 58694->58716 58695->58694 58697->58652 58699 c6ec6a 58698->58699 58700 c6ec5a ShowWindow 58698->58700 58700->58650 58702 c82887 58701->58702 58714 c82914 58701->58714 58703 c82891 GetWindow 58702->58703 58702->58714 58704 c720d2 ctype 98 API calls 58703->58704 58713 c828a6 58704->58713 58705 d683fc __getdrive 5 API calls 58706 c82928 58705->58706 58706->58694 58707 c828ad GetClassNameW 58718 c825d7 355 API calls 3 library calls 58707->58718 58709 c82900 GetWindow 58711 c720d2 ctype 98 API calls 58709->58711 58711->58713 58712 c828d5 58712->58709 58719 cbbdeb 68 API calls ctype 58712->58719 58720 c7393d 99 API calls 58712->58720 58713->58707 58713->58714 58714->58705 58716->58694 58717->58688 58718->58712 58719->58712 58720->58709 58728 d6896a 58721->58728 58723 c5e6a4 58723->58666 58724 c5e8f0 106 API calls ctype 58723->58724 58724->58660 58725->58662 58726->58664 58727->58666 58729 d68986 58728->58729 58730 d69d23 __chsize_nolock 66 API calls 58729->58730 58734 d689a0 _wcslen 58729->58734 58731 d6898b 58730->58731 58735 d70663 11 API calls __gmtime64_s 58731->58735 58733 d68996 58733->58723 58734->58723 58735->58733 58737 c7712c __EH_prolog3_GS 58736->58737 58738 c77156 GetFullPathNameW 58737->58738 58739 c69376 ctype 2 API calls 58737->58739 58740 c7716f 58738->58740 58741 c7719a 58738->58741 58739->58737 58742 d69b89 __NMSG_WRITE 66 API calls 58740->58742 58743 c7719e 58741->58743 58748 c771b9 ctype 58741->58748 58744 c7717e 58742->58744 58745 c77193 ctype 58743->58745 58747 c55390 69 API calls 58743->58747 58746 c55150 2 API calls 58744->58746 58750 d69b08 ctype 5 API calls 58745->58750 58749 c77184 58746->58749 58747->58745 58788 c76f7a 58748->58788 58797 c770ee 70 API calls ctype 58749->58797 58752 c772cb 58750->58752 58752->58592 58773 c55390 58752->58773 58755 c771ef GetVolumeInformationW 58756 c77212 58755->58756 58757 c77231 58755->58757 58798 c770ee 70 API calls ctype 58756->58798 58759 c77241 58757->58759 58760 c7723a CharUpperW 58757->58760 58759->58745 58761 c7724a FindFirstFileW 58759->58761 58760->58759 58761->58745 58762 c77262 FindClose 58761->58762 58762->58756 58763 c77272 58762->58763 58763->58756 58764 c7727a lstrlenW 58763->58764 58765 c77297 58764->58765 58766 c772ce 58764->58766 58766->58745 58774 c553a9 58773->58774 58775 c5539b 58773->58775 58778 c556f0 ctype 69 API calls 58774->58778 58776 c556f0 ctype 69 API calls 58775->58776 58777 c553a4 58776->58777 58777->58600 58779 c553c7 58778->58779 58779->58600 58781 c6aad6 GetModuleHandleW 58780->58781 58782 c6ab12 58780->58782 58783 c6aae5 GetProcAddress 58781->58783 58786 c6ab32 58781->58786 58784 c6ab17 CreateFileW 58782->58784 58782->58786 58785 c6aaf5 58783->58785 58783->58786 58784->58786 58785->58786 58786->58604 58787->58592 58789 c55680 69 API calls 58788->58789 58790 c76f8f _memset 58789->58790 58791 d69b89 __NMSG_WRITE 66 API calls 58790->58791 58792 c76fa6 58791->58792 58793 c55150 2 API calls 58792->58793 58794 c76fac PathStripToRootW 58793->58794 58795 c63140 98 API calls 58794->58795 58796 c76fc0 PathIsUNCW 58795->58796 58796->58745 58796->58755 58797->58745 58798->58745 58800->58608 58801->58613 58803 c6dafe 58802->58803 58807 c5ef43 SendMessageW 58802->58807 58837 c6da67 97 API calls 3 library calls 58803->58837 58805 c6db08 58838 c814d9 68 API calls 2 library calls 58805->58838 58807->58412 58809 c5e3bb ctype 58808->58809 58810 c5e40b 58809->58810 58811 c5e42e 58809->58811 58814 c5e405 58809->58814 58812 c6ea6e 99 API calls 58810->58812 58815 c556f0 ctype 69 API calls 58811->58815 58813 c5e44a 58812->58813 58816 c5e46c 58813->58816 58818 c64a60 70 API calls 58813->58818 58839 c557b0 66 API calls _memcpy_s 58814->58839 58815->58810 58816->58417 58819 c5e45e 58818->58819 58820 c6eb84 4 API calls 58819->58820 58820->58816 58822 c65615 58821->58822 58823 c65310 153 API calls 58822->58823 58830 c65621 58823->58830 58824 c69ee6 ctype 68 API calls 58826 c5efef 58824->58826 58825 c656ee 58827 c69376 ctype 2 API calls 58825->58827 58826->58423 58826->58424 58829 c656f3 58827->58829 58828 c64c50 142 API calls 58828->58830 58830->58825 58830->58828 58831 c656c1 58830->58831 58831->58824 58840 c6db49 58832->58840 58837->58805 58838->58807 58839->58810 58851 d6d31b _fgetws 58850->58851 58852 d6d342 58851->58852 58853 d6d32d 58851->58853 58860 d6d33d _fgetws 58852->58860 58865 d7449a 58852->58865 58854 d69d23 __chsize_nolock 66 API calls 58853->58854 58855 d6d332 58854->58855 58887 d70663 11 API calls __gmtime64_s 58855->58887 58860->58452 58863->58456 58864->58454 58866 d744ce EnterCriticalSection 58865->58866 58867 d744ac 58865->58867 58869 d6d35b 58866->58869 58867->58866 58868 d744b4 58867->58868 58870 d774d1 __lock 66 API calls 58868->58870 58871 d6d2a2 58869->58871 58870->58869 58872 d6d2c7 58871->58872 58873 d6d2b3 58871->58873 58879 d6d2c3 58872->58879 58889 d6dd0b 58872->58889 58874 d69d23 __chsize_nolock 66 API calls 58873->58874 58875 d6d2b8 58874->58875 58929 d70663 11 API calls __gmtime64_s 58875->58929 58888 d6d37b LeaveCriticalSection LeaveCriticalSection __wfsopen 58879->58888 58883 d6d2e1 58906 d77b7f 58883->58906 58885 d6d2e7 58885->58879 58886 d68b67 _free 66 API calls 58885->58886 58886->58879 58887->58860 58888->58860 58890 d6dd24 58889->58890 58894 d6d2d3 58889->58894 58891 d6d106 __fgetwc_nolock 66 API calls 58890->58891 58890->58894 58892 d6dd3f 58891->58892 58930 d78b40 97 API calls 6 library calls 58892->58930 58895 d77c43 58894->58895 58896 d77c53 58895->58896 58897 d6d2db 58895->58897 58896->58897 58898 d68b67 _free 66 API calls 58896->58898 58899 d6d106 58897->58899 58898->58897 58900 d6d127 58899->58900 58901 d6d112 58899->58901 58900->58883 58902 d69d23 __chsize_nolock 66 API calls 58901->58902 58903 d6d117 58902->58903 58931 d70663 11 API calls __gmtime64_s 58903->58931 58905 d6d122 58905->58883 58907 d77b8b _fgetws 58906->58907 58908 d77b93 58907->58908 58909 d77bae 58907->58909 58957 d69d36 66 API calls __getptd_noexit 58908->58957 58911 d77bba 58909->58911 58914 d77bf4 58909->58914 58958 d69d36 66 API calls __getptd_noexit 58911->58958 58912 d77b98 58915 d69d23 __chsize_nolock 66 API calls 58912->58915 58932 d6cd91 58914->58932 58926 d77ba0 _fgetws 58915->58926 58916 d77bbf 58918 d69d23 __chsize_nolock 66 API calls 58916->58918 58920 d77bc7 58918->58920 58919 d77bfa 58921 d77c14 58919->58921 58922 d77c08 58919->58922 58959 d70663 11 API calls __gmtime64_s 58920->58959 58925 d69d23 __chsize_nolock 66 API calls 58921->58925 58942 d77ae3 58922->58942 58927 d77c0e 58925->58927 58926->58885 58960 d77c3b LeaveCriticalSection __unlock_fhandle 58927->58960 58929->58879 58930->58894 58931->58905 58933 d6cd9d _fgetws 58932->58933 58934 d6cdf7 58933->58934 58935 d774d1 __lock 66 API calls 58933->58935 58936 d6cdfc EnterCriticalSection 58934->58936 58937 d6ce19 _fgetws 58934->58937 58938 d6cdc9 58935->58938 58936->58937 58937->58919 58939 d6cdd2 InitializeCriticalSectionAndSpinCount 58938->58939 58940 d6cde5 58938->58940 58939->58940 58961 d6ce27 LeaveCriticalSection _doexit 58940->58961 58962 d6cd28 58942->58962 58944 d77b49 58975 d6cca2 67 API calls __chsize_nolock 58944->58975 58945 d77af3 58945->58944 58946 d77b27 58945->58946 58949 d6cd28 __chsize_nolock 66 API calls 58945->58949 58946->58944 58950 d6cd28 __chsize_nolock 66 API calls 58946->58950 58948 d77b51 58951 d77b73 58948->58951 58976 d69d49 66 API calls 2 library calls 58948->58976 58952 d77b1e 58949->58952 58953 d77b33 FindCloseChangeNotification 58950->58953 58951->58927 58955 d6cd28 __chsize_nolock 66 API calls 58952->58955 58953->58944 58956 d77b3f GetLastError 58953->58956 58955->58946 58956->58944 58957->58912 58958->58916 58959->58926 58960->58926 58961->58934 58963 d6cd35 58962->58963 58964 d6cd4d 58962->58964 58977 d69d36 66 API calls __getptd_noexit 58963->58977 58969 d6cd8c 58964->58969 58978 d69d36 66 API calls __getptd_noexit 58964->58978 58967 d6cd3a 58970 d69d23 __chsize_nolock 66 API calls 58967->58970 58968 d6cd5e 58972 d69d23 __chsize_nolock 66 API calls 58968->58972 58969->58945 58971 d6cd42 58970->58971 58971->58945 58973 d6cd66 58972->58973 58979 d70663 11 API calls __gmtime64_s 58973->58979 58975->58948 58976->58951 58977->58967 58978->58968 58979->58971 58981 d690a7 58980->58981 58982 d69094 58980->58982 59023 d68fc9 58981->59023 58983 d69d23 __chsize_nolock 66 API calls 58982->58983 58986 d69099 58983->58986 58985 d690b7 58988 d69d23 __chsize_nolock 66 API calls 58985->58988 58989 c677a7 58985->58989 59042 d70663 11 API calls __gmtime64_s 58986->59042 58988->58989 58989->58488 58990 c7c300 58989->58990 58991 c7c30c __EH_prolog3 58990->58991 58992 c7c32b 58991->58992 58993 c69376 ctype 2 API calls 58991->58993 59403 c7c193 58992->59403 58993->58992 58995 c7c336 ~_Task_impl 58995->58494 58997 c55390 69 API calls 58996->58997 58998 c7c73d 58997->58998 58999 c55680 69 API calls 58998->58999 59000 c7c749 58999->59000 59020->58467 59026 d68fd5 _fgetws 59023->59026 59024 d68fe8 59025 d69d23 __chsize_nolock 66 API calls 59024->59025 59027 d68fed 59025->59027 59026->59024 59028 d69016 59026->59028 59081 d70663 11 API calls __gmtime64_s 59027->59081 59043 d74831 59028->59043 59031 d6901b 59032 d69022 59031->59032 59033 d6902f 59031->59033 59034 d69d23 __chsize_nolock 66 API calls 59032->59034 59035 d69057 59033->59035 59036 d69037 59033->59036 59039 d68ff8 _fgetws @_EH4_CallFilterFunc@8 59034->59039 59061 d74578 59035->59061 59037 d69d23 __chsize_nolock 66 API calls 59036->59037 59037->59039 59039->58985 59042->58989 59044 d7483d _fgetws 59043->59044 59045 d774d1 __lock 66 API calls 59044->59045 59059 d7484b 59045->59059 59046 d748c0 59083 d7495b 59046->59083 59047 d748c7 59116 d737bd 66 API calls _malloc 59047->59116 59050 d748ce 59050->59046 59052 d748dc InitializeCriticalSectionAndSpinCount 59050->59052 59051 d74950 _fgetws 59051->59031 59053 d7490f EnterCriticalSection 59052->59053 59054 d748fc 59052->59054 59053->59046 59057 d68b67 _free 66 API calls 59054->59057 59058 d74904 59057->59058 59058->59046 59059->59046 59059->59047 59086 d7740f 59059->59086 59114 d744db 67 API calls __lock 59059->59114 59115 d74549 LeaveCriticalSection LeaveCriticalSection _doexit 59059->59115 59081->59039 59117 d773f8 LeaveCriticalSection 59083->59117 59085 d74962 59085->59051 59087 d7741b _fgetws 59086->59087 59088 d77443 59087->59088 59089 d7742b 59087->59089 59091 d77441 59088->59091 59098 d77451 _fgetws 59088->59098 59118 d6f669 66 API calls __NMSG_WRITE 59089->59118 59091->59088 59121 d737bd 66 API calls _malloc 59091->59121 59093 d77430 59119 d6f4ba 66 API calls 7 library calls 59093->59119 59094 d7745c 59096 d77463 59094->59096 59097 d77472 59094->59097 59100 d69d23 __chsize_nolock 65 API calls 59096->59100 59101 d774d1 __lock 65 API calls 59097->59101 59098->59059 59099 d77437 59120 d6c41c GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 59099->59120 59103 d77468 59100->59103 59104 d77479 59101->59104 59103->59098 59105 d77481 InitializeCriticalSectionAndSpinCount 59104->59105 59106 d774ac 59104->59106 59114->59059 59115->59059 59116->59050 59117->59085 59118->59093 59119->59099 59121->59094 59404 c7c1ab 59403->59404 59408 c7c1b7 59403->59408 59405 d6d106 __fgetwc_nolock 66 API calls 59404->59405 59406 c7c1b1 59405->59406 59407 d6cd28 __chsize_nolock 66 API calls 59406->59407 59407->59408 59408->58995 59530->58526 59531->58526 59532->58546 59533 cd2958 59534 cd2964 __EH_prolog3 ctype 59533->59534 59535 cd2a29 CreateCompatibleDC CreateCompatibleDC 59534->59535 59537 cd2a52 59534->59537 59536 cd2a49 59535->59536 59536->59537 59541 c6d035 RaiseException __CxxThrowException@8 59536->59541 59542 cd2580 349 API calls 4 library calls 59537->59542 59540 cd2ae4 ~_Task_impl 59542->59540 59543 c631d0 59565 c79548 59543->59565 59545 c6320f ctype 59546 c63294 GetModuleFileNameW 59545->59546 59547 c55420 ctype 104 API calls 59546->59547 59548 c632cc 59547->59548 59549 c5de40 66 API calls 59548->59549 59550 c63315 59549->59550 59551 c55820 ctype 69 API calls 59550->59551 59552 c63324 59551->59552 59553 d68b67 _free 66 API calls 59552->59553 59554 c63355 59553->59554 59555 c54c30 69 API calls 59554->59555 59556 c6336b 59555->59556 59557 d68ba1 __wcsdup 66 API calls 59556->59557 59558 c63373 59557->59558 59559 c64850 122 API calls 59558->59559 59560 c633b3 59559->59560 59561 c556f0 ctype 69 API calls 59560->59561 59562 c633e1 59561->59562 59563 d683fc __getdrive 5 API calls 59562->59563 59564 c63452 59563->59564 59566 c79554 __EH_prolog3 59565->59566 59577 c7b541 59566->59577 59568 c7955e 59569 c79576 59568->59569 59570 d68ba1 __wcsdup 66 API calls 59568->59570 59571 c6bdd2 ctype 31 API calls 59569->59571 59570->59569 59572 c79584 59571->59572 59573 c69376 ctype 2 API calls 59572->59573 59574 c6b8bd ctype 25 API calls 59572->59574 59575 c7959b GetCurrentThread GetCurrentThreadId 59572->59575 59573->59572 59574->59572 59576 c7963f ~_Task_impl 59575->59576 59576->59545 59578 c7b54d __EH_prolog3 59577->59578 59579 c75eff 31 API calls 59578->59579 59580 c7b557 59579->59580 59583 c7b19a 59580->59583 59582 c7b56f ~_Task_impl 59582->59568 59584 c6b7ef ctype 25 API calls 59583->59584 59585 c7b1b3 GetCursorPos 59584->59585 59585->59582 59586 c71b7e 59587 c71b9c 59586->59587 59590 c71ba1 GetParent 59586->59590 59588 c6eaf8 GetWindowLongW 59587->59588 59588->59590 59606 c7b0ab 59590->59606 59592 c71bce PeekMessageW 59605 c71bc3 59592->59605 59594 c71ca9 59624 c78e5b 32 API calls ctype 59594->59624 59595 c6ec4f ShowWindow 59596 c71bed KiUserCallbackDispatcher 59595->59596 59596->59605 59597 c71c1d SendMessageW 59597->59605 59599 c71c05 SendMessageW 59599->59605 59600 c71caf 59601 c6ec4f ShowWindow 59602 c71c69 UpdateWindow 59601->59602 59602->59605 59604 c71c96 PeekMessageW 59604->59605 59605->59592 59605->59594 59605->59595 59605->59597 59605->59599 59605->59600 59605->59601 59605->59604 59609 c7b5fc 59605->59609 59619 c7b479 59605->59619 59607 c6b7ef ctype 25 API calls 59606->59607 59608 c7b0b0 59607->59608 59608->59605 59610 c6be05 ctype 31 API calls 59609->59610 59611 c7b5b6 59610->59611 59612 c6b7ef ctype 25 API calls 59611->59612 59613 c7b5bf KiUserCallbackDispatcher 59612->59613 59614 c7b5d4 59613->59614 59615 c7b5f6 59613->59615 59614->59615 59625 c7b3e8 59614->59625 59615->59605 59617 c7b5e3 59617->59615 59618 c7b5e8 TranslateMessage DispatchMessageW 59617->59618 59618->59615 59620 c6be05 ctype 31 API calls 59619->59620 59621 c7b409 59620->59621 59622 c7b423 59621->59622 59623 c6b7ef ctype 25 API calls 59621->59623 59622->59605 59623->59622 59626 c6be05 ctype 31 API calls 59625->59626 59627 c7b3f2 59626->59627 59628 c7b375 59627->59628 59629 c7b3f9 59627->59629 59630 c6be05 ctype 31 API calls 59628->59630 59648 c7b589 59629->59648 59633 c7b380 59630->59633 59632 c68390 ctype 31 API calls 59634 c7b3a6 59632->59634 59633->59632 59640 c7b39b 59633->59640 59642 c72972 59634->59642 59637 c720d2 ctype 98 API calls 59638 c7b3ca 59637->59638 59651 c73fd7 102 API calls ctype 59638->59651 59640->59617 59645 c72980 59642->59645 59643 c729ab 59643->59637 59643->59640 59644 c720fe 97 API calls 59644->59645 59645->59643 59645->59644 59646 c7299e GetParent 59645->59646 59652 c6b12d 59645->59652 59646->59645 59738 c7b375 59648->59738 59651->59640 59657 c6e5e4 59652->59657 59655 c6b147 59655->59645 59658 c6e604 59657->59658 59659 c6e6d0 59657->59659 59662 c6e6b2 59658->59662 59663 c6e60a 59658->59663 59660 c6e79c 59659->59660 59661 c6e6db 59659->59661 59666 c720d2 ctype 98 API calls 59660->59666 59665 c6e73d 59661->59665 59674 c6b143 59661->59674 59690 c6e6fe 59661->59690 59664 c6e6bb IsWindow 59662->59664 59662->59674 59667 c6e651 59663->59667 59672 c6e611 59663->59672 59664->59674 59668 c720d2 ctype 98 API calls 59665->59668 59670 c6e7b1 59666->59670 59669 c6e694 59667->59669 59676 c6e65a 59667->59676 59673 c6e753 59668->59673 59669->59674 59679 c6e69d IsWindow 59669->59679 59677 c6e7b5 ClientToScreen 59670->59677 59678 c6e7c2 59670->59678 59671 c6e63d 59713 c6e375 119 API calls ctype 59671->59713 59672->59671 59672->59676 59680 c6e61d 59672->59680 59681 c6e774 59673->59681 59682 c6e75f IsWindow 59673->59682 59674->59655 59698 c6c025 59674->59698 59676->59674 59684 c6e668 IsWindow 59676->59684 59677->59678 59715 c6e553 109 API calls __getdrive 59678->59715 59679->59674 59686 c6e67b SendMessageW 59679->59686 59680->59671 59680->59674 59714 c6e375 119 API calls ctype 59681->59714 59682->59681 59687 c6e767 ClientToScreen 59682->59687 59683 c6e64f 59683->59674 59684->59674 59689 c6e675 59684->59689 59686->59674 59687->59681 59689->59674 59689->59686 59690->59674 59695 c6e710 IsWindow 59690->59695 59691 c6e7d0 59691->59691 59693 c6e782 59693->59674 59694 c6e78b IsWindow 59693->59694 59694->59674 59694->59683 59695->59674 59696 c6e71d 59695->59696 59696->59674 59697 c6e72b SendMessageW 59696->59697 59697->59674 59716 c6fdbf 59698->59716 59702 c6c0c0 59726 c70d74 59702->59726 59703 c6c03b 59703->59655 59704 c6c071 GetWindowLongW 59704->59702 59707 c6c07f 59704->59707 59705 c6c04a 59705->59702 59705->59703 59705->59704 59730 c81a5a 7 API calls __getdrive 59707->59730 59709 c6c08b 59709->59702 59710 c6c08f GetDlgItem 59709->59710 59711 c6c09e IsWindowEnabled 59710->59711 59712 c6c0a9 SendMessageW 59710->59712 59711->59702 59711->59712 59712->59703 59713->59683 59714->59693 59715->59691 59717 c6bdd2 ctype 31 API calls 59716->59717 59718 c6c037 59717->59718 59718->59703 59719 c73677 59718->59719 59720 c73686 59719->59720 59721 c73680 59719->59721 59720->59705 59721->59720 59722 c7369d 59721->59722 59731 c73638 99 API calls ctype 59721->59731 59724 c736b4 59722->59724 59732 c73638 99 API calls ctype 59722->59732 59724->59705 59727 c70d86 59726->59727 59729 c70da1 59727->59729 59733 c6eac1 59727->59733 59729->59703 59730->59709 59731->59722 59732->59722 59734 c6eae7 IsDialogMessageW 59733->59734 59735 c6ead2 59733->59735 59737 c6ead7 59734->59737 59736 c6bdd2 ctype 31 API calls 59735->59736 59736->59737 59737->59729 59739 c6be05 ctype 31 API calls 59738->59739 59740 c7b380 59739->59740 59741 c68390 ctype 31 API calls 59740->59741 59748 c7b39b 59740->59748 59742 c7b3a6 59741->59742 59743 c72972 149 API calls 59742->59743 59744 c7b3b6 59743->59744 59745 c720d2 ctype 98 API calls 59744->59745 59744->59748 59746 c7b3ca 59745->59746 59749 c73fd7 102 API calls ctype 59746->59749 59748->59617 59749->59748 59750 c78e7d GetModuleHandleW 59751 c78e96 59750->59751 59752 c78e9b GetProcAddress GetProcAddress 59750->59752 59753 c69376 ctype 2 API calls 59751->59753 59754 c78ec9 59752->59754 59755 c78eb9 59752->59755 59753->59752 59755->59754 59756 c78ebd RegisterApplicationRestart 59755->59756 59756->59754 59757 c78c1d 59758 c78c53 59757->59758 59759 c78cda 59757->59759 59758->59759 59760 c78c54 RegOpenKeyExW 59758->59760 59761 c78cc3 RegCloseKey 59758->59761 59762 c78c71 RegQueryValueExW 59758->59762 59760->59758 59761->59758 59762->59758 59763 c6c47d 59764 c6c489 __EH_prolog3_catch 59763->59764 59765 c6c49a 59764->59765 59766 c6bdd2 ctype 31 API calls 59764->59766 59767 c6bdd2 ctype 31 API calls 59765->59767 59766->59765 59768 c6c4a5 59767->59768 59797 c75801 59768->59797 59771 c75801 122 API calls 59772 c6c4c2 59771->59772 59842 c72bff 59772->59842 59776 c6c4cc ctype 59798 c6bdd2 ctype 31 API calls 59797->59798 59799 c7580e _memset 59798->59799 59800 c6bdd2 ctype 31 API calls 59799->59800 59840 c6c4b8 59799->59840 59801 c75846 59800->59801 59802 c75877 59801->59802 59885 c7549b 59801->59885 59804 c75899 59802->59804 59806 c7549b 110 API calls 59802->59806 59805 c758c0 59804->59805 59807 c7549b 110 API calls 59804->59807 59808 c758e6 59805->59808 59903 c757bd 112 API calls ctype 59805->59903 59806->59804 59807->59805 59810 c75913 59808->59810 59904 c757bd 112 API calls ctype 59808->59904 59812 c75934 59810->59812 59905 c72b9c 41 API calls ctype 59810->59905 59814 c75955 59812->59814 59906 c72b9c 41 API calls ctype 59812->59906 59816 c75972 59814->59816 59907 c72b9c 41 API calls ctype 59814->59907 59818 c7598b 59816->59818 59908 c72b9c 41 API calls ctype 59816->59908 59820 c759a8 59818->59820 59909 c72b9c 41 API calls ctype 59818->59909 59822 c759c5 59820->59822 59910 c72b9c 41 API calls ctype 59820->59910 59824 c759e2 59822->59824 59911 c72b9c 41 API calls ctype 59822->59911 59826 c759ff 59824->59826 59912 c72b9c 41 API calls ctype 59824->59912 59828 c75a1c 59826->59828 59913 c72b9c 41 API calls ctype 59826->59913 59830 c75a35 59828->59830 59914 c72b9c 41 API calls ctype 59828->59914 59832 c75a4e 59830->59832 59915 c72b9c 41 API calls ctype 59830->59915 59834 c75a6b 59832->59834 59916 c72b9c 41 API calls ctype 59832->59916 59836 c75a88 59834->59836 59917 c72b9c 41 API calls ctype 59834->59917 59838 c75aa1 59836->59838 59918 c72b9c 41 API calls ctype 59836->59918 59838->59840 59919 c72b9c 41 API calls ctype 59838->59919 59840->59771 59843 c6bdd2 ctype 31 API calls 59842->59843 59844 c72c1a _memset 59843->59844 59845 c69376 ctype 2 API calls 59844->59845 59846 c72c78 59844->59846 59849 c72c41 GetVersionExW 59844->59849 59845->59844 59847 d683fc __getdrive 5 API calls 59846->59847 59848 c6c4c7 59847->59848 59854 c8225c 59848->59854 59849->59844 59850 c72c5f 59849->59850 59850->59846 59851 c6bdd2 ctype 31 API calls 59850->59851 59852 c72c6d 59851->59852 59932 c71f29 59852->59932 59955 c82203 59854->59955 59857 c82203 110 API calls 59858 c8227b 59857->59858 59859 c82203 110 API calls 59858->59859 59860 c8228b 59859->59860 59861 c82203 110 API calls 59860->59861 59862 c8229a 59861->59862 59863 c82203 110 API calls 59862->59863 59864 c822a5 59863->59864 59865 c82203 110 API calls 59864->59865 59866 c822b0 59865->59866 59867 c82203 110 API calls 59866->59867 59868 c822bb 59867->59868 59869 c82203 110 API calls 59868->59869 59870 c822cb 59869->59870 59871 c82203 110 API calls 59870->59871 59872 c822dd 59871->59872 59873 c82203 110 API calls 59872->59873 59874 c822ec 59873->59874 59875 c82203 110 API calls 59874->59875 59876 c822f7 59875->59876 59876->59776 59886 c754a7 __EH_prolog3_catch 59885->59886 59920 c70eeb 59886->59920 59888 c754b9 59890 c754cc ~_Task_impl 59888->59890 59927 c70e60 36 API calls 2 library calls 59888->59927 59890->59802 59891 c754c6 59891->59890 59892 c6bdd2 ctype 31 API calls 59891->59892 59893 c754d5 59892->59893 59893->59890 59894 c80d75 ctype 7 API calls 59893->59894 59895 c754e2 59894->59895 59896 c6bdd2 ctype 31 API calls 59895->59896 59897 c754eb 59896->59897 59928 c684c0 69 API calls 59897->59928 59899 c754f9 59929 c68d2c 69 API calls 59899->59929 59901 c75502 59930 c80de7 LocalAlloc LeaveCriticalSection RaiseException ctype 59901->59930 59903->59808 59904->59810 59905->59812 59906->59814 59907->59816 59908->59818 59909->59820 59910->59822 59911->59824 59912->59826 59913->59828 59914->59830 59915->59832 59916->59834 59917->59836 59918->59838 59919->59840 59921 c70ef7 _fgetws 59920->59921 59922 c6bdd2 ctype 31 API calls 59921->59922 59923 c70f05 ActivateActCtx 59922->59923 59924 c70f1c GetClassInfoW 59923->59924 59925 c70f18 _fgetws 59923->59925 59931 c70f46 GetLastError DeactivateActCtx SetLastError 59924->59931 59925->59888 59927->59891 59928->59899 59929->59901 59930->59890 59931->59925 59933 c71f35 _fgetws 59932->59933 59934 c6bdd2 ctype 31 API calls 59933->59934 59935 c71f45 ActivateActCtx 59934->59935 59936 c71f5c 59935->59936 59939 c71f58 _fgetws 59935->59939 59943 c71efa 59936->59943 59939->59846 59940 c71f7d InitNetworkAddressControl 59948 c71f97 59940->59948 59942 c69376 ctype 2 API calls 59942->59940 59944 c71f1c 59943->59944 59945 c71f08 59943->59945 59944->59940 59944->59942 59954 c68100 GetModuleHandleW LoadLibraryW 59945->59954 59947 c71f12 GetProcAddress 59947->59944 59949 c71fa5 GetLastError 59948->59949 59950 c71faf 59948->59950 59951 c71fb1 DeactivateActCtx 59949->59951 59950->59951 59952 c71fc7 59951->59952 59953 c71fc0 SetLastError 59951->59953 59952->59939 59953->59952 59954->59947 59956 c6bdd2 ctype 31 API calls 59955->59956 59957 c82220 59956->59957 59958 c70eeb 36 API calls 59957->59958 59959 c82230 59958->59959 59960 c7549b 110 API calls 59959->59960 59961 c82258 59960->59961 59961->59857 59962 c7b49a 59963 c6be05 ctype 31 API calls 59962->59963 59964 c7b4a6 59963->59964 59969 c7b0fb 59964->59969 59966 c7b4d4 59967 d6cabc __threadstartex@4 80 API calls 59966->59967 59968 c7b4dc 59967->59968 59970 c7b107 __EH_prolog3_catch 59969->59970 59979 c8292a 59970->59979 59975 c6be05 ctype 31 API calls 59978 c7b129 59975->59978 59977 c7b168 ~_Task_impl 59977->59966 59978->59977 60011 c7e490 9 API calls 59978->60011 59980 c6be05 ctype 31 API calls 59979->59980 59981 c7b110 59980->59981 59982 c82b3f 59981->59982 59983 c6be05 ctype 31 API calls 59982->59983 59984 c82b4b 59983->59984 59985 c82bad 59984->59985 59986 c82b76 59984->59986 59989 c7b0a2 ctype 31 API calls 59984->59989 60010 c7b117 59984->60010 59987 c6bdd2 ctype 31 API calls 59985->59987 60012 c82a6e LocalAlloc RaiseException moneypunct ctype 59986->60012 59990 c82bb3 59987->59990 59989->59986 60017 c7dff9 EnterCriticalSection TlsGetValue LeaveCriticalSection LeaveCriticalSection ctype 59990->60017 59992 c82b8d 60013 c82a6e LocalAlloc RaiseException moneypunct ctype 59992->60013 59994 c82b95 60014 c82a6e LocalAlloc RaiseException moneypunct ctype 59994->60014 59996 c82bd7 60008 c82c05 59996->60008 59996->60010 60019 d6e33a 67 API calls 2 library calls 59996->60019 59997 c82bc0 59997->59996 59997->60010 60018 d6e33a 67 API calls 2 library calls 59997->60018 59998 c82b9d 60015 c82a6e LocalAlloc RaiseException moneypunct ctype 59998->60015 60001 c82ba5 60016 c82a6e LocalAlloc RaiseException moneypunct ctype 60001->60016 60004 d69251 _malloc 66 API calls 60005 c82c12 60004->60005 60009 d69251 _malloc 66 API calls 60005->60009 60005->60010 60006 c82bfa 60007 d68b67 _free 66 API calls 60006->60007 60007->60008 60008->60004 60009->60010 60010->59975 60010->59978 60011->59977 60012->59992 60013->59994 60014->59998 60015->60001 60016->59985 60017->59997 60018->59996 60019->60006 60020 c88276 60021 c88282 __EH_prolog3_GS 60020->60021 60022 c882c7 60021->60022 60023 c882cf GetParent 60021->60023 60142 c859df 11 API calls __getdrive 60021->60142 60022->60023 60024 c88303 60022->60024 60025 c720d2 ctype 98 API calls 60023->60025 60026 c8837c 60024->60026 60032 c88308 60024->60032 60028 c882e0 60025->60028 60122 c83bc4 LocalAlloc PtInRect RaiseException ctype 60026->60122 60031 c6a1d1 ctype 2 API calls 60028->60031 60030 c88342 60037 c8835b SetCursor 60030->60037 60038 c88367 60030->60038 60033 c882eb 60031->60033 60032->60030 60144 c859df 11 API calls __getdrive 60032->60144 60033->60024 60036 c882f1 GetParent 60033->60036 60035 d69b08 ctype 5 API calls 60040 c888d1 60035->60040 60041 c720d2 ctype 98 API calls 60036->60041 60037->60038 60145 cd5f3b 29 API calls 60038->60145 60039 c88339 UpdateWindow 60039->60030 60045 c882fc 60041->60045 60043 c88386 60044 c883f3 60043->60044 60051 c883c1 GetAsyncKeyState 60043->60051 60093 c884b7 60043->60093 60048 c887dc 60044->60048 60050 c8841f 60044->60050 60143 c6eeb1 102 API calls ctype 60045->60143 60046 c88377 60046->60093 60152 c83d24 LocalAlloc PtInRect RaiseException 60048->60152 60055 c8845c 60050->60055 60146 c859df 11 API calls __getdrive 60050->60146 60051->60044 60053 c883d3 60051->60053 60052 c887ed 60054 c88802 60052->60054 60153 c6a188 LocalAlloc RaiseException ctype 60052->60153 60053->60044 60054->60093 60154 c859df 11 API calls __getdrive 60054->60154 60123 c83bc4 LocalAlloc PtInRect RaiseException ctype 60055->60123 60060 c88823 UpdateWindow 60062 c88839 60060->60062 60061 c88469 60063 c8847f 60061->60063 60064 c69376 ctype 2 API calls 60061->60064 60065 c8888d SetCapture 60062->60065 60072 c88846 60062->60072 60066 c884bc 60063->60066 60067 c88496 60063->60067 60064->60063 60068 c720d2 ctype 98 API calls 60065->60068 60124 c859df 11 API calls __getdrive 60066->60124 60067->60093 60147 c859df 11 API calls __getdrive 60067->60147 60078 c887cc 60068->60078 60070 c884c6 UpdateWindow 60075 c884da ctype 60070->60075 60155 c859df 11 API calls __getdrive 60072->60155 60074 c888bc RedrawWindow 60074->60093 60079 c884f8 60075->60079 60080 c88557 60075->60080 60077 c88882 UpdateWindow 60077->60078 60078->60093 60156 c8616a 99 API calls ctype 60078->60156 60082 c8851e InflateRect 60079->60082 60083 c8852f SetCapture 60079->60083 60080->60078 60125 cf5922 31 API calls 60080->60125 60082->60083 60084 c720d2 ctype 98 API calls 60083->60084 60085 c8853e SetCursor 60084->60085 60085->60078 60086 c88585 60126 cf5cd9 60086->60126 60089 c8861d GetCursorPos ScreenToClient 60091 c88646 PtInRect 60089->60091 60121 c88769 60089->60121 60090 c885f2 60148 cf594f 10 API calls 3 library calls 60090->60148 60097 c8865e 60091->60097 60091->60121 60093->60035 60094 c8877b 60096 c88785 InvalidateRect 60094->60096 60094->60121 60096->60121 60097->60094 60098 c88698 60097->60098 60149 c83a6e LocalAlloc RaiseException ctype 60098->60149 60100 c886a7 RedrawWindow 60151 cf594f 10 API calls 3 library calls 60121->60151 60122->60043 60123->60061 60124->60070 60125->60086 60127 cf5ce5 __EH_prolog3_GS 60126->60127 60157 cf5c27 60127->60157 60129 cf5cf6 60130 cf5d09 CopyRect 60129->60130 60131 cf5d16 GetCursorPos SetRect 60129->60131 60132 cf5d3c 60130->60132 60131->60132 60133 cf5d47 60132->60133 60134 cf5d50 IsRectEmpty 60132->60134 60136 c68390 ctype 31 API calls 60133->60136 60134->60133 60135 cf5d5b InflateRect 60134->60135 60135->60133 60138 cf5d70 ctype 60136->60138 60137 cf5d7a ~_Task_impl 60139 d69b08 ctype 5 API calls 60137->60139 60138->60137 60140 cf5dad DoDragDrop 60138->60140 60141 c885e4 IsWindow 60139->60141 60140->60137 60141->60089 60141->60090 60142->60022 60143->60024 60144->60039 60145->60046 60146->60055 60147->60093 60148->60093 60149->60100 60151->60078 60152->60052 60153->60054 60154->60060 60155->60077 60156->60074 60158 cf5c33 __EH_prolog3 60157->60158 60159 c75eff 31 API calls 60158->60159 60160 cf5c3d 60159->60160 60161 c80d75 ctype 7 API calls 60160->60161 60162 cf5c6b 60161->60162 60163 cf5ca9 60162->60163 60164 cf5c73 GetProfileIntW GetProfileIntW 60162->60164 60167 c80de7 LocalAlloc LeaveCriticalSection RaiseException ctype 60163->60167 60164->60163 60166 cf5cb0 ~_Task_impl 60166->60129 60167->60166
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: _malloc
                                    • String ID: ($AdBook11$AdBook12$AdBook13$AdView$AppAdView$AppUpSoft$BRAdminL$CInstallManagerApp::CreateDataObject() NG: strInstName = $CableLabelTool$Common$Driver$EditLL$Error$InstApp%03d$JpnFonts$MAXPrintSetTool$MAXPtedit51$MAXPtedit52$Manual$ManualCopy$ModelUnique$PrintSetTool$Ptedit42$Ptedit50$Ptedit50LE$Ptedit51$Ptedit52$SCEdit$Stand$UpSoft$VM100$bPAC30SDK
                                    • API String ID: 1579825452-1070725845
                                    • Opcode ID: eae516180d01ad60f02ba986e6716213aa0c351776b87f6885cfab1d0662b3b5
                                    • Instruction ID: 6b70fe932b7082f4487aa12c454a1baa945d3f86b86a43f15e23d49913d30306
                                    • Opcode Fuzzy Hash: eae516180d01ad60f02ba986e6716213aa0c351776b87f6885cfab1d0662b3b5
                                    • Instruction Fuzzy Hash: 4472EB70900345DFDB24EBA4CC82BEE77A4AF54714F144258F816A7382EB75AB09D7B2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 415 c7fcab-c7fd02 call d69a85 call c6d944 GetDeviceCaps 420 c7fd04-c7fd13 415->420 421 c7fd1d 415->421 422 c7fd15-c7fd1b 420->422 423 c7fd1f 420->423 421->423 424 c7fd21-c7fd2f 422->424 423->424 425 c7fd31-c7fd34 424->425 426 c7fd3e-c7fd4c 424->426 425->426 427 c7fd36-c7fd3c call c6db1d DeleteObject 425->427 428 c7fd4e-c7fd51 426->428 429 c7fd5b-c7fd69 426->429 427->426 428->429 433 c7fd53-c7fd59 call c6db1d DeleteObject 428->433 430 c7fd6b-c7fd6e 429->430 431 c7fd78-c7fd80 429->431 430->431 434 c7fd70-c7fd76 call c6db1d DeleteObject 430->434 435 c7fd82-c7fd85 431->435 436 c7fd8f-c7fd9d 431->436 433->429 434->431 435->436 440 c7fd87-c7fd8d call c6db1d DeleteObject 435->440 441 c7fd9f-c7fda2 436->441 442 c7fdac-c7fdb4 436->442 440->436 441->442 446 c7fda4-c7fdaa call c6db1d DeleteObject 441->446 447 c7fdb6-c7fdb9 442->447 448 c7fdc3-c7fdcb 442->448 446->442 447->448 449 c7fdbb-c7fdc1 call c6db1d DeleteObject 447->449 450 c7fdcd-c7fdd0 448->450 451 c7fdda-c7fde2 448->451 449->448 450->451 455 c7fdd2-c7fdd8 call c6db1d DeleteObject 450->455 456 c7fde4-c7fde7 451->456 457 c7fdf1-c7fdff 451->457 455->451 456->457 461 c7fde9-c7fdef call c6db1d DeleteObject 456->461 462 c7fe01-c7fe04 457->462 463 c7fe0e-c7fe16 457->463 461->457 462->463 468 c7fe06-c7fe0c call c6db1d DeleteObject 462->468 464 c7fe25-c7fe7d call c7e9f2 call d6a760 GetTextCharsetInfo 463->464 465 c7fe18-c7fe1b 463->465 479 c7fe84 464->479 480 c7fe7f-c7fe82 464->480 465->464 470 c7fe1d-c7fe23 call c6db1d DeleteObject 465->470 468->463 470->464 481 c7fe85-c7fe8b 479->481 480->481 482 c7fe8f-c7fea7 lstrcpyW 481->482 483 c7fe8d 481->483 484 c7ff0f-c7ff60 CreateFontIndirectW call c6daef call d6aa0f call d6df00 482->484 485 c7fea9-c7feb0 482->485 483->482 498 c7ff65-c80066 CreateFontIndirectW call c6daef call c7e9f2 CreateFontIndirectW call c6daef CreateFontIndirectW call c6daef CreateFontIndirectW call c6daef GetSystemMetrics lstrcpyW CreateFontIndirectW call c6daef GetStockObject 484->498 499 c7ff62 484->499 485->484 486 c7feb2-c7fece EnumFontFamiliesW 485->486 488 c7fee2-c7fefc EnumFontFamiliesW 486->488 489 c7fed0-c7fee0 lstrcpyW 486->489 491 c7ff06 488->491 492 c7fefe-c7ff04 488->492 489->484 494 c7ff0c-c7ff0d lstrcpyW 491->494 492->494 494->484 512 c8006c-c8007c GetObjectW 498->512 513 c800ee-c80149 GetStockObject call c6dadb GetObjectW CreateFontIndirectW call c6daef CreateFontIndirectW call c6daef call c7eb95 498->513 499->498 512->513 515 c8007e-c800e9 lstrcpyW CreateFontIndirectW call c6daef CreateFontIndirectW call c6daef 512->515 526 c80177-c80179 513->526 515->513 527 c8014b-c8014f 526->527 528 c8017b-c8018f call c5eb60 526->528 530 c801a9-c8033d call c69376 call d69a85 GetVersionExW GetSystemMetrics 527->530 531 c80151-c8015f 527->531 532 c80194-c801a8 call c6d998 call d69b08 528->532 545 c8034f 530->545 546 c8033f-c80346 530->546 531->530 534 c80161-c8016b call c720fe 531->534 534->526 541 c8016d-c8016f 534->541 541->526 548 c80355-c80357 545->548 549 c80351-c80353 545->549 547 c80348 546->547 546->548 547->545 550 c80358-c80397 call c7f779 call c710ac 548->550 549->550 555 c80408-c80426 550->555 556 c80399-c80406 GetProcAddress * 6 550->556 557 c8042c-c8043f call c7eaff 555->557 556->557 560 c80441-c80475 GetProcAddress * 3 557->560 561 c80477-c80483 557->561 562 c80489-c804c6 call c7fcab 560->562 561->562 564 c804cb-c8054c call c7e6b5 call d69b08 562->564
                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00C7FCB5
                                      • Part of subcall function 00C6D944: __EH_prolog3.LIBCMT ref: 00C6D94B
                                      • Part of subcall function 00C6D944: GetWindowDC.USER32(00000000,00000004,00C7F7D5,00000000,?,?,?), ref: 00C6D977
                                    • GetDeviceCaps.GDI32(?,00000058), ref: 00C7FCDB
                                    • DeleteObject.GDI32(00000000), ref: 00C7FD3C
                                    • DeleteObject.GDI32(00000000), ref: 00C7FD59
                                    • DeleteObject.GDI32(00000000), ref: 00C7FD76
                                    • DeleteObject.GDI32(00000000), ref: 00C7FD8D
                                    • DeleteObject.GDI32(00000000), ref: 00C7FDAA
                                    • DeleteObject.GDI32(00000000), ref: 00C7FDC1
                                    • DeleteObject.GDI32(00000000), ref: 00C7FDD8
                                    • DeleteObject.GDI32(00000000), ref: 00C7FDEF
                                    • DeleteObject.GDI32(00000000), ref: 00C7FE0C
                                    • DeleteObject.GDI32(00000000), ref: 00C7FE23
                                    • _memset.LIBCMT ref: 00C7FE44
                                    • GetTextCharsetInfo.GDI32(?,00000000,00000000), ref: 00C7FE54
                                    • lstrcpyW.KERNEL32(?,?), ref: 00C7FEA3
                                    • EnumFontFamiliesW.GDI32(?,00000000,Function_0002FC62), ref: 00C7FECA
                                    • lstrcpyW.KERNEL32(?), ref: 00C7FEDA
                                    • EnumFontFamiliesW.GDI32(?,00000000,Function_0002FC62), ref: 00C7FEF5
                                    • lstrcpyW.KERNEL32(?), ref: 00C7FF0D
                                    • CreateFontIndirectW.GDI32(?), ref: 00C7FF19
                                    • CreateFontIndirectW.GDI32(?), ref: 00C7FF69
                                    • CreateFontIndirectW.GDI32(?), ref: 00C7FFAE
                                    • CreateFontIndirectW.GDI32(?), ref: 00C7FFD6
                                    • CreateFontIndirectW.GDI32(?), ref: 00C7FFF3
                                    • GetSystemMetrics.USER32(00000048), ref: 00C8000E
                                    • lstrcpyW.KERNEL32(?), ref: 00C80022
                                    • CreateFontIndirectW.GDI32(?), ref: 00C80028
                                    • GetStockObject.GDI32(00000011), ref: 00C80056
                                    • GetObjectW.GDI32(?,0000005C,?), ref: 00C80078
                                    • lstrcpyW.KERNEL32(?), ref: 00C800B1
                                    • CreateFontIndirectW.GDI32(?), ref: 00C800BB
                                    • CreateFontIndirectW.GDI32(?), ref: 00C800DA
                                    • GetStockObject.GDI32(00000011), ref: 00C800F0
                                    • GetObjectW.GDI32(?,0000005C,?), ref: 00C80101
                                    • CreateFontIndirectW.GDI32(?), ref: 00C8010B
                                    • CreateFontIndirectW.GDI32(?), ref: 00C8012E
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    • __EH_prolog3_GS.LIBCMT ref: 00C801B9
                                    • GetVersionExW.KERNEL32(?,0000011C,00000000), ref: 00C8030F
                                    • GetSystemMetrics.USER32(00001000), ref: 00C8031A
                                    • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 00C8039F
                                    • GetProcAddress.KERNEL32(?,DrawThemeTextEx), ref: 00C803B2
                                    • GetProcAddress.KERNEL32(?,BufferedPaintInit), ref: 00C803C5
                                    • GetProcAddress.KERNEL32(?,BufferedPaintUnInit), ref: 00C803D8
                                    • GetProcAddress.KERNEL32(?,BeginBufferedPaint), ref: 00C803EB
                                    • GetProcAddress.KERNEL32(?,EndBufferedPaint), ref: 00C803FE
                                    • GetProcAddress.KERNEL32(00000000,DwmExtendFrameIntoClientArea), ref: 00C80447
                                    • GetProcAddress.KERNEL32(?,DwmDefWindowProc), ref: 00C8045A
                                    • GetProcAddress.KERNEL32(?,DwmIsCompositionEnabled), ref: 00C8046D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Object$Font$CreateDeleteIndirect$AddressProc$lstrcpy$EnumFamiliesH_prolog3H_prolog3_MetricsStockSystem$CapsCharsetDeviceException@8InfoTextThrowVersionWindow_memset
                                    • String ID: BeginBufferedPaint$BufferedPaintInit$BufferedPaintUnInit$DrawThemeParentBackground$DrawThemeTextEx$DwmDefWindowProc$DwmExtendFrameIntoClientArea$DwmIsCompositionEnabled$EndBufferedPaint$UxTheme.dll$dwmapi.dll
                                    • API String ID: 253315088-1174303547
                                    • Opcode ID: cf34716620fe89890cab74f41d4d77cc6638db807972b96b40d19979d9197f9f
                                    • Instruction ID: 9db45a0a2502f61eca7ed8f837d8d9a0d5a69b1bc05e91a817816e3270721b4d
                                    • Opcode Fuzzy Hash: cf34716620fe89890cab74f41d4d77cc6638db807972b96b40d19979d9197f9f
                                    • Instruction Fuzzy Hash: 943237B09007189FCB21AFB5C884BDAFBF8AF55300F10856ED5AEA7251DB709A45DF60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C64C50: GetModuleHandleW.KERNEL32(kernel32,SOFTWARE\Microsoft\Windows NT\CurrentVersion), ref: 00C64CF7
                                      • Part of subcall function 00C64C50: GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00C64D07
                                      • Part of subcall function 00C64C50: GetCurrentProcess.KERNEL32(?), ref: 00C64D1A
                                      • Part of subcall function 00C64C50: RegOpenKeyExW.KERNELBASE(80000002,?,00000000,00000001,?), ref: 00C64D5A
                                    • _memset.LIBCMT ref: 00C51499
                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000026,00000000,00000001), ref: 00C514AE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AddressCurrentFolderHandleModuleOpenPathProcProcessSpecial_memset
                                    • String ID: IDS_CAMPANYNAME$IDS_INSTALLDIR$IDS_USERNAME$RegisteredOrganization$RegisteredOwner$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                    • API String ID: 1369504551-2778906505
                                    • Opcode ID: ac4d9548cf5c7ea696648ace9f82c87cfca50c394a9cf75517f6df3cf165919e
                                    • Instruction ID: 1fe3a883d2a659823bbcdbedd1eb671c5e7b9894e48e2718c5327e5374c722da
                                    • Opcode Fuzzy Hash: ac4d9548cf5c7ea696648ace9f82c87cfca50c394a9cf75517f6df3cf165919e
                                    • Instruction Fuzzy Hash: 321204746016059FD714DB6CCC51B5EB7E4AF89320F14839CE81ADB2E2DB30AE49DB94
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C6EA6E: GetDlgItem.USER32(?,?), ref: 00C6EA7F
                                    • GetWindowRect.USER32(?,?), ref: 00C627C2
                                    • SendMessageW.USER32(?,00001061,00000000,?), ref: 00C628B0
                                    • SendMessageW.USER32(?,00001036,00000000,00000020), ref: 00C62A62
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: MessageSend$ItemRectWindow
                                    • String ID: IDS_USERREG$gfff
                                    • API String ID: 1060579307-300678993
                                    • Opcode ID: 8327787ab64da11d10c95999c81a241b6ec70ad766577efa3d8e0420273e5c41
                                    • Instruction ID: 490208e93b894cf1cf5fd3b6fd43f322ee3700b5c1e3e1f2f503fab6624a1374
                                    • Opcode Fuzzy Hash: 8327787ab64da11d10c95999c81a241b6ec70ad766577efa3d8e0420273e5c41
                                    • Instruction Fuzzy Hash: A012AC71A006159FDB24DF58CCC5FAAB3B5FB88710F1085ADE51A9B281DB71AE81CF90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,18846CE9,18846CE9,?), ref: 00C6515F
                                    • CheckTokenMembership.KERNELBASE(00000000,?,?), ref: 00C65175
                                    • FreeSid.ADVAPI32(?), ref: 00C65182
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AllocateCheckFreeInitializeMembershipToken
                                    • String ID: EditLL$Error$IDS_MSG_ERR01$ManualCopy
                                    • API String ID: 3429775523-2546791932
                                    • Opcode ID: a2e5bf4d6b1fbf32bd8e17e5fb2f4e2a458da38fbd840c5018855d9a5a024cb3
                                    • Instruction ID: 595eb21b76f1e2604eda8291b5af44575138be6ad7d1f81e05ee55698d894ac7
                                    • Opcode Fuzzy Hash: a2e5bf4d6b1fbf32bd8e17e5fb2f4e2a458da38fbd840c5018855d9a5a024cb3
                                    • Instruction Fuzzy Hash: E141D7B1A00605AFCB14DBA8DC92FEEB3B5FF44715F104269E426A72D1E7746909CBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00C77127
                                    • GetFullPathNameW.KERNEL32(00000000,00000104,?,?,00000268,00C77302,?,?,00000000,?,00C6AC26,?,?,00000006), ref: 00C77165
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    • PathIsUNCW.SHLWAPI(?,?,?,00000000,?,00C6AC26,?,?), ref: 00C771E1
                                    • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,00000000,?,?,00000000,00000000,?,00C6AC26,?,?), ref: 00C77208
                                    • CharUpperW.USER32(?), ref: 00C7723B
                                    • FindFirstFileW.KERNEL32(?,?), ref: 00C77257
                                    • FindClose.KERNEL32(00000000), ref: 00C77263
                                    • lstrlenW.KERNEL32(?), ref: 00C77281
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: FindPath$CharCloseException@8FileFirstFullH_prolog3H_prolog3_InformationNameThrowUpperVolumelstrlen
                                    • String ID:
                                    • API String ID: 624941980-0
                                    • Opcode ID: 13dc19eae32497893613d2c480ce882495eca9e27d59e7fdb3a9d55e4167b53d
                                    • Instruction ID: 1c50b7725b56e9fc489342f2747b85159395a33f18b20b10963103b57ac1491f
                                    • Opcode Fuzzy Hash: 13dc19eae32497893613d2c480ce882495eca9e27d59e7fdb3a9d55e4167b53d
                                    • Instruction Fuzzy Hash: C7417671908219ABDF24AB70CC99BBE7778AF10315F504799B82E91192DB315E85DF20
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 00C5F1C6
                                    • OpenProcessToken.ADVAPI32(00000000), ref: 00C5F1CD
                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00C5F1DE
                                    • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000000,00000000,00000000), ref: 00C5F202
                                    • ExitWindowsEx.USER32(00000002,00000000), ref: 00C5F210
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ProcessToken$AdjustCurrentExitLookupOpenPrivilegePrivilegesValueWindows
                                    • String ID: SeShutdownPrivilege
                                    • API String ID: 1314775590-3733053543
                                    • Opcode ID: 2170b6720e1d373152070ab191ffe070c4ce6f2f546cef07ac9dc349e55ab352
                                    • Instruction ID: 85c6a16b5deb394ce8323b606e378bf881d2b3291038ab034a9cd2d078979937
                                    • Opcode Fuzzy Hash: 2170b6720e1d373152070ab191ffe070c4ce6f2f546cef07ac9dc349e55ab352
                                    • Instruction Fuzzy Hash: CA011D70A80309BBE710DFA4DC4AFBEB778EB04B01F504119BA05EA2D1DAB06504CBB5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsIconic.USER32(?), ref: 00C5FC9D
                                      • Part of subcall function 00C6D9D3: __EH_prolog3.LIBCMT ref: 00C6D9DA
                                      • Part of subcall function 00C6D9D3: BeginPaint.USER32(?,?,00000004,00C6BF0B,?,00000058,00C5FD51), ref: 00C6DA06
                                    • SendMessageW.USER32(?,00000027,?,00000000), ref: 00C5FCC2
                                    • GetSystemMetrics.USER32(0000000B), ref: 00C5FCD0
                                    • GetSystemMetrics.USER32(0000000C), ref: 00C5FCD6
                                    • GetClientRect.USER32(?,?), ref: 00C5FCF5
                                    • DrawIcon.USER32(?,?,?,?), ref: 00C5FD29
                                      • Part of subcall function 00C6DA27: __EH_prolog3.LIBCMT ref: 00C6DA2E
                                      • Part of subcall function 00C6DA27: EndPaint.USER32(?,?,00000004,00C6BF31,?,?,00000058,00C5FD51), ref: 00C6DA49
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: H_prolog3MetricsPaintSystem$BeginClientDrawIconIconicMessageRectSend
                                    • String ID:
                                    • API String ID: 2914073315-0
                                    • Opcode ID: b8edfc3bb9e23e07aec141b38fc283444eaff5ecff260f13cc31c7f76c37b303
                                    • Instruction ID: e0bb824d06854b8ba79c3658b056486b6860802bfb175e3ff8722f96b9d62b31
                                    • Opcode Fuzzy Hash: b8edfc3bb9e23e07aec141b38fc283444eaff5ecff260f13cc31c7f76c37b303
                                    • Instruction Fuzzy Hash: 772160726047459FC310DF78DC89A6FB7E9FBC8701F040A1EB59AC7290DA70E9058BA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetLocaleInfoW.KERNELBASE(00000800,00000003,00000800,00000004), ref: 00C78B80
                                    • __snwprintf_s.LIBCMT ref: 00C78BBB
                                    • LoadLibraryExW.KERNELBASE(?,00000000,00000000), ref: 00C78C06
                                      • Part of subcall function 00D69D23: __getptd_noexit.LIBCMT ref: 00D69D23
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: InfoLibraryLoadLocale__getptd_noexit__snwprintf_s
                                    • String ID: LOC
                                    • API String ID: 3175857669-519433814
                                    • Opcode ID: 11f9e7982730f31974b4ff30776d7d4e06b5a6c7ea377bcfa88fa1eccbf51a9f
                                    • Instruction ID: 864f68db7d15e89f8a32a6b1df2792f6b1188d53e1a80a9f3dc8a6c9c1c3ebdb
                                    • Opcode Fuzzy Hash: 11f9e7982730f31974b4ff30776d7d4e06b5a6c7ea377bcfa88fa1eccbf51a9f
                                    • Instruction Fuzzy Hash: 1221807198121CABDB21FB64DD4ABADB7BCEB00710F0041A6B218AB191DF749B49DF71
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetPrivateProfileStringW.KERNEL32(?,?,00000000,?,00000104,?), ref: 00C64B16
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: PrivateProfileString
                                    • String ID: InstallManager.lang
                                    • API String ID: 1096422788-3526236531
                                    • Opcode ID: bce6ac0398ecf1ea936df99017d1f6f186a38b2eefbdff3a681a65400553e969
                                    • Instruction ID: 5c83b3a4a8f86347556f3934915a7ed99b8f93507d8509f659d5f14c6f059906
                                    • Opcode Fuzzy Hash: bce6ac0398ecf1ea936df99017d1f6f186a38b2eefbdff3a681a65400553e969
                                    • Instruction Fuzzy Hash: EA31ABB1A00A04AFC714DF68CC85A6EB7A9FB98320F24866DE515DB390DA31AD44CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00C7F780
                                    • GetSysColor.USER32(00000016), ref: 00C7F78F
                                    • GetSysColor.USER32(0000000F), ref: 00C7F79C
                                    • GetSysColor.USER32(00000015), ref: 00C7F7AF
                                    • GetSysColor.USER32(0000000F), ref: 00C7F7B7
                                    • GetDeviceCaps.GDI32(?,0000000C), ref: 00C7F7DD
                                    • GetSysColor.USER32(0000000F), ref: 00C7F7EB
                                    • GetSysColor.USER32(00000010), ref: 00C7F7F5
                                    • GetSysColor.USER32(00000015), ref: 00C7F7FF
                                    • GetSysColor.USER32(00000016), ref: 00C7F809
                                    • GetSysColor.USER32(00000014), ref: 00C7F813
                                    • GetSysColor.USER32(00000012), ref: 00C7F81D
                                    • GetSysColor.USER32(00000011), ref: 00C7F827
                                    • GetSysColor.USER32(00000006), ref: 00C7F82E
                                    • GetSysColor.USER32(0000000D), ref: 00C7F835
                                    • GetSysColor.USER32(0000000E), ref: 00C7F83C
                                    • GetSysColor.USER32(00000005), ref: 00C7F843
                                    • GetSysColor.USER32(00000008), ref: 00C7F84D
                                    • GetSysColor.USER32(00000009), ref: 00C7F854
                                    • GetSysColor.USER32(00000007), ref: 00C7F85B
                                    • GetSysColor.USER32(00000002), ref: 00C7F862
                                    • GetSysColor.USER32(00000003), ref: 00C7F869
                                    • GetSysColor.USER32(0000001B), ref: 00C7F870
                                    • GetSysColor.USER32(0000001C), ref: 00C7F87A
                                    • GetSysColor.USER32(0000000A), ref: 00C7F884
                                    • GetSysColor.USER32(0000000B), ref: 00C7F88E
                                    • GetSysColor.USER32(00000013), ref: 00C7F898
                                    • GetSysColor.USER32(0000001A), ref: 00C7F8B2
                                    • GetSysColorBrush.USER32(00000010), ref: 00C7F8CD
                                    • GetSysColorBrush.USER32(00000014), ref: 00C7F8E4
                                    • GetSysColorBrush.USER32(00000005), ref: 00C7F8F6
                                    • CreateSolidBrush.GDI32(?), ref: 00C7F91A
                                    • CreateSolidBrush.GDI32(?), ref: 00C7F936
                                    • CreateSolidBrush.GDI32(?), ref: 00C7F952
                                    • CreateSolidBrush.GDI32(?), ref: 00C7F96E
                                    • CreateSolidBrush.GDI32(00000005), ref: 00C7F98A
                                    • CreateSolidBrush.GDI32(?), ref: 00C7F9A6
                                    • CreateSolidBrush.GDI32(00000028), ref: 00C7F9C2
                                    • CreatePen.GDI32(00000000,00000001,00000000), ref: 00C7F9EB
                                    • CreatePen.GDI32(00000000,00000001,00000000), ref: 00C7FA0E
                                    • CreatePen.GDI32(00000000,00000001,00000000), ref: 00C7FA31
                                    • CreateSolidBrush.GDI32(?), ref: 00C7FAB5
                                    • CreatePatternBrush.GDI32(00000000), ref: 00C7FAF6
                                      • Part of subcall function 00C6DB49: DeleteObject.GDI32(00000000), ref: 00C6DB58
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Color$BrushCreate$Solid$CapsDeleteDeviceH_prolog3ObjectPattern
                                    • String ID:
                                    • API String ID: 3754413814-0
                                    • Opcode ID: d6dfb0a86616eea2fde349b29a38f3f7f92c4119f1487e98934b8e30af76e12b
                                    • Instruction ID: 8d4ae448501d24289bb1376f3afe53f9ef25bff95a1b6620e6f01034ea2c234d
                                    • Opcode Fuzzy Hash: d6dfb0a86616eea2fde349b29a38f3f7f92c4119f1487e98934b8e30af76e12b
                                    • Instruction Fuzzy Hash: BDB16D70A007449FDB34EF75CC95BABBBE0AF84700F01492EE19B96691EE70A545EF60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 653 c66900-c66934 654 c66936-c66951 Sleep 653->654 655 c66978 653->655 656 c66965-c66976 Sleep 654->656 657 c66953-c66963 Sleep 654->657 658 c6697d-c66998 call c685fc 655->658 656->658 657->656 657->657 661 c669a4-c669bc 658->661 662 c6699a-c6699f call c55890 658->662 665 c669e3-c669e7 661->665 666 c669be-c669cc call c685fc 661->666 662->661 668 c66b60 call c69376 665->668 669 c669ed-c66a06 665->669 672 c66b65-c66b95 call c64a60 666->672 673 c669d2-c669dc call c55890 666->673 668->672 676 c66b45-c66b4b 669->676 677 c66a0c-c66a0e 669->677 693 c66b9b-c66ba2 672->693 694 c66da8-c66dc2 Sleep 672->694 682 c669e0 673->682 676->666 678 c66b51-c66b55 676->678 681 c66a13-c66a19 677->681 678->682 683 c66b5b 678->683 685 c66a1b-c66a1e 681->685 686 c66a39-c66a3b 681->686 682->665 683->666 687 c66a35-c66a37 685->687 688 c66a20-c66a28 685->688 689 c66a3e-c66a45 686->689 687->689 688->686 691 c66a2a-c66a33 688->691 689->676 692 c66a4b-c66a5e 689->692 691->681 691->687 705 c66aa7 692->705 706 c66a60-c66a82 692->706 693->694 697 c66ba8-c66bea call c54f30 call c64850 693->697 695 c66dc4-c66dcf Sleep call c62720 694->695 696 c66e09-c66e2a 694->696 704 c66dd4-c66e04 GetWindowRect call c6bfb3 695->704 700 c66e36-c66e4a 696->700 701 c66e2c-c66e31 696->701 717 c66bf6-c66c09 call c54e00 697->717 718 c66bec-c66bf1 697->718 707 c66e56-c66e70 700->707 708 c66e4c-c66e51 700->708 701->700 704->696 709 c66aad-c66ac9 705->709 719 c66a84-c66a90 Sleep call c62720 706->719 720 c66a95-c66aa5 call c53ee0 Sleep 706->720 712 c66e72-c66e77 707->712 713 c66e7c-c66e8f 707->713 708->707 721 c66adc-c66b05 call c5c5d0 Sleep 709->721 722 c66acb-c66ad7 Sleep call c62720 709->722 712->713 729 c66c4d-c66c60 717->729 730 c66c0b-c66c41 call c64850 call c55820 717->730 718->717 719->720 720->709 743 c66b07-c66b13 Sleep call c62720 721->743 744 c66b18-c66b29 721->744 722->721 731 c66c62-c66c84 Sleep * 2 call c62720 729->731 732 c66c90-c66c9d 729->732 730->729 755 c66c43-c66c48 730->755 731->732 735 c66cb0-c66cb7 732->735 736 c66c9f-c66cab Sleep call c62720 732->736 741 c66d2b-c66d37 735->741 742 c66cb9-c66cf0 call c64a60 call c55820 735->742 736->735 746 c66d5b-c66d68 741->746 747 c66d39-c66d56 Sleep * 2 call c62720 741->747 767 c66cf2-c66cf7 742->767 768 c66cfc-c66d17 call c652a0 742->768 743->744 757 c66b2b-c66b36 call d68a16 744->757 758 c66b39-c66b40 Sleep 744->758 752 c66d80-c66d97 746->752 753 c66d6a-c66d7b Sleep call c62720 746->753 747->746 761 c66da3 752->761 762 c66d99-c66d9e 752->762 753->752 755->729 757->758 758->676 761->694 762->761 767->768 768->741 771 c66d19-c66d20 768->771 771->741 772 c66d22-c66d26 call c64b90 771->772 772->741
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Sleep
                                    • String ID: Common$IDS_MSG_VIEW_USERREG$IDS_TITLE_BAR$URLUserReg$URLUserReg_
                                    • API String ID: 3472027048-3833738479
                                    • Opcode ID: a07a573d5bf90aeadc1f93bb0967787f2b790b1c0acebc11b6761f4df5da8e90
                                    • Instruction ID: 7f65e7c3cd013ef1dee9c528616a7bdc72a4bff0a46364d0d6071f6ed26133be
                                    • Opcode Fuzzy Hash: a07a573d5bf90aeadc1f93bb0967787f2b790b1c0acebc11b6761f4df5da8e90
                                    • Instruction Fuzzy Hash: 8AF18F31600742DFD724EBA8CCD2B69B3A5AF88714F148258E525DF3D1DBB1AD41CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 776 cd2580-cd2596 call d69a1c 779 cd259c-cd25af 776->779 780 cd2691-cd2696 call d69af4 776->780 782 cd261e 779->782 783 cd25b1-cd25c3 779->783 784 cd2620-cd2628 782->784 786 cd25c5-cd25cc 783->786 787 cd25d2-cd261c 783->787 788 cd263d-cd264a call ccd960 784->788 789 cd262a-cd262d 784->789 786->787 787->784 797 cd264c-cd2656 call ccec30 788->797 798 cd265b-cd267a call c8193d * 2 788->798 790 cd262f-cd2636 789->790 791 cd2697-cd269d 789->791 793 cd2638 call cd207f 790->793 791->780 794 cd269f-cd26b3 call c8193d 791->794 793->788 794->788 802 cd26b5-cd26bb 794->802 797->798 809 cd267c-cd2681 call cce80c 798->809 810 cd2686-cd268b 798->810 804 cd26c3-cd26cc 802->804 806 cd2952-cd2a27 call c69376 call d69a1c call c6d110 call c685fc call c558b0 call c84f1a call ccdc1e call c84f4d 804->806 807 cd26d2-cd26e2 804->807 866 cd2a5d-cd2a5f 806->866 867 cd2a29-cd2a47 CreateCompatibleDC * 2 806->867 807->806 812 cd26e8-cd2712 call cd085e 807->812 809->810 810->780 818 cd2714-cd2721 call c6db1d 812->818 819 cd2723-cd272b 812->819 818->819 827 cd2755-cd2770 GetObjectW 818->827 822 cd272d-cd2733 819->822 823 cd2742-cd2752 LoadImageW 819->823 822->823 826 cd2735-cd273b 822->826 823->827 826->823 829 cd273d 826->829 830 cd2782-cd2787 827->830 831 cd2772-cd277d call ccdb42 827->831 829->823 834 cd278e-cd2794 830->834 835 cd2789-cd278c 830->835 837 cd291d-cd2947 call cd2aec DeleteObject call c5eb60 831->837 834->837 838 cd279a-cd279d 834->838 835->834 835->838 855 cd26bd-cd26c0 837->855 856 cd294d 837->856 838->837 841 cd27a3-cd27d3 call c6d110 CreateCompatibleDC call c6d81b GetObjectW 838->841 857 cd27d9-cd27e6 SelectObject 841->857 858 cd2911-cd2918 call c6d89c 841->858 855->804 856->788 857->858 861 cd27ec-cd280e CreateCompatibleBitmap 857->861 858->837 863 cd281d-cd2848 call c6d110 CreateCompatibleDC call c6d81b SelectObject 861->863 864 cd2810-cd2818 SelectObject 861->864 880 cd284a-cd285b SelectObject DeleteObject 863->880 881 cd2860-cd2881 BitBlt 863->881 864->858 869 cd2a60-cd2aeb call cd2580 call d69af4 866->869 870 cd2a4d call c6d035 867->870 871 cd2a49-cd2a4b 867->871 873 cd2a52-cd2a5b 870->873 871->870 871->873 873->869 885 cd2905-cd290c call c6d89c 880->885 882 cd28e6-cd2902 SelectObject * 2 DeleteObject 881->882 883 cd2883-cd2889 881->883 882->885 886 cd28db-cd28e4 883->886 887 cd288b-cd28a2 GetPixel 883->887 885->858 886->882 886->883 889 cd28b4-cd28b6 call ccd999 887->889 890 cd28a4-cd28aa 887->890 894 cd28bb-cd28be 889->894 890->889 891 cd28ac-cd28b2 call ccda1b 890->891 891->894 896 cd28d0-cd28d9 894->896 897 cd28c0-cd28ca SetPixel 894->897 896->886 896->887 897->896
                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00CD258A
                                    • LoadImageW.USER32(?,00C6C34D,00000000,00000000,00000000,00002000), ref: 00CD274C
                                    • GetObjectW.GDI32(00C5E24A,00000018,?), ref: 00CD275E
                                    • CreateCompatibleDC.GDI32(00000000), ref: 00CD27B0
                                    • GetObjectW.GDI32(00C5E24A,00000018,?), ref: 00CD27CB
                                    • SelectObject.GDI32(?,00C5E24A), ref: 00CD27DF
                                    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00CD2803
                                    • SelectObject.GDI32(?,?), ref: 00CD2816
                                    • CreateCompatibleDC.GDI32(?), ref: 00CD282C
                                    • SelectObject.GDI32(?,00C6C34D), ref: 00CD2841
                                    • SelectObject.GDI32(?,?), ref: 00CD2850
                                    • DeleteObject.GDI32(00C6C34D), ref: 00CD2855
                                    • BitBlt.GDI32(?,00000000,00000000,00000000,00C75B7C,?,00000000,00000000,00CC0020), ref: 00CD2875
                                    • GetPixel.GDI32(?,?,?), ref: 00CD2894
                                    • SetPixel.GDI32(?,?,?,00000000), ref: 00CD28CA
                                    • SelectObject.GDI32(?,?), ref: 00CD28EC
                                    • SelectObject.GDI32(?,?), ref: 00CD28F4
                                    • DeleteObject.GDI32(00C5E24A), ref: 00CD28F9
                                    • DeleteObject.GDI32(00C5E24A), ref: 00CD292B
                                    • __EH_prolog3.LIBCMT ref: 00CD295F
                                    • CreateCompatibleDC.GDI32(00000000), ref: 00CD2A2A
                                    • CreateCompatibleDC.GDI32(00000000), ref: 00CD2A36
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Object$Select$CompatibleCreate$Delete$H_prolog3Pixel$BitmapImageLoad
                                    • String ID:
                                    • API String ID: 1197801157-3916222277
                                    • Opcode ID: 7b0ab89a73ca4ea8abf02d3ec65340cdbd7d00b776b248714c97929ae65dc77d
                                    • Instruction ID: de0c10caf845ce1b2e240460540a40d18f57b99317e655f02153cbb9be5c3de1
                                    • Opcode Fuzzy Hash: 7b0ab89a73ca4ea8abf02d3ec65340cdbd7d00b776b248714c97929ae65dc77d
                                    • Instruction Fuzzy Hash: 99021670D00319DFCF15EFA4C884AAEBBB5FF18700F14416BE919AA266D7718A45DFA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 898 c534b0-c53508 call d69da0 call c685fc 903 c53514-c5352f 898->903 904 c5350a-c5350f call c55890 898->904 907 c53535-c5353e lstrlenW 903->907 908 c53e99-c53ea0 903->908 904->903 907->908 909 c53544-c53552 call c685fc 907->909 910 c53ea3-c53eb0 908->910 916 c53554-c53559 call c55890 909->916 917 c5355e-c53582 call c685fc 909->917 912 c53eb2-c53eb7 910->912 913 c53ebc 910->913 912->913 915 c53ebe-c53ed9 call d683fc 913->915 916->917 924 c53584-c53589 call c55890 917->924 925 c5358e-c535b2 call c685fc 917->925 924->925 930 c535b4-c535b9 call c55890 925->930 931 c535be-c535e2 call c685fc 925->931 930->931 936 c535e4-c535e9 call c55890 931->936 937 c535ee-c5361f call c554e0 * 2 931->937 936->937 944 c53620-c53629 937->944 944->944 945 c5362b-c5363e call c556f0 944->945 948 c53644-c53649 945->948 949 c53640-c53642 945->949 951 c53650-c53659 948->951 950 c5365f-c53681 call c556f0 949->950 955 c53687-c53697 call d6888b 950->955 956 c5373d-c53741 950->956 951->951 952 c5365b-c5365d 951->952 952->950 955->956 964 c5369d-c536a1 955->964 958 c53747-c53757 call d6888b 956->958 959 c53882-c53890 956->959 970 c53805-c53809 958->970 971 c5375d-c53763 958->971 961 c53892-c53899 959->961 962 c538e9-c538ff call c54bb0 959->962 966 c538cd-c538de call c556f0 961->966 967 c5389b-c5389f 961->967 980 c53905-c5390e PathFileExistsW 962->980 981 c53ae1-c53b72 call c54c10 call d6a760 CreateProcessW 962->981 964->956 969 c536a7-c53702 call c54f30 call c54c30 call c55820 964->969 979 c538e3 966->979 967->966 972 c538a1-c538b6 call c557b0 967->972 1020 c53704-c53709 969->1020 1021 c5370e-c53728 969->1021 970->959 975 c5380b-c5381b call d6888b 970->975 971->970 977 c53769-c537c4 call c54f30 call c54c30 call c55820 971->977 993 c538c2-c538cb 972->993 994 c538b8-c538bf 972->994 975->959 998 c5381d-c53823 975->998 1031 c537c6-c537cb 977->1031 1032 c537d0-c537ea 977->1032 979->962 982 c53914-c53979 call c55420 call c54af0 call c652a0 980->982 983 c53a52-c53aaf call c54c30 call c54af0 call c55820 980->983 1013 c53c8c-c53c8f 981->1013 1014 c53b78-c53bdc call c55420 call c54af0 call c652a0 981->1014 1041 c53985-c5399f 982->1041 1042 c5397b-c53980 982->1042 1036 c53ab1-c53ab6 983->1036 1037 c53abb-c53ad5 983->1037 993->979 994->993 998->959 1004 c53825-c53880 call c54f30 call c54c30 call c55820 call c67bf0 * 2 998->1004 1004->962 1016 c53c95-c53ca7 WaitForSingleObject 1013->1016 1017 c53d89-c53da7 GetExitCodeProcess 1013->1017 1078 c53bde-c53be3 1014->1078 1079 c53be8-c53c02 1014->1079 1027 c53cad-c53d45 call c55420 call c54af0 call c652a0 call c67bf0 * 7 1016->1027 1028 c53d4a-c53d59 lstrlenW 1016->1028 1025 c53db5-c53dc4 1017->1025 1026 c53da9-c53daf 1017->1026 1020->1021 1021->962 1033 c5372e-c53738 1021->1033 1038 c53dc6-c53dc7 FindCloseChangeNotification 1025->1038 1039 c53dc9-c53dd2 1025->1039 1026->1025 1027->913 1028->1017 1043 c53d5b-c53d76 Sleep call c54670 1028->1043 1031->1032 1045 c537f6-c53800 1032->1045 1046 c537ec-c537f1 1032->1046 1033->962 1036->1037 1037->981 1048 c53ad7-c53adc 1037->1048 1038->1039 1049 c53dd4-c53dd5 CloseHandle 1039->1049 1050 c53dd7-c53df1 1039->1050 1052 c539a1-c539a6 1041->1052 1053 c539ab-c539c5 1041->1053 1042->1041 1043->1017 1073 c53d78-c53d87 Sleep call c54670 1043->1073 1045->962 1046->1045 1048->981 1049->1050 1058 c53df3-c53df8 1050->1058 1059 c53dfd-c53e17 1050->1059 1052->1053 1062 c539c7-c539cc 1053->1062 1063 c539d1-c539eb 1053->1063 1058->1059 1067 c53e23-c53e3d 1059->1067 1068 c53e19-c53e1e 1059->1068 1062->1063 1070 c539f7-c53a11 1063->1070 1071 c539ed-c539f2 1063->1071 1075 c53e3f-c53e44 1067->1075 1076 c53e49-c53e5d 1067->1076 1068->1067 1080 c53a13-c53a18 1070->1080 1081 c53a1d-c53a31 1070->1081 1071->1070 1073->1017 1075->1076 1085 c53e5f-c53e64 1076->1085 1086 c53e69-c53e86 1076->1086 1078->1079 1087 c53c04-c53c09 1079->1087 1088 c53c0e-c53c28 1079->1088 1080->1081 1089 c53a33-c53a38 1081->1089 1090 c53a3d-c53a4d 1081->1090 1085->1086 1094 c53e92-c53e97 1086->1094 1095 c53e88-c53e8d 1086->1095 1087->1088 1096 c53c34-c53c48 1088->1096 1097 c53c2a-c53c2f 1088->1097 1089->1090 1090->910 1094->915 1095->1094 1099 c53c54-c53c6e 1096->1099 1100 c53c4a-c53c4f 1096->1100 1097->1096 1102 c53c70-c53c75 1099->1102 1103 c53c7a-c53c84 1099->1103 1100->1099 1102->1103 1103->1013
                                    APIs
                                    • lstrlenW.KERNEL32(?,?,?,?,00D8E4C1,000000FF,?,00C533BB,?,?,00DBD1F8,00000001,?,?,?,18846CE9), ref: 00C53536
                                    • PathFileExistsW.KERNELBASE(?), ref: 00C53906
                                    • _memset.LIBCMT ref: 00C53B03
                                    • CreateProcessW.KERNELBASE ref: 00C53B6A
                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00C53C9E
                                    • lstrlenW.KERNEL32(?), ref: 00C53D51
                                    • Sleep.KERNEL32(000001F4), ref: 00C53D66
                                    • Sleep.KERNEL32(00001388,?), ref: 00C53D7D
                                      • Part of subcall function 00C652A0: MessageBoxExW.USER32(00000000,?,00C53CF8,00000010,00000000), ref: 00C652D7
                                    • GetExitCodeProcess.KERNELBASE(?,?), ref: 00C53D97
                                    • FindCloseChangeNotification.KERNELBASE(?), ref: 00C53DC7
                                    • CloseHandle.KERNEL32(?), ref: 00C53DD5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CloseProcessSleeplstrlen$ChangeCodeCreateExistsExitFileFindHandleMessageNotificationObjectPathSingleWait_memset
                                    • String ID: .bat$.msi$.reg$CreateProcess::ExecuteInstall: Not FilePath = $D$Error$NG ExecuteInstall::CreateProcess $NG ExecuteInstall::WaitForSingleObject$msiexec.exe /i "$regedit.exe /s "
                                    • API String ID: 2269754158-2810140960
                                    • Opcode ID: c167e11ecbb1ad679f0346ed815e591c368f6c87de2ca3876c2c5615721db015
                                    • Instruction ID: 7a8c090d76f5ad9f3665e56558e4ac37e8150ead265af1542c19403bab0bd961
                                    • Opcode Fuzzy Hash: c167e11ecbb1ad679f0346ed815e591c368f6c87de2ca3876c2c5615721db015
                                    • Instruction Fuzzy Hash: 9B62DD74A006849FD714CB2CCC81AD9B3B4BF95320F1483D8E4699B2E1DB70AF89DB64
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1115 c71986-c719af call c6eaf8 1118 c719b6-c719bb 1115->1118 1119 c719b1-c719b4 1115->1119 1120 c719bd-c719c6 GetParent 1118->1120 1121 c719c8-c719cd GetWindow 1118->1121 1122 c719ed-c71a25 GetWindowRect 1119->1122 1123 c719d3-c719d7 1120->1123 1121->1123 1124 c71abe-c71ae5 GetParent GetClientRect * 2 MapWindowPoints 1122->1124 1125 c71a2b-c71a2d 1122->1125 1123->1122 1127 c719d9-c719e9 SendMessageW 1123->1127 1126 c71aeb-c71b2e 1124->1126 1128 c71a2f-c71a3d GetWindowLongW 1125->1128 1129 c71a48-c71a51 1125->1129 1130 c71b30-c71b36 1126->1130 1131 c71b38-c71b3b 1126->1131 1127->1122 1132 c719eb 1127->1132 1133 c71a46 1128->1133 1134 c71a3f-c71a44 1128->1134 1135 c71a53-c71a5a call c68390 1129->1135 1136 c71a8f-c71abc GetWindowRect MonitorFromWindow GetMonitorInfoW CopyRect 1129->1136 1130->1131 1137 c71b40-c71b48 1131->1137 1138 c71b3d 1131->1138 1132->1122 1133->1129 1134->1129 1134->1133 1145 c71a5f-c71a8d MonitorFromWindow GetMonitorInfoW CopyRect * 2 1135->1145 1146 c71a5c 1135->1146 1136->1126 1140 c71b53-c71b56 1137->1140 1141 c71b4a-c71b50 1137->1141 1138->1137 1143 c71b5b-c71b68 call c6ee73 1140->1143 1144 c71b58 1140->1144 1141->1140 1148 c71b6d-c71b7b call d683fc 1143->1148 1144->1143 1145->1126 1146->1145
                                    APIs
                                      • Part of subcall function 00C6EAF8: GetWindowLongW.USER32(?,000000F0), ref: 00C6EB03
                                    • GetParent.USER32(?), ref: 00C719C0
                                    • SendMessageW.USER32(00000000,0000036B,00000000,00000000), ref: 00C719E1
                                    • GetWindowRect.USER32(?,?), ref: 00C71A00
                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00C71A32
                                    • MonitorFromWindow.USER32(00000000,00000001), ref: 00C71A66
                                    • GetMonitorInfoW.USER32(00000000), ref: 00C71A6D
                                    • CopyRect.USER32(?,?), ref: 00C71A81
                                    • CopyRect.USER32(?,?), ref: 00C71A8B
                                    • GetWindowRect.USER32(00000000,?), ref: 00C71A94
                                    • MonitorFromWindow.USER32(00000000,00000002), ref: 00C71AA1
                                    • GetMonitorInfoW.USER32(00000000), ref: 00C71AA8
                                    • CopyRect.USER32(?,?), ref: 00C71AB6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$Rect$Monitor$Copy$FromInfoLong$MessageParentSend
                                    • String ID: (
                                    • API String ID: 783970248-3887548279
                                    • Opcode ID: 9e3f050a557ee04f95e20ba480509a2d32404b115d89d6fa2377da2950983696
                                    • Instruction ID: abcf5aa5fa785294bfdfe2425d46f93cd7d2118ad9944ce29ec7b1d55fde7938
                                    • Opcode Fuzzy Hash: 9e3f050a557ee04f95e20ba480509a2d32404b115d89d6fa2377da2950983696
                                    • Instruction Fuzzy Hash: 8461FB71D01229ABCB11DFE9DD899EEBBB9FF08710F184116E915F7250D770AA05CBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1151 c64c50-c64ca7 call c685fc 1154 c64cb3-c64cff call c554e0 call c55420 GetModuleHandleW 1151->1154 1155 c64ca9-c64cae call c55890 1151->1155 1162 c64d23-c64d29 1154->1162 1163 c64d01-c64d11 GetProcAddress 1154->1163 1155->1154 1165 c64d2b-c64d31 1162->1165 1166 c64d48-c64d62 RegOpenKeyExW 1162->1166 1163->1162 1164 c64d13-c64d20 GetCurrentProcess 1163->1164 1164->1162 1165->1166 1169 c64d33-c64d43 call c5daf0 1165->1169 1167 c64e84-c64e8c 1166->1167 1168 c64d68-c64d76 call c685fc 1166->1168 1172 c64e95-c64eae 1167->1172 1173 c64e8e-c64e8f RegCloseKey 1167->1173 1177 c64d82-c64d9c 1168->1177 1178 c64d78-c64d7d call c55890 1168->1178 1169->1166 1175 c64eb0-c64eb5 1172->1175 1176 c64eba-c64eda call d683fc 1172->1176 1173->1172 1175->1176 1183 c64df7-c64e2a RegQueryValueExW 1177->1183 1184 c64d9e-c64da1 1177->1184 1178->1177 1185 c64e47-c64e50 1183->1185 1187 c64e2c-c64e3e 1183->1187 1184->1185 1186 c64da7-c64de0 RegQueryValueExW 1184->1186 1188 c64e64-c64e78 1185->1188 1189 c64e52-c64e5f call c55820 1185->1189 1186->1185 1190 c64de2-c64df5 1186->1190 1191 c64e3f-c64e44 call c54d90 1187->1191 1188->1167 1194 c64e7a-c64e7f 1188->1194 1189->1188 1190->1191 1191->1185 1194->1167
                                    APIs
                                    • GetModuleHandleW.KERNEL32(kernel32,SOFTWARE\Microsoft\Windows NT\CurrentVersion), ref: 00C64CF7
                                    • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00C64D07
                                    • GetCurrentProcess.KERNEL32(?), ref: 00C64D1A
                                    • RegOpenKeyExW.KERNELBASE(80000002,?,00000000,00000001,?), ref: 00C64D5A
                                    • RegQueryValueExW.KERNELBASE(?,00000009,00000000,00000001,?,?), ref: 00C64DD8
                                    • RegQueryValueExW.KERNELBASE(?,00000009,00000000,00000001,?,?), ref: 00C64E22
                                    • RegCloseKey.ADVAPI32(?), ref: 00C64E8F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: QueryValue$AddressCloseCurrentHandleModuleOpenProcProcess
                                    • String ID: $IsWow64Process$SOFTWARE\$SOFTWARE\Microsoft\Windows NT\CurrentVersion$SOFTWARE\Wow6432Node\$kernel32
                                    • API String ID: 3667490055-2689466125
                                    • Opcode ID: cb683f678e509f923d3079ae1aac5232064079655345cf49e7f73ceaa561148e
                                    • Instruction ID: 7cc2ffc9e3f2b1589c19ba6a93e86b4f820456ad8d8b69c2f3b6aeaa99d074dd
                                    • Opcode Fuzzy Hash: cb683f678e509f923d3079ae1aac5232064079655345cf49e7f73ceaa561148e
                                    • Instruction Fuzzy Hash: 45715D71901219AFDB24DFA8DCC9AADB7B9FF48310F1082A9E519D7291D7309E85CF60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1196 c7914f-c79188 call c710ac 1199 c7918e-c7919e GetProcAddress 1196->1199 1200 c79239-c792b6 GetUserDefaultUILanguage ConvertDefaultLocale * 2 GetSystemDefaultUILanguage ConvertDefaultLocale * 2 1196->1200 1199->1200 1201 c791a4-c791ed call d6a760 1199->1201 1202 c792c4-c792c8 1200->1202 1203 c792b8-c792c3 1200->1203 1201->1200 1215 c791ef-c791fc 1201->1215 1204 c792ed 1202->1204 1205 c792ca-c792dd call c78b33 1202->1205 1203->1202 1208 c792ef-c792fd call d683fc 1204->1208 1210 c792e2-c792e6 1205->1210 1210->1208 1213 c792e8-c792eb 1210->1213 1213->1204 1213->1205 1215->1200 1216 c791fe-c79201 1215->1216 1216->1200 1217 c79203-c79214 call d6c8b8 1216->1217 1220 c79216-c7921e call d69d23 1217->1220 1221 c79228-c79237 call d694de 1217->1221 1220->1221 1226 c79220-c79227 1220->1226 1221->1200 1221->1216 1226->1221
                                    APIs
                                      • Part of subcall function 00C710AC: ActivateActCtx.KERNEL32(?,?,00DCB098,00000010,00CACCBA,UxTheme.dll,75FD6BA0,?,00CACD7B,00000004,00C8337D,00000000,00000004,00CCE78D), ref: 00C710CC
                                    • GetProcAddress.KERNEL32(00000000,GetThreadPreferredUILanguages), ref: 00C79194
                                    • _memset.LIBCMT ref: 00C791C0
                                    • _wcstoul.LIBCMT ref: 00C79208
                                    • _wcslen.LIBCMT ref: 00C79229
                                      • Part of subcall function 00D69D23: __getptd_noexit.LIBCMT ref: 00D69D23
                                    • GetUserDefaultUILanguage.KERNEL32 ref: 00C79239
                                    • ConvertDefaultLocale.KERNELBASE(?), ref: 00C79260
                                    • ConvertDefaultLocale.KERNELBASE(?), ref: 00C7926F
                                    • GetSystemDefaultUILanguage.KERNEL32 ref: 00C79278
                                    • ConvertDefaultLocale.KERNEL32(?), ref: 00C79294
                                    • ConvertDefaultLocale.KERNEL32(?), ref: 00C792A3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Default$ConvertLocale$Language$ActivateAddressProcSystemUser__getptd_noexit_memset_wcslen_wcstoul
                                    • String ID: GetThreadPreferredUILanguages$KERNEL32.DLL$e
                                    • API String ID: 2962385649-2285706205
                                    • Opcode ID: 84cde5e8bbbd516f51d376172e00c675a8fe8e938e91751a9312bf14b43e1e63
                                    • Instruction ID: 979aca9003524dc9645e5962ac205ba111c2c48835bfd29ddad8b345c8a28439
                                    • Opcode Fuzzy Hash: 84cde5e8bbbd516f51d376172e00c675a8fe8e938e91751a9312bf14b43e1e63
                                    • Instruction Fuzzy Hash: B441A771901328ABDB24AF64DC85BEE77B8EF45710F1144AAE50DE3241DB749E85CF60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1227 c7ba0d-c7ba1f 1228 c7ba26-c7ba69 call d6a760 call c6b7ef CreateEventW * 2 1227->1228 1229 c7ba21 call c69376 1227->1229 1235 c7bb05-c7bb08 1228->1235 1236 c7ba6f-c7ba72 1228->1236 1229->1228 1239 c7bb0f 1235->1239 1240 c7bb0a-c7bb0d CloseHandle 1235->1240 1237 c7bb00-c7bb03 CloseHandle 1236->1237 1238 c7ba78-c7ba9c call d6cb81 1236->1238 1237->1235 1244 c7ba9e-c7baaa CloseHandle * 2 1238->1244 1245 c7baac-c7bacd ResumeThread WaitForSingleObject FindCloseChangeNotification 1238->1245 1241 c7bb11-c7bb15 1239->1241 1240->1239 1244->1239 1246 c7bacf-c7bad2 Wow64SuspendThread 1245->1246 1247 c7bad8-c7badb 1245->1247 1246->1247 1248 c7baf2-c7bafe SetEvent 1247->1248 1249 c7badd-c7baf0 WaitForSingleObject CloseHandle 1247->1249 1248->1241 1249->1240
                                    APIs
                                    • _memset.LIBCMT ref: 00C7BA2D
                                    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,00C66E90,00000000,00000000,00000000,00000000,00000000), ref: 00C7BA4B
                                    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,00C66E90,00000000,00000000,00000000,00000000,00000000), ref: 00C7BA55
                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00C66E90,00000000,00000000,00000000,00000000), ref: 00C7BAA3
                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00C66E90,00000000,00000000,00000000,00000000), ref: 00C7BAA8
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    • ResumeThread.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,00C66E90,00000000,00000000,00000000,00000000), ref: 00C7BAAD
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,00C66E90,00000000,00000000,00000000), ref: 00C7BAB8
                                    • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,00C66E90,00000000,00000000,00000000,00000000), ref: 00C7BAC7
                                    • Wow64SuspendThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00C66E90,00000000,00000000,00000000), ref: 00C7BAD2
                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,00C66E90,00000000,00000000,00000000), ref: 00C7BAE2
                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00C66E90,00000000,00000000,00000000), ref: 00C7BAEB
                                    • SetEvent.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,00C66E90,00000000,00000000,00000000), ref: 00C7BAF5
                                    • CloseHandle.KERNEL32(00000000,?,00C66E90,00000000,00000000,00000000,00000000,00000000), ref: 00C7BB0D
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Close$Handle$Event$CreateObjectSingleThreadWait$ChangeException@8FindH_prolog3NotificationResumeSuspendThrowWow64_memset
                                    • String ID:
                                    • API String ID: 312348704-0
                                    • Opcode ID: 3d7ef49de3094a035ec7bd72e6af043f1199cfcce23c5647c450aa00f0040f6c
                                    • Instruction ID: 32a7b70281ed8afe4a0bf5d4047e4d17de7e01e3869167c162d0c6cdee03a102
                                    • Opcode Fuzzy Hash: 3d7ef49de3094a035ec7bd72e6af043f1199cfcce23c5647c450aa00f0040f6c
                                    • Instruction Fuzzy Hash: DA316B72C00209BFCB11AFA5DC84DAEBBB9EF48350F14852AF529A2260D7319E41DF60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1250 c80e52-c80e97 call c6bdd2 GetModuleFileNameW 1253 c80e99-c80e9b 1250->1253 1254 c80e9d call c6d051 1250->1254 1253->1254 1255 c80ea2-c80eb7 PathFindExtensionW 1253->1255 1254->1255 1257 c80eb9 call c6d051 1255->1257 1258 c80ebe-c80edf call c80e0c 1255->1258 1257->1258 1262 c80ee1 call c6d051 1258->1262 1263 c80ee6-c80eea 1258->1263 1262->1263 1265 c80eec-c80efe call d68ba1 1263->1265 1266 c80f05-c80f09 1263->1266 1265->1266 1278 c80f00 call c6933e 1265->1278 1267 c80f0b-c80f1c call c6945b 1266->1267 1268 c80f3e-c80f42 1266->1268 1274 c80f21-c80f23 1267->1274 1271 c80f7d-c80f87 1268->1271 1272 c80f44-c80f5c call c6945b 1268->1272 1275 c80f89-c80fa1 1271->1275 1276 c80fe7-c80feb 1271->1276 1291 c80f5e-c80f6e call d68ba1 1272->1291 1292 c80f70 1272->1292 1282 c80f2e 1274->1282 1283 c80f25-c80f2c 1274->1283 1284 c80faa 1275->1284 1285 c80fa3-c80fa8 1275->1285 1279 c80fed-c81019 call d6c8d2 call c55150 call d68ba1 1276->1279 1280 c8101f-c8102d call d683fc 1276->1280 1278->1266 1279->1278 1279->1280 1288 c80f31-c80f3c call d68ba1 1282->1288 1283->1288 1289 c80faf-c80fd6 call d69b26 call c55150 call d68ba1 1284->1289 1285->1289 1288->1268 1288->1278 1289->1278 1310 c80fdc-c80fe4 1289->1310 1294 c80f77-c80f7b 1291->1294 1292->1294 1294->1271 1294->1278 1310->1276
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: __wcsdup$ExtensionFileFindModuleNamePath
                                    • String ID: .CHM$.HLP$.INI
                                    • API String ID: 2477486372-4017452060
                                    • Opcode ID: 7a6ff031a08cc795b85b25fb098e8b86d93fc9305dff2bbd73c4a964dda10da0
                                    • Instruction ID: 72b4beb61156c3b1e4344beded45e1046a7426f9f6551d74c311d98457db1bc3
                                    • Opcode Fuzzy Hash: 7a6ff031a08cc795b85b25fb098e8b86d93fc9305dff2bbd73c4a964dda10da0
                                    • Instruction Fuzzy Hash: 7C5152709007189FDB70EBB4CD45BAA73FCEF04718F108969A596D6141EF70EA88CB65
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • SendMessageW.USER32(?,00000080,00000001,?), ref: 00C5E262
                                    • SendMessageW.USER32(?,00000080,00000000,?), ref: 00C5E277
                                      • Part of subcall function 00C5E650: _swscanf.LIBCMT ref: 00C5E69F
                                      • Part of subcall function 00C5E8A0: GetWindowLongW.USER32(?,000000EC), ref: 00C5E8A7
                                      • Part of subcall function 00C5E8A0: SetWindowLongW.USER32(?,000000EC,00000000), ref: 00C5E8C8
                                      • Part of subcall function 00C5E8A0: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000037,?,00000000,00C5E2A7), ref: 00C5E8D6
                                    • EnumChildWindows.USER32(?,00C5E7E0), ref: 00C5E2B6
                                    • GetWindowRect.USER32(?,?), ref: 00C5E2D8
                                    • SetRect.USER32(?,?,?,?,?), ref: 00C5E2FB
                                    • GetWindowThreadProcessId.USER32(?,?), ref: 00C5E32A
                                    • GetForegroundWindow.USER32 ref: 00C5E32F
                                    • GetWindowThreadProcessId.USER32(00000000,?), ref: 00C5E33D
                                    • AttachThreadInput.USER32(00000000,?,00000001), ref: 00C5E34E
                                    • KiUserCallbackDispatcher.NTDLL(?), ref: 00C5E355
                                    • SetFocus.USER32(?), ref: 00C5E35C
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$Thread$LongMessageProcessRectSend$AttachCallbackChildDispatcherEnumFocusForegroundInputUserWindows_swscanf
                                    • String ID:
                                    • API String ID: 1238074956-0
                                    • Opcode ID: ac76724de910884ba8424047937ba445f25ca906273ab28f83b2026a9817ba27
                                    • Instruction ID: 37c8cfa9dc1a25ec1732958cdbc266d0d3a04ae853fc9e14d9b4462593fadd30
                                    • Opcode Fuzzy Hash: ac76724de910884ba8424047937ba445f25ca906273ab28f83b2026a9817ba27
                                    • Instruction Fuzzy Hash: 174107B5A00309AFDB14DFA5CC85EBFB7B9FB88701F00451EF546A7250CA74A945CBA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1332 c7e105-c7e126 EnterCriticalSection 1333 c7e135-c7e13a 1332->1333 1334 c7e128-c7e12f 1332->1334 1336 c7e157-c7e15f 1333->1336 1337 c7e13c-c7e13f 1333->1337 1334->1333 1335 c7e1f3-c7e1f6 1334->1335 1339 c7e1fe-c7e21c LeaveCriticalSection 1335->1339 1340 c7e1f8-c7e1fb 1335->1340 1341 c7e176-c7e19a GlobalHandle GlobalUnlock call c6868e GlobalReAlloc 1336->1341 1342 c7e161-c7e174 call c6868e GlobalAlloc 1336->1342 1338 c7e142-c7e145 1337->1338 1343 c7e147-c7e14d 1338->1343 1344 c7e14f-c7e151 1338->1344 1340->1339 1349 c7e1a0-c7e1a2 1341->1349 1342->1349 1343->1338 1343->1344 1344->1335 1344->1336 1350 c7e1c7-c7e1f0 GlobalLock call d6a760 1349->1350 1351 c7e1a4-c7e1a9 1349->1351 1350->1335 1352 c7e1ab-c7e1b3 GlobalHandle GlobalLock 1351->1352 1353 c7e1b9-c7e1c2 LeaveCriticalSection call c6933e 1351->1353 1352->1353 1353->1350
                                    APIs
                                    • EnterCriticalSection.KERNEL32(00DE6544,?,?,00000000,00DE6528,00DE6528,?,00C7E540,00000004,00C6BDE1,00C69392,00C694C8,00C55491,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5), ref: 00C7E118
                                    • GlobalAlloc.KERNELBASE(00000002,00000000,?,00000000,00DE6528,00DE6528,?,00C7E540,00000004,00C6BDE1,00C69392,00C694C8,00C55491,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5), ref: 00C7E16E
                                    • GlobalHandle.KERNEL32(006B2840), ref: 00C7E177
                                    • GlobalUnlock.KERNEL32(00000000,?,00000000,00DE6528,00DE6528,?,00C7E540,00000004,00C6BDE1,00C69392,00C694C8,00C55491,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5,SOFTWARE\Microsoft\Windows NT\CurrentVersion), ref: 00C7E181
                                    • GlobalReAlloc.KERNEL32(?,00000000,00002002), ref: 00C7E19A
                                    • GlobalHandle.KERNEL32(006B2840), ref: 00C7E1AC
                                    • GlobalLock.KERNEL32(00000000,?,00000000,00DE6528,00DE6528,?,00C7E540,00000004,00C6BDE1,00C69392,00C694C8,00C55491,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5,SOFTWARE\Microsoft\Windows NT\CurrentVersion), ref: 00C7E1B3
                                    • LeaveCriticalSection.KERNEL32(00000000,?,00000000,00DE6528,00DE6528,?,00C7E540,00000004,00C6BDE1,00C69392,00C694C8,00C55491,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5,SOFTWARE\Microsoft\Windows NT\CurrentVersion), ref: 00C7E1BC
                                    • GlobalLock.KERNEL32(00000000,?,00000000,00DE6528,00DE6528,?,00C7E540,00000004,00C6BDE1,00C69392,00C694C8,00C55491,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5,SOFTWARE\Microsoft\Windows NT\CurrentVersion), ref: 00C7E1C8
                                    • _memset.LIBCMT ref: 00C7E1E2
                                    • LeaveCriticalSection.KERNEL32(00000000), ref: 00C7E210
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock_memset
                                    • String ID:
                                    • API String ID: 496899490-0
                                    • Opcode ID: a4914fb41324bc17f6672642ef4f65b847be89d77235f9350a88b7e6dfd76a07
                                    • Instruction ID: 67cc924f038459753593c514c09c3bd53e1f8020e7875288edf8069bad7183b6
                                    • Opcode Fuzzy Hash: a4914fb41324bc17f6672642ef4f65b847be89d77235f9350a88b7e6dfd76a07
                                    • Instruction Fuzzy Hash: A9318F72600704BFD7209F68CC8AA6A7BF9FF48301B45896EE55AD3651DB34F904CB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1357 c5c5d0-c5c608 1358 c5c6ad-c5c6b9 call c5c930 1357->1358 1359 c5c60e-c5c65c call c51d90 * 2 call c534b0 1357->1359 1364 c5c753-c5c78a call c55820 1358->1364 1365 c5c6bf-c5c6c1 1358->1365 1376 c5c664-c5c67b 1359->1376 1377 c5c65e-c5c661 1359->1377 1382 c5c796-c5c7de call c54af0 call c55820 1364->1382 1383 c5c78c-c5c791 1364->1383 1365->1364 1367 c5c6c7-c5c721 call c51d90 * 2 call c534b0 1365->1367 1389 c5c723-c5c728 1367->1389 1390 c5c72d-c5c747 1367->1390 1380 c5c687-c5c6a1 1376->1380 1381 c5c67d-c5c682 1376->1381 1377->1376 1380->1358 1385 c5c6a3-c5c6a8 1380->1385 1381->1380 1395 c5c7e0-c5c7e5 1382->1395 1396 c5c7ea-c5c7ff 1382->1396 1383->1382 1385->1358 1389->1390 1390->1364 1392 c5c749-c5c74e 1390->1392 1392->1364 1395->1396 1397 c5c801-c5c806 1396->1397 1398 c5c80b-c5c856 call c54af0 call c55820 1396->1398 1397->1398 1404 c5c862-c5c875 1398->1404 1405 c5c858-c5c85d 1398->1405 1406 c5c877-c5c87c 1404->1406 1407 c5c881-c5c88e call c532d0 1404->1407 1405->1404 1406->1407 1410 c5c915-c5c928 1407->1410 1411 c5c894-c5c896 1407->1411 1411->1410 1412 c5c898-c5c909 call c55420 RegCreateKeyExW RegSetValueExW RegCloseKey 1411->1412 1412->1410 1415 c5c90b-c5c910 1412->1415 1415->1410
                                    APIs
                                      • Part of subcall function 00C534B0: lstrlenW.KERNEL32(?,?,?,?,00D8E4C1,000000FF,?,00C533BB,?,?,00DBD1F8,00000001,?,?,?,18846CE9), ref: 00C53536
                                    • RegCreateKeyExW.ADVAPI32(80000002,00000000,00000000,00000000,00000000,0002001F,00000000,?,?,SOFTWARE\Brother Industries, Ltd.\CableLabel,00000000), ref: 00C5C8CA
                                    • RegSetValueExW.ADVAPI32(?,dwExitCode,00000000,00000004,00000001,00000004), ref: 00C5C8E9
                                    • RegCloseKey.ADVAPI32(?), ref: 00C5C8F0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CloseCreateValuelstrlen
                                    • String ID: ADECmdOp$ADEFilePath$DotNETCmdOp$DotNETFilePath$SOFTWARE\Brother Industries, Ltd.\CableLabel$dwExitCode
                                    • API String ID: 1356686001-3097515627
                                    • Opcode ID: b2b7d3ac64a149b895300826f8ea11616519b386d4c097bf02b5d1f62e4e0ad4
                                    • Instruction ID: 27df9eb2e4760c3549b1ff64ffd8d133ebe6cf8d0927c11badae4073499a511b
                                    • Opcode Fuzzy Hash: b2b7d3ac64a149b895300826f8ea11616519b386d4c097bf02b5d1f62e4e0ad4
                                    • Instruction Fuzzy Hash: 34C1A475A00605DFD704CB6CCC81BAAB7B5FF89325F248258E5259B3D1DB70AE49CBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1416 c5eeb0-c5ef67 call c5e230 call c718f8 call c6ec4f * 2 CreateFontW call c6daef SendMessageW call c685fc 1429 c5ef73-c5efde call c5e4d0 call c5e390 call c64a60 call c55820 1416->1429 1430 c5ef69-c5ef6e call c55890 1416->1430 1441 c5efe0-c5efe5 1429->1441 1442 c5efea-c5eff1 call c655e0 1429->1442 1430->1429 1441->1442 1445 c5eff7-c5effd 1442->1445 1446 c5f138-c5f13f call c6ec4f 1442->1446 1445->1446 1447 c5f003-c5f057 call c65700 call c6ec4f call c64a60 call c6eb84 1445->1447 1450 c5f144-c5f14f call c6eb84 1446->1450 1466 c5f063-c5f0e0 call c5e390 call c64a60 call c54c30 call c54af0 call c55820 1447->1466 1467 c5f059-c5f05e 1447->1467 1454 c5f154-c5f172 call c718f8 1450->1454 1460 c5f174-c5f179 1454->1460 1461 c5f17e-c5f1ad call c5eb60 1454->1461 1460->1461 1478 c5f0e2-c5f0e7 1466->1478 1479 c5f0ec-c5f105 1466->1479 1467->1466 1478->1479 1480 c5f107-c5f10c 1479->1480 1481 c5f111-c5f12a 1479->1481 1480->1481 1481->1450 1482 c5f12c-c5f136 1481->1482 1482->1450
                                    APIs
                                      • Part of subcall function 00C5E230: SendMessageW.USER32(?,00000080,00000001,?), ref: 00C5E262
                                      • Part of subcall function 00C5E230: SendMessageW.USER32(?,00000080,00000000,?), ref: 00C5E277
                                      • Part of subcall function 00C5E230: EnumChildWindows.USER32(?,00C5E7E0), ref: 00C5E2B6
                                      • Part of subcall function 00C5E230: GetWindowRect.USER32(?,?), ref: 00C5E2D8
                                      • Part of subcall function 00C5E230: SetRect.USER32(?,?,?,?,?), ref: 00C5E2FB
                                      • Part of subcall function 00C5E230: GetWindowThreadProcessId.USER32(?,?), ref: 00C5E32A
                                      • Part of subcall function 00C5E230: GetForegroundWindow.USER32 ref: 00C5E32F
                                      • Part of subcall function 00C5E230: GetWindowThreadProcessId.USER32(00000000,?), ref: 00C5E33D
                                      • Part of subcall function 00C5E230: AttachThreadInput.USER32(00000000,?,00000001), ref: 00C5E34E
                                      • Part of subcall function 00C5E230: KiUserCallbackDispatcher.NTDLL(?), ref: 00C5E355
                                      • Part of subcall function 00C718F8: __EH_prolog3_catch.LIBCMT ref: 00C718FF
                                      • Part of subcall function 00C6EC4F: ShowWindow.USER32(?,?), ref: 00C6EC60
                                    • CreateFontW.GDI32(00000030,00000000,00000000,00000000,00000384,00000000,00000000,00000000,00000080,00000000,00000000,00000000,00000000,MS Shell Dlg), ref: 00C5EF33
                                    • SendMessageW.USER32(?,00000030,?,00000001), ref: 00C5EF53
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$MessageSendThread$ProcessRect$AttachCallbackChildCreateDispatcherEnumFontForegroundH_prolog3_catchInputShowUserWindows
                                    • String ID: IDD_FINISH$IDS_CLOSE$IDS_FINISH$IDS_MSG_INST_FINISH$IDS_MSG_RESTART$IDS_RESTART$MS Shell Dlg
                                    • API String ID: 170999930-3721541464
                                    • Opcode ID: 0ee19f9b7a3510c9d96b5a0671af08227951959b769705bab73c137abb228540
                                    • Instruction ID: b59c6dac4aee8a28e1154ecedc0955fcf01976b2e08debf49a07e722cf512355
                                    • Opcode Fuzzy Hash: 0ee19f9b7a3510c9d96b5a0671af08227951959b769705bab73c137abb228540
                                    • Instruction Fuzzy Hash: 33919075204740AFD314DB28CC82F5BB7A8AFD5720F14871CF4668B2E2DB70A909CB65
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1484 c65010-c6505d call c55420 GetModuleHandleW 1487 c6507e-c65082 1484->1487 1488 c6505f-c6506f GetProcAddress 1484->1488 1490 c65096-c650af RegOpenKeyExW 1487->1490 1491 c65084-c65091 call c5daf0 1487->1491 1488->1487 1489 c65071-c6507b GetCurrentProcess 1488->1489 1489->1487 1492 c650b1-c650b9 RegDeleteValueW 1490->1492 1493 c650bf-c650d9 1490->1493 1491->1490 1492->1493 1495 c650e5-c650f4 1493->1495 1496 c650db-c650e0 1493->1496 1496->1495
                                    APIs
                                    • GetModuleHandleW.KERNEL32(kernel32,18846CE9), ref: 00C65055
                                    • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00C65065
                                    • GetCurrentProcess.KERNEL32(00000000), ref: 00C65075
                                    • RegOpenKeyExW.KERNELBASE(80000002,18846CE9,00000000,00000002,?), ref: 00C650A7
                                    • RegDeleteValueW.ADVAPI32(?,00000000), ref: 00C650B9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AddressCurrentDeleteHandleModuleOpenProcProcessValue
                                    • String ID: IsWow64Process$SOFTWARE\$SOFTWARE\Wow6432Node\$kernel32
                                    • API String ID: 1182271146-2675555200
                                    • Opcode ID: 2e795975386ef0c567fe4af72c91dd5c9631e3c6cc33060a758bf0f2332ffec0
                                    • Instruction ID: dc1da7d6ad45adbb1a0340e4ac808c267b2c6fb9c1a2aa5de3668d223953ed9e
                                    • Opcode Fuzzy Hash: 2e795975386ef0c567fe4af72c91dd5c9631e3c6cc33060a758bf0f2332ffec0
                                    • Instruction Fuzzy Hash: EB214F75601605EFD724DF68CC85FAAB7B8FB45721F108219F825972D0DB70EA04CBA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: -------------------------------------$Common$DefaultInstFolder$IDS_CANCEL$IDS_GOOGLE_ANALYTICS$IDS_OK_BTN$IDS_SEND_INFO
                                    • API String ID: 0-1711126641
                                    • Opcode ID: 202f9173ab243c9da63684fcb5bfec7d13d492b88671ca1497da7ebdb338ebf7
                                    • Instruction ID: fa770d910c3d43d5afe719242676aecdde987e3099980280208484dc3c614eb7
                                    • Opcode Fuzzy Hash: 202f9173ab243c9da63684fcb5bfec7d13d492b88671ca1497da7ebdb338ebf7
                                    • Instruction Fuzzy Hash: BF32C474A00601DFD704DB6CC891B9EB7B5BF95321F24836CE4259B2E5DB30AE4ACB54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    • __wfopen_s.LIBCMT ref: 00C677A2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Exception@8H_prolog3Throw__wfopen_s
                                    • String ID: -------------------------------------$Common$DefaultInstFolder$IDS_AGREEMENT$IDS_CANCEL$IDS_LICENSE_TITLE$rt,ccs=UNICODE
                                    • API String ID: 1606487454-1016355466
                                    • Opcode ID: 82b295f7a9de8276014d852b43a01692bef8255975ebda66bc4b8443311ae8dd
                                    • Instruction ID: 7ce7c4b14f24c49eb0d997c2ceb6e13667a57b06fc0e55cb4430243bb96724b2
                                    • Opcode Fuzzy Hash: 82b295f7a9de8276014d852b43a01692bef8255975ebda66bc4b8443311ae8dd
                                    • Instruction Fuzzy Hash: 2C229C712087418FD314DB68C881B5AB7E5BFD9328F148B5CF4668B2E1DB70E949CB92
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C79548: __EH_prolog3.LIBCMT ref: 00C7954F
                                      • Part of subcall function 00C79548: __wcsdup.LIBCMT ref: 00C79571
                                      • Part of subcall function 00C79548: GetCurrentThread.KERNEL32 ref: 00C7959E
                                      • Part of subcall function 00C79548: GetCurrentThreadId.KERNEL32 ref: 00C795A7
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00C632B4
                                    • _free.LIBCMT ref: 00C63350
                                    • __wcsdup.LIBCMT ref: 00C6336E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CurrentThread__wcsdup$FileH_prolog3ModuleName_free
                                    • String ID: Common$DefaultInstFolder$InstallManager.exe$InstallManager.ini
                                    • API String ID: 2829209540-4266419061
                                    • Opcode ID: 691c94de93f33fb90b42dab4916358596f9044e9d672b11257cf73d832e98a12
                                    • Instruction ID: 9e660fcb2deaf34020972db0436326ff4b432f852d4581ab2ee527d7801ba3ca
                                    • Opcode Fuzzy Hash: 691c94de93f33fb90b42dab4916358596f9044e9d672b11257cf73d832e98a12
                                    • Instruction Fuzzy Hash: 3071E6706406459FD714DB6CCC95BAAB7A4EF55320F1483A8E426DB3E2DB30AE05DB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL), ref: 00C78E8A
                                    • GetProcAddress.KERNEL32(00000000,RegisterApplicationRestart), ref: 00C78EA7
                                    • GetProcAddress.KERNEL32(00000000,RegisterApplicationRecoveryCallback), ref: 00C78EB1
                                    • RegisterApplicationRestart.KERNELBASE(?,?), ref: 00C78EC3
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    Strings
                                    • KERNEL32.DLL, xrefs: 00C78E85
                                    • RegisterApplicationRestart, xrefs: 00C78EA1
                                    • RegisterApplicationRecoveryCallback, xrefs: 00C78EA9
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AddressProc$ApplicationException@8H_prolog3HandleModuleRegisterRestartThrow
                                    • String ID: KERNEL32.DLL$RegisterApplicationRecoveryCallback$RegisterApplicationRestart
                                    • API String ID: 4293826539-723216104
                                    • Opcode ID: 11c54803115874b0fbd9e14b4fd3e23eb0bdd18c87974694c7dce2889001ea62
                                    • Instruction ID: 50277c08fadf8f23f0985b616d82d1b5d5ac55db718551017177da7993d8ef75
                                    • Opcode Fuzzy Hash: 11c54803115874b0fbd9e14b4fd3e23eb0bdd18c87974694c7dce2889001ea62
                                    • Instruction Fuzzy Hash: D7F08C3654021ABB9F219EE58C08C6B3E6DEB857A07088026FA1892120EB71DD259BB4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ___set_flsgetvalue.LIBCMT ref: 00D6CBA6
                                    • __calloc_crt.LIBCMT ref: 00D6CBB2
                                    • __getptd.LIBCMT ref: 00D6CBBF
                                    • __initptd.LIBCMT ref: 00D6CBC8
                                    • CreateThread.KERNELBASE(?,?,00D6CB1C,00000000,?,?), ref: 00D6CBF6
                                    • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00D6CC00
                                    • _free.LIBCMT ref: 00D6CC09
                                    • __dosmaperr.LIBCMT ref: 00D6CC14
                                      • Part of subcall function 00D69D23: __getptd_noexit.LIBCMT ref: 00D69D23
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit__initptd_free
                                    • String ID:
                                    • API String ID: 73303432-0
                                    • Opcode ID: 3e87c5fb7b3af7fcae4810ebdeaa2fcb7628829da3b92ac057e22feb32c4531c
                                    • Instruction ID: a1ad1650e8567f9aa45d5ac4580643996edd29cde20210994a9e2e6333d1651a
                                    • Opcode Fuzzy Hash: 3e87c5fb7b3af7fcae4810ebdeaa2fcb7628829da3b92ac057e22feb32c4531c
                                    • Instruction Fuzzy Hash: 39110832204706AFDB10BFB9AC42DAB7BA8EF44770710413AF959C6192DB71D80186B5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • KiUserCallbackDispatcher.NTDLL(0000000B), ref: 00C7DDA9
                                    • GetSystemMetrics.USER32(0000000C), ref: 00C7DDB0
                                    • GetSystemMetrics.USER32(00000002), ref: 00C7DDB7
                                    • GetSystemMetrics.USER32(00000003), ref: 00C7DDC1
                                    • GetDC.USER32(00000000), ref: 00C7DDCB
                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 00C7DDDC
                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00C7DDE4
                                    • ReleaseDC.USER32(00000000,00000000), ref: 00C7DDEC
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: MetricsSystem$CapsDevice$CallbackDispatcherReleaseUser
                                    • String ID:
                                    • API String ID: 1031845853-0
                                    • Opcode ID: 05ac8ce6ef3be459a83b875836af5d3f83df7a94315b35bc88af6033392ba122
                                    • Instruction ID: d7ad8b81b4ae7115b5974346aaf68978da9cdebcb3ff3397940eefde6582d02c
                                    • Opcode Fuzzy Hash: 05ac8ce6ef3be459a83b875836af5d3f83df7a94315b35bc88af6033392ba122
                                    • Instruction Fuzzy Hash: 0FF0F9B1E44724BAE7105BB29C89B267E68EB44761F004517E605DB2C0DBB598118FE0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetParent.USER32(?), ref: 00C71BB1
                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00C71BD5
                                    • KiUserCallbackDispatcher.NTDLL(?), ref: 00C71BF0
                                    • SendMessageW.USER32(?,00000121,00000000,?), ref: 00C71C11
                                    • SendMessageW.USER32(?,0000036A,00000000,00000002), ref: 00C71C29
                                    • UpdateWindow.USER32(?), ref: 00C71C6C
                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00C71C9D
                                      • Part of subcall function 00C6EAF8: GetWindowLongW.USER32(?,000000F0), ref: 00C6EB03
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Message$PeekSendWindow$CallbackDispatcherLongParentUpdateUser
                                    • String ID:
                                    • API String ID: 3153985260-0
                                    • Opcode ID: 8a7856609b4a6dd487d7a0d4ac0d0cc7ce6a7558949c396ecd3bd4acfd95fb36
                                    • Instruction ID: aacf38cef2e5993a50f519146e9acb8c272dce2dc33865f0784a499355d7db04
                                    • Opcode Fuzzy Hash: 8a7856609b4a6dd487d7a0d4ac0d0cc7ce6a7558949c396ecd3bd4acfd95fb36
                                    • Instruction Fuzzy Hash: B0419470940348FBDB229FA9CC84EAEBFB4FF81740F18855EE859A2191D7718E40DB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C5E230: SendMessageW.USER32(?,00000080,00000001,?), ref: 00C5E262
                                      • Part of subcall function 00C5E230: SendMessageW.USER32(?,00000080,00000000,?), ref: 00C5E277
                                      • Part of subcall function 00C5E230: EnumChildWindows.USER32(?,00C5E7E0), ref: 00C5E2B6
                                      • Part of subcall function 00C5E230: GetWindowRect.USER32(?,?), ref: 00C5E2D8
                                      • Part of subcall function 00C5E230: SetRect.USER32(?,?,?,?,?), ref: 00C5E2FB
                                      • Part of subcall function 00C5E230: GetWindowThreadProcessId.USER32(?,?), ref: 00C5E32A
                                      • Part of subcall function 00C5E230: GetForegroundWindow.USER32 ref: 00C5E32F
                                      • Part of subcall function 00C5E230: GetWindowThreadProcessId.USER32(00000000,?), ref: 00C5E33D
                                      • Part of subcall function 00C5E230: AttachThreadInput.USER32(00000000,?,00000001), ref: 00C5E34E
                                      • Part of subcall function 00C5E230: KiUserCallbackDispatcher.NTDLL(?), ref: 00C5E355
                                      • Part of subcall function 00C5E4D0: SetWindowTextW.USER32(?,18846CE9), ref: 00C5E5E9
                                      • Part of subcall function 00C64A60: GetPrivateProfileStringW.KERNEL32(?,?,00000000,?,00000104,?), ref: 00C64B16
                                      • Part of subcall function 00C6EB84: IsWindow.USER32(?), ref: 00C6EB98
                                    • SendMessageW.USER32(?,00000406,00000000,0000000A), ref: 00C62677
                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00C62689
                                    • _swscanf.LIBCMT ref: 00C626B7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$MessageSend$Thread$ProcessRect$AttachCallbackChildDispatcherEnumForegroundInputPrivateProfileStringTextUserWindows_swscanf
                                    • String ID: IDS_CANCEL$IDS_INSTPROGRESS_TITLE$IDS_SUB_PROGRESS
                                    • API String ID: 2905858005-2436838621
                                    • Opcode ID: 9eba1f704eb83280560031a815063b16c329639058a48129fab60b12f92e7f79
                                    • Instruction ID: 9eb90040c76a5148f5ccfdcd8f02e0d292f70d3f1e1aef5431e005b375237a60
                                    • Opcode Fuzzy Hash: 9eba1f704eb83280560031a815063b16c329639058a48129fab60b12f92e7f79
                                    • Instruction Fuzzy Hash: C141A071204701AFD314DF68CC82FA6B3A8FB89724F04471DF5599B2D1CBB4A9058BA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 00C6B574
                                    • SetLastError.KERNEL32(0000006F), ref: 00C6B58B
                                    • CreateActCtxWWorker.KERNEL32(?), ref: 00C6B5D3
                                    • CreateActCtxWWorker.KERNEL32(00000020), ref: 00C6B5F1
                                    • CreateActCtxWWorker.KERNEL32(00000020), ref: 00C6B613
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CreateWorker$ErrorFileLastModuleName
                                    • String ID:
                                    • API String ID: 3218422885-3916222277
                                    • Opcode ID: 1ff9b1e95c38fe94c06705271514ea9aefada2975926c71bc095fa3b2e5ce437
                                    • Instruction ID: 3d68213175fe42bc1dff382bd03bec37632a64f3a58a282b4ead6c53a01d5a96
                                    • Opcode Fuzzy Hash: 1ff9b1e95c38fe94c06705271514ea9aefada2975926c71bc095fa3b2e5ce437
                                    • Instruction Fuzzy Hash: 2221EA709007189ADB20DF65D8887EAB7F8BF54324F10469AD069E3290DB749F89DF61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00CF5C2E
                                      • Part of subcall function 00C80D75: EnterCriticalSection.KERNEL32(00DE6998,?,?,00000000,?,00C7E02E,00000010,00000008,00C6BE00,00C6BD97,00C69392,00C694C8,00C55491,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5), ref: 00C80DAF
                                      • Part of subcall function 00C80D75: InitializeCriticalSection.KERNEL32(?,?,00000000,?,00C7E02E,00000010,00000008,00C6BE00,00C6BD97,00C69392,00C694C8,00C55491,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5,SOFTWARE\Microsoft\Windows NT\CurrentVersion), ref: 00C80DC1
                                      • Part of subcall function 00C80D75: LeaveCriticalSection.KERNEL32(00DE6998,?,00000000,?,00C7E02E,00000010,00000008,00C6BE00,00C6BD97,00C69392,00C694C8,00C55491,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5,SOFTWARE\Microsoft\Windows NT\CurrentVersion), ref: 00C80DCE
                                      • Part of subcall function 00C80D75: EnterCriticalSection.KERNEL32(?,?,?,00000000,?,00C7E02E,00000010,00000008,00C6BE00,00C6BD97,00C69392,00C694C8,00C55491,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5), ref: 00C80DDE
                                    • GetProfileIntW.KERNEL32(windows,DragMinDist,00000002), ref: 00CF5C86
                                    • GetProfileIntW.KERNEL32(windows,DragDelay,000000C8), ref: 00CF5C98
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterProfile$H_prolog3InitializeLeave
                                    • String ID: DragDelay$DragMinDist$windows
                                    • API String ID: 3965097884-2101198082
                                    • Opcode ID: 037e9cc18ecdcfc339a3e103f17c3680ad697c8ff43168245bb163886239f966
                                    • Instruction ID: c3ca5311e57236da12e341de2b19610598bcc286634904e53a7be7d914b64a7b
                                    • Opcode Fuzzy Hash: 037e9cc18ecdcfc339a3e103f17c3680ad697c8ff43168245bb163886239f966
                                    • Instruction Fuzzy Hash: 2D0121B0941B409FD760EF6A8D82709FAE8FF94700F50450FE1459B791CBF465059F69
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_catch.LIBCMT ref: 00C6C484
                                    • GlobalLock.KERNEL32(?,?,?), ref: 00C6C56A
                                    • CreateDialogIndirectParamW.USER32(?,?,?,00C6BE55,00000000), ref: 00C6C599
                                    • DestroyWindow.USER32(00000000), ref: 00C6C613
                                    • GlobalUnlock.KERNEL32(?), ref: 00C6C623
                                    • GlobalFree.KERNEL32(?), ref: 00C6C62C
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Global$CreateDestroyDialogFreeH_prolog3_catchIndirectLockParamUnlockWindow
                                    • String ID:
                                    • API String ID: 3003189058-0
                                    • Opcode ID: c9fe461c7ba7adee7f2b95bfbe9943d5e002d1af4e0a4cf128556a19ec0c626d
                                    • Instruction ID: 7e1dcccfbbc85735fb4aa7be8b8d731cfe35d918cdaa598fb87490df846cf53b
                                    • Opcode Fuzzy Hash: c9fe461c7ba7adee7f2b95bfbe9943d5e002d1af4e0a4cf128556a19ec0c626d
                                    • Instruction Fuzzy Hash: 8E51AD71900249DFCF20EFA4C8C99BEBBB5AF48314F14442DF552E7291CB309A81EB65
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C5E230: SendMessageW.USER32(?,00000080,00000001,?), ref: 00C5E262
                                      • Part of subcall function 00C5E230: SendMessageW.USER32(?,00000080,00000000,?), ref: 00C5E277
                                      • Part of subcall function 00C5E230: EnumChildWindows.USER32(?,00C5E7E0), ref: 00C5E2B6
                                      • Part of subcall function 00C5E230: GetWindowRect.USER32(?,?), ref: 00C5E2D8
                                      • Part of subcall function 00C5E230: SetRect.USER32(?,?,?,?,?), ref: 00C5E2FB
                                      • Part of subcall function 00C5E230: GetWindowThreadProcessId.USER32(?,?), ref: 00C5E32A
                                      • Part of subcall function 00C5E230: GetForegroundWindow.USER32 ref: 00C5E32F
                                      • Part of subcall function 00C5E230: GetWindowThreadProcessId.USER32(00000000,?), ref: 00C5E33D
                                      • Part of subcall function 00C5E230: AttachThreadInput.USER32(00000000,?,00000001), ref: 00C5E34E
                                      • Part of subcall function 00C5E230: KiUserCallbackDispatcher.NTDLL(?), ref: 00C5E355
                                      • Part of subcall function 00C5E4D0: SetWindowTextW.USER32(?,18846CE9), ref: 00C5E5E9
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    • GetWindowRect.USER32(?,?), ref: 00C6229E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$RectThread$MessageProcessSend$AttachCallbackChildDispatcherEnumException@8ForegroundH_prolog3InputTextThrowUserWindows
                                    • String ID: IDS_CANCEL$IDS_INSTALL_BTN$IDS_INSTSTART_TITLE$IDS_SETTING
                                    • API String ID: 3147421804-2815980118
                                    • Opcode ID: 3b997158e36392a826780a371b02023212b7182908a6b44897a12281e5e52f58
                                    • Instruction ID: daee2574468c0dae824059de936c9a5358955bea233e6b52f3c91321e2560edf
                                    • Opcode Fuzzy Hash: 3b997158e36392a826780a371b02023212b7182908a6b44897a12281e5e52f58
                                    • Instruction Fuzzy Hash: E081E675600A01DFD714DF68CC91FAAF3A9FF84320F148659E926EB291DB70AE05CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00000000,?,00000000,?,00000000,18846CE9,?,FilePath,?,?,00D813CA,000000FF), ref: 00C69BB0
                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?,?,?,?,00D813CA,000000FF,?,00C648A3,?,?,FilePath), ref: 00C69BEC
                                    • RegCloseKey.ADVAPI32(?,?,?,00D813CA,000000FF,?,00C648A3,?,?,FilePath,00000000,FilePath,18846CE9,?,18846CE9), ref: 00C69C07
                                    • GetPrivateProfileStringW.KERNEL32(?,00000000,?,?,00001000,?), ref: 00C69C70
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: QueryValue$ClosePrivateProfileString
                                    • String ID: FilePath
                                    • API String ID: 1042844925-809029892
                                    • Opcode ID: 3d8b9d6f3e8f2f28ef897e00eeb7497dca14a1396e79da2a97aff416ac0ee0bb
                                    • Instruction ID: 6d8c290fafca6531f0748f6fc38a39afa0baaa46169a1e32fa837e8d2526e335
                                    • Opcode Fuzzy Hash: 3d8b9d6f3e8f2f28ef897e00eeb7497dca14a1396e79da2a97aff416ac0ee0bb
                                    • Instruction Fuzzy Hash: AE415071D00328EBDB359F15CC4899EBBB9EF48710F10419AF519A3292DB309E99DFA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: _swscanf
                                    • String ID: CableLabelTool$Ptedit51$Ptedit52$Stand
                                    • API String ID: 2748852333-4168805513
                                    • Opcode ID: 4b707c6ead967164eb7690cf3699fab78aed996fb7486b41f133eda5f2fb78c6
                                    • Instruction ID: 57adcf848f8c5ab55117acb4d6015e0a4e31664da4e16840b75e54363f3623d7
                                    • Opcode Fuzzy Hash: 4b707c6ead967164eb7690cf3699fab78aed996fb7486b41f133eda5f2fb78c6
                                    • Instruction Fuzzy Hash: 5431287AA00A54CBD708DB4CC840BAA7365EB4C365F1542A5FC26A73C1D7305F4987A6
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Edit
                                    • API String ID: 0-554135844
                                    • Opcode ID: 7d4463af1fbe456c01bbf498ed5b360ae2c55090e60b61cf6394e991c9445e10
                                    • Instruction ID: 8cc572e9b9fbbabc72187167c350a9f3b6fb0706d0d79c56743475d079491979
                                    • Opcode Fuzzy Hash: 7d4463af1fbe456c01bbf498ed5b360ae2c55090e60b61cf6394e991c9445e10
                                    • Instruction Fuzzy Hash: D211E172304201FBEA301A36CCC9B7AB6A8AF01750F14452AF4A5E21A0CB71EE40E7A4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 00D69599
                                      • Part of subcall function 00D69251: __FF_MSGBANNER.LIBCMT ref: 00D6926A
                                      • Part of subcall function 00D69251: __NMSG_WRITE.LIBCMT ref: 00D69271
                                      • Part of subcall function 00D69251: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,00D737CE,?,00000001,?,?,00D7745C,00000018,00DD82F0,0000000C,00D774EC), ref: 00D69296
                                    • _free.LIBCMT ref: 00D695AC
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AllocateHeap_free_malloc
                                    • String ID:
                                    • API String ID: 1020059152-0
                                    • Opcode ID: 130991bffaedadafde52114bc13872d01f9029757f9b3631a4d9065014ea0665
                                    • Instruction ID: 417712f80a211aabfc5404c8ee5ce30d0bcf8ede6f2c85d8a95d90aa345125b2
                                    • Opcode Fuzzy Hash: 130991bffaedadafde52114bc13872d01f9029757f9b3631a4d9065014ea0665
                                    • Instruction Fuzzy Hash: DB110632849715ABCB227F78EC65669B7ACEF443B0B244025F84ADB251DF30C8809BB4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • InitCommonControlsEx.COMCTL32(?,?,?,?,?,?,?,000000FF,?,00C6346C), ref: 00C63741
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CommonControlsInit
                                    • String ID: InstallManager.exe$LastSelectedPrinter$SOFTWARE\Brother Industries, Ltd.\P-touch\Driver\Setup
                                    • API String ID: 3513637369-3142314284
                                    • Opcode ID: 7a9349f1eb9e393999aebd3c40e902652fab416fe10daef701eedaa880e5a038
                                    • Instruction ID: 18adbbfeb6e36f3213568afb8442fec9a4d6ae048139c141be02f4593c0b6f3c
                                    • Opcode Fuzzy Hash: 7a9349f1eb9e393999aebd3c40e902652fab416fe10daef701eedaa880e5a038
                                    • Instruction Fuzzy Hash: 5C81D4712007429FD314DB68CC81BAAF7A4FF95324F148758F4299B2E1DB31EA05DB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegQueryValueExW.ADVAPI32(00000000,?,00000000,?,?,?,?,?,00000000,CmdOp,00DEAD78,00DEAD78,?,00C517A0,FFFFFFFF,00DBCE34), ref: 00C6978D
                                    • RegCloseKey.ADVAPI32(00000000,?,?,00000000,CmdOp,00DEAD78,00DEAD78,?,00C517A0,FFFFFFFF,00DBCE34,00000000,00000000,00000000), ref: 00C69796
                                    • GetPrivateProfileIntW.KERNEL32(?,?,18846CE9,00638E88), ref: 00C697B2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ClosePrivateProfileQueryValue
                                    • String ID: CmdOp
                                    • API String ID: 1423431592-2013772624
                                    • Opcode ID: e601a55e3e78daa1d7eeb074bb2ab6e0aa81ecf5f086b67902d2f72438d47b4e
                                    • Instruction ID: 4ffe703507c5dc15355cdc4f7130ef977c1e2a2fe00f4bd5d958a60d557bdcf3
                                    • Opcode Fuzzy Hash: e601a55e3e78daa1d7eeb074bb2ab6e0aa81ecf5f086b67902d2f72438d47b4e
                                    • Instruction Fuzzy Hash: 5E012472510208FBDB229F84CC84FEE7BADEB04354F204016FA05AA110D771DA15DBA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00C75633
                                    • SendDlgItemMessageA.USER32(?,?,?,00000000,?), ref: 00C7577F
                                      • Part of subcall function 00C6855B: _malloc.LIBCMT ref: 00C68579
                                    • SendDlgItemMessageW.USER32(?,?,0000040B,00000000,00000001), ref: 00C7570B
                                      • Part of subcall function 00C82078: __EH_prolog3.LIBCMT ref: 00C8207F
                                    • SendDlgItemMessageW.USER32(?,?,0000037C,?,?), ref: 00C7573D
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ItemMessageSend$H_prolog3$_malloc
                                    • String ID:
                                    • API String ID: 2480034192-0
                                    • Opcode ID: 88a02a7cfc99d9732bb18e16b6a830b3159bef75723eba8feeb8c6213daa4c0a
                                    • Instruction ID: 10003b64af2fdddb34e13d7d258967320e8f021f89b480a9da4a891a1acb58f4
                                    • Opcode Fuzzy Hash: 88a02a7cfc99d9732bb18e16b6a830b3159bef75723eba8feeb8c6213daa4c0a
                                    • Instruction Fuzzy Hash: C441E575910604ABDF24ABA5CC40BBE76B5FF40320F608219F979AB2D4D7B44E429794
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindResourceW.KERNEL32(?,?,000000F0,?,?,?,?,?,00C6C34D,?,?,00C5E24A), ref: 00C75B52
                                    • LoadResource.KERNEL32(?,00000000,?,?,?,?,?,00C6C34D,?,?,00C5E24A), ref: 00C75B5E
                                    • LockResource.KERNEL32(00000000,?,?,?,?,?,00C6C34D,?,?,00C5E24A), ref: 00C75B6B
                                    • FreeResource.KERNEL32(00000000,00000000,?,?,?,?,?,00C6C34D,?,?,00C5E24A), ref: 00C75B87
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Resource$FindFreeLoadLock
                                    • String ID:
                                    • API String ID: 1078018258-0
                                    • Opcode ID: d66aadcf9e5ddd4f16ec752605bdda40cc22f93f953d3d4f95154c158666df41
                                    • Instruction ID: 178debb7c3669c5b697d8cf2c6bdc29fbf70f0c8ea1e1830cc664d9185512415
                                    • Opcode Fuzzy Hash: d66aadcf9e5ddd4f16ec752605bdda40cc22f93f953d3d4f95154c158666df41
                                    • Instruction Fuzzy Hash: C2F0AF722007067F97205FB69C84D7BB6ACAB80360704803AFA19D2211DAB0DE0187B4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: _memcpy_s
                                    • String ID: REBOOT$Reboot%02d_Key
                                    • API String ID: 2001391462-1236595416
                                    • Opcode ID: cabaa29fda11b5fe22250e961cc7c5a0cbea745b4d323ff971bfe6b521e20403
                                    • Instruction ID: 36b38007a59731f92ab1c04ef95e85812a7ac14c82d99cd80018f674333e9b99
                                    • Opcode Fuzzy Hash: cabaa29fda11b5fe22250e961cc7c5a0cbea745b4d323ff971bfe6b521e20403
                                    • Instruction Fuzzy Hash: 9BA1C771600A02DFCB24DF6CC8C596AB3B5FF55320B6486ADE1269B3A1DB31EE45CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C64A60: GetPrivateProfileStringW.KERNEL32(?,?,00000000,?,00000104,?), ref: 00C64B16
                                    • SetWindowTextW.USER32(?,18846CE9), ref: 00C5E5E9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: PrivateProfileStringTextWindow
                                    • String ID: - $IDS_TITLE_BAR
                                    • API String ID: 817534588-2936165346
                                    • Opcode ID: 8b4c55077f2447b9075cbb5c2f1bced2fc9ab9d4af27a12ad0372bdf325d6c96
                                    • Instruction ID: c4cb6e66540cbaa45185fab49001995128ebdb1e72437d7bf9bb3f8668628f65
                                    • Opcode Fuzzy Hash: 8b4c55077f2447b9075cbb5c2f1bced2fc9ab9d4af27a12ad0372bdf325d6c96
                                    • Instruction Fuzzy Hash: E8519175600605DFD708DBACCC41FAAB3B5FF95324F148358E4259B2D1EB31AA49CB64
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00C7EB26
                                    • _wcslen.LIBCMT ref: 00C7EB3B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: DirectorySystem_wcslen
                                    • String ID: \
                                    • API String ID: 2940219301-2967466578
                                    • Opcode ID: ddda60ceacf76f5007c0bfa84b9466cba8769f13b536efbb20ed07745c773715
                                    • Instruction ID: 93397f1047e9e4b800b3b0cd3daab97a07b32a8eeed1414545940893ebd1fd98
                                    • Opcode Fuzzy Hash: ddda60ceacf76f5007c0bfa84b9466cba8769f13b536efbb20ed07745c773715
                                    • Instruction Fuzzy Hash: 0F01567295021CA7CB20DA659C8DEEB7BBCEF54354F0408A9E819D3140F674DB88C6B4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 00C7932D
                                    • PathFindExtensionW.SHLWAPI(?), ref: 00C79343
                                      • Part of subcall function 00C7914F: GetProcAddress.KERNEL32(00000000,GetThreadPreferredUILanguages), ref: 00C79194
                                      • Part of subcall function 00C7914F: _memset.LIBCMT ref: 00C791C0
                                      • Part of subcall function 00C7914F: _wcstoul.LIBCMT ref: 00C79208
                                      • Part of subcall function 00C7914F: _wcslen.LIBCMT ref: 00C79229
                                      • Part of subcall function 00C7914F: GetUserDefaultUILanguage.KERNEL32 ref: 00C79239
                                      • Part of subcall function 00C7914F: ConvertDefaultLocale.KERNELBASE(?), ref: 00C79260
                                      • Part of subcall function 00C7914F: ConvertDefaultLocale.KERNELBASE(?), ref: 00C7926F
                                      • Part of subcall function 00C7914F: GetSystemDefaultUILanguage.KERNEL32 ref: 00C79278
                                      • Part of subcall function 00C7914F: ConvertDefaultLocale.KERNEL32(?), ref: 00C79294
                                      • Part of subcall function 00C7914F: ConvertDefaultLocale.KERNEL32(?), ref: 00C792A3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Default$ConvertLocale$Language$AddressExtensionFileFindModuleNamePathProcSystemUser_memset_wcslen_wcstoul
                                    • String ID: %s%s.dll
                                    • API String ID: 1415830068-1649984862
                                    • Opcode ID: 5e02336e59cc3c10094ce4b5237830f4198cfb58af32051e57028d9c0f500a6c
                                    • Instruction ID: e7ef380b2d90d7616732d44c4055b7fa46a0e431d127a05c55501b304941052a
                                    • Opcode Fuzzy Hash: 5e02336e59cc3c10094ce4b5237830f4198cfb58af32051e57028d9c0f500a6c
                                    • Instruction Fuzzy Hash: C1018672A00218ABCB11DBA4EC899FF77FCFF49710F010465A40AE7261DA70DA05CBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000002,00000000,00000000,00000001,?,Software\Microsoft\NET Framework SetUp\NDP\v4), ref: 00C5C955
                                    • RegCloseKey.ADVAPI32(80000002), ref: 00C5C96C
                                    Strings
                                    • Software\Microsoft\NET Framework SetUp\NDP\v4, xrefs: 00C5C937
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CloseOpen
                                    • String ID: Software\Microsoft\NET Framework SetUp\NDP\v4
                                    • API String ID: 47109696-47002990
                                    • Opcode ID: 442b7edd8ff310f46c1fcd8c4025cbbc7a2f160bf22cb84963c4d5bd0736f2cd
                                    • Instruction ID: 5e11a1df5150c930833649b92e0ed3f173958ba548f063d94b31d3ec319d4c57
                                    • Opcode Fuzzy Hash: 442b7edd8ff310f46c1fcd8c4025cbbc7a2f160bf22cb84963c4d5bd0736f2cd
                                    • Instruction Fuzzy Hash: 8F01A434500615EFD714DB68DC86FA9B3B8EF45321F104399E91AA72D1DB70AE48CBA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000002,Software\Brother Industries, Ltd.\CableLabel\Settings\GoogleAnalytics,00000000,00000001,?,?,?,?,00C5C56B), ref: 00C5C9B7
                                    • RegCloseKey.ADVAPI32(80000002,?,?,?,00C5C56B), ref: 00C5C9CF
                                    Strings
                                    • Software\Brother Industries, Ltd.\CableLabel\Settings\GoogleAnalytics, xrefs: 00C5C9AD
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CloseOpen
                                    • String ID: Software\Brother Industries, Ltd.\CableLabel\Settings\GoogleAnalytics
                                    • API String ID: 47109696-2742774549
                                    • Opcode ID: 7bca78d57248800d43081164cc31a08cbe358c6f0d3e190b8ed83cefde41551c
                                    • Instruction ID: 1d499b4e42ac2c71e46e313c218155cb2b5a24011243182e4b208537c339af03
                                    • Opcode Fuzzy Hash: 7bca78d57248800d43081164cc31a08cbe358c6f0d3e190b8ed83cefde41551c
                                    • Instruction Fuzzy Hash: 7CF0EC76680324BBD62456849D0BFF5B21CCB01B12F000255BE0AB5281A9915D5CD2F9
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00CD295F
                                    • CreateCompatibleDC.GDI32(00000000), ref: 00CD2A2A
                                    • CreateCompatibleDC.GDI32(00000000), ref: 00CD2A36
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CompatibleCreate$H_prolog3
                                    • String ID:
                                    • API String ID: 2193723985-0
                                    • Opcode ID: f4412862a717b30eb76b6b466d43ceff22c96420cbb7770fd5866aa8fce9aabb
                                    • Instruction ID: bdd44020b109e3e2894b1a2ee680544df69a902a3f1cdab744dfdb8abeeb305f
                                    • Opcode Fuzzy Hash: f4412862a717b30eb76b6b466d43ceff22c96420cbb7770fd5866aa8fce9aabb
                                    • Instruction Fuzzy Hash: 1B51CEB0911761CFCB44EF68C5C129A7BA8BF09B00F1081ABED09DF25ADBB08541DFA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: _clearerr_s_fgetwslstrlen
                                    • String ID:
                                    • API String ID: 4085375183-0
                                    • Opcode ID: 49fdba01f6522ed142b8cc54213a1ca3f0283639896108d49924d3f0d062ccd1
                                    • Instruction ID: 0850cd3bfc4f5ca8c72cda138f048c477ccc6694926f90255acf613a92d171ae
                                    • Opcode Fuzzy Hash: 49fdba01f6522ed142b8cc54213a1ca3f0283639896108d49924d3f0d062ccd1
                                    • Instruction Fuzzy Hash: E1214671A006016BCB38AF64C8D6E6E77BAEF40720F018519F8199B3D2CF71AC459BE0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetWindow.USER32(00000000,00000005), ref: 00C8289E
                                    • GetClassNameW.USER32(?,?,00000400), ref: 00C828BD
                                      • Part of subcall function 00C825D7: __EH_prolog3.LIBCMT ref: 00C825DE
                                    • GetWindow.USER32(?,00000002), ref: 00C82906
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$ClassH_prolog3Name
                                    • String ID:
                                    • API String ID: 632776892-0
                                    • Opcode ID: 964275d382a815c21023e73fbdbf29aded5e6d6357a53be4633e1300ed13eb01
                                    • Instruction ID: 5674fcb1f125c4e8593ee697f32b3512028d3f0c52381c253ada5000ddd15266
                                    • Opcode Fuzzy Hash: 964275d382a815c21023e73fbdbf29aded5e6d6357a53be4633e1300ed13eb01
                                    • Instruction Fuzzy Hash: 2711A232900214ABCB60AB79CC49E6BB7E8FF48708F054198E599EB251DE34DE45DBA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(80000001,00DDEC64,00000000,00000001,?), ref: 00C78C62
                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,?,00000004), ref: 00C78C82
                                    • RegCloseKey.ADVAPI32(?), ref: 00C78CC6
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CloseOpenQueryValue
                                    • String ID:
                                    • API String ID: 3677997916-0
                                    • Opcode ID: aa991e35e2b389c8951eb6b75def2be4aa09f0b0e8c1d65015fecef94ec0b4c6
                                    • Instruction ID: d6b893a4f6a50e59dca8b444c403cc3a2fcc1ca73458a9eb9851433d03ac248d
                                    • Opcode Fuzzy Hash: aa991e35e2b389c8951eb6b75def2be4aa09f0b0e8c1d65015fecef94ec0b4c6
                                    • Instruction Fuzzy Hash: 81212F71D41204EFDF15CF99CD89AAEBBB8FF90700F20806AE619A6250DB715B48DB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00C7BB1F
                                      • Part of subcall function 00C6855B: _malloc.LIBCMT ref: 00C68579
                                      • Part of subcall function 00C7B4E3: __EH_prolog3.LIBCMT ref: 00C7B4EA
                                    • SetThreadPriority.KERNELBASE(?,?,00000002,?,?,00000004,00C64758), ref: 00C7BB74
                                    • ResumeThread.KERNELBASE(?), ref: 00C7BB83
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: H_prolog3Thread$PriorityResume_malloc
                                    • String ID:
                                    • API String ID: 3956167790-0
                                    • Opcode ID: dfb9401f63a291241a89f4b119051512b8985c5183530622b21443aa89cb9f45
                                    • Instruction ID: 8edb5e52203621ecdeb4dd09a6664b59da50787363dc0c3c9043d52970ed6107
                                    • Opcode Fuzzy Hash: dfb9401f63a291241a89f4b119051512b8985c5183530622b21443aa89cb9f45
                                    • Instruction Fuzzy Hash: 9501A231600205AFDF26AF64CC05B6D7AE1AF08B10F108618FD5AD62A1C7718E11EB94
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • KiUserCallbackDispatcher.NTDLL(00000030,00000000,00000000,00000000), ref: 00C7B5CA
                                    • TranslateMessage.USER32(00000030), ref: 00C7B5E9
                                    • DispatchMessageW.USER32(00000030), ref: 00C7B5F0
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Message$CallbackDispatchDispatcherTranslateUser
                                    • String ID:
                                    • API String ID: 2960505505-0
                                    • Opcode ID: 491f2006d55b537fdfeb2648b3c28853218fdfd92ea414235f9690e2bbc6c1c6
                                    • Instruction ID: 4160454d1581f82061d890773f4f7aaaa34dc3e2df50e2eec29b6f780696a3d9
                                    • Opcode Fuzzy Hash: 491f2006d55b537fdfeb2648b3c28853218fdfd92ea414235f9690e2bbc6c1c6
                                    • Instruction Fuzzy Hash: 4FF08C32201201AF9375AF32AC88E7B77BCEF81712305852EF61ACA510DB34DD42DA21
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __getptd_noexit.LIBCMT ref: 00D6CAC1
                                      • Part of subcall function 00D6FF6F: GetLastError.KERNEL32(00000001,00000000,00D69D28,00D692DA,00000000,?,00D737CE,?,00000001,?,?,00D7745C,00000018,00DD82F0,0000000C,00D774EC), ref: 00D6FF73
                                      • Part of subcall function 00D6FF6F: ___set_flsgetvalue.LIBCMT ref: 00D6FF81
                                      • Part of subcall function 00D6FF6F: __calloc_crt.LIBCMT ref: 00D6FF95
                                      • Part of subcall function 00D6FF6F: DecodePointer.KERNEL32(00000000,?,00D737CE,?,00000001,?,?,00D7745C,00000018,00DD82F0,0000000C,00D774EC,?,?,?,00D70093), ref: 00D6FFAF
                                      • Part of subcall function 00D6FF6F: __initptd.LIBCMT ref: 00D6FFBE
                                      • Part of subcall function 00D6FF6F: GetCurrentThreadId.KERNEL32 ref: 00D6FFC5
                                      • Part of subcall function 00D6FF6F: SetLastError.KERNEL32(00000000,?,00D737CE,?,00000001,?,?,00D7745C,00000018,00DD82F0,0000000C,00D774EC,?,?,?,00D70093), ref: 00D6FFDD
                                    • __freeptd.LIBCMT ref: 00D6CACB
                                      • Part of subcall function 00D70131: TlsGetValue.KERNEL32(?,?,00D6CAD0,00000000,?,00D6CAFC,00000000), ref: 00D70152
                                      • Part of subcall function 00D70131: TlsGetValue.KERNEL32(?,?,00D6CAD0,00000000,?,00D6CAFC,00000000), ref: 00D70164
                                      • Part of subcall function 00D70131: DecodePointer.KERNEL32(00000000,?,00D6CAD0,00000000,?,00D6CAFC,00000000), ref: 00D7017A
                                      • Part of subcall function 00D70131: __freefls@4.LIBCMT ref: 00D70185
                                      • Part of subcall function 00D70131: TlsSetValue.KERNEL32(00000015,00000000,?,00D6CAD0,00000000,?,00D6CAFC,00000000), ref: 00D70197
                                    • ExitThread.KERNEL32 ref: 00D6CAD4
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Value$DecodeErrorLastPointerThread$CurrentExit___set_flsgetvalue__calloc_crt__freefls@4__freeptd__getptd_noexit__initptd
                                    • String ID:
                                    • API String ID: 779801232-0
                                    • Opcode ID: dc9214ed7355e1c744a812e2388e553f7f17f751d90df998e9a88b3d2a523942
                                    • Instruction ID: 435994aa0c0c78ac14e6879c1803dfc3438b3a96616a630fde1a2a6279075f17
                                    • Opcode Fuzzy Hash: dc9214ed7355e1c744a812e2388e553f7f17f751d90df998e9a88b3d2a523942
                                    • Instruction Fuzzy Hash: 6FC04C215407087BDA517B61DC4A92A7A5DDE40350B954025B908C5191FE64E8458570
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: _memcpy_s
                                    • String ID: UninstG%02d
                                    • API String ID: 2001391462-724122539
                                    • Opcode ID: dfb7d52213134ea7d686cba35d1ae3c1c01db5a13e3b9ff497232b17adb828bd
                                    • Instruction ID: eeaae3d8d14195fab4e506a8f5f08a92961acc6ea9a8ad7bc1463773d50d75ab
                                    • Opcode Fuzzy Hash: dfb7d52213134ea7d686cba35d1ae3c1c01db5a13e3b9ff497232b17adb828bd
                                    • Instruction Fuzzy Hash: 78A12975600602CFC714DFACC885A6AF3B1FF85320718876DE8259B391DB71AE89CB54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: H_prolog3
                                    • String ID:
                                    • API String ID: 431132790-0
                                    • Opcode ID: 96eb970d33de3c27771d694fe15baca1712bf1c300a6f67baeb1994781051207
                                    • Instruction ID: de5080e3e7e306fbaac67747abb086ba7dbdd7dfd85e78b46c89c8a64cf9f0c0
                                    • Opcode Fuzzy Hash: 96eb970d33de3c27771d694fe15baca1712bf1c300a6f67baeb1994781051207
                                    • Instruction Fuzzy Hash: D6C14D7060020ADFDF18DF64C885BAE77B9BF04314F14C469E9299B292DB70DE40EB65
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: _memmove_s
                                    • String ID:
                                    • API String ID: 800865076-0
                                    • Opcode ID: 45993b60128e229b4b02d28950dc76cc8da1ddf1c660e5d67157a1cfd7820f2f
                                    • Instruction ID: 09cf88df327f2391e8e1444bdfae89cfa543b8f4c8c76133fef03f87332b140c
                                    • Opcode Fuzzy Hash: 45993b60128e229b4b02d28950dc76cc8da1ddf1c660e5d67157a1cfd7820f2f
                                    • Instruction Fuzzy Hash: 3321A579610904DFCB00DF58D8A9C6EF3A9EF98361B108199FC155B311DA31BD98DBA8
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C6EAF8: GetWindowLongW.USER32(?,000000F0), ref: 00C6EB03
                                    • GetWindowRect.USER32(?,?), ref: 00C732AC
                                    • GetWindow.USER32(?,00000004), ref: 00C732C9
                                      • Part of subcall function 00C6EC76: IsWindowEnabled.USER32(?), ref: 00C6EC7F
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$EnabledLongRect
                                    • String ID:
                                    • API String ID: 3170195891-0
                                    • Opcode ID: 2e7326bada3155df26fe420ea6aa19a279fb7311954e329a8a984fbdde2c44bd
                                    • Instruction ID: 47022bf992a84d5c582149215a3f1f6460aaa447517d4e2020c22a3177a0fde0
                                    • Opcode Fuzzy Hash: 2e7326bada3155df26fe420ea6aa19a279fb7311954e329a8a984fbdde2c44bd
                                    • Instruction Fuzzy Hash: DE113D30A002499BCF21EF69C895A7EB7F9FF98700F10855AE416E7252DB709B01EA60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: _memcpy_s
                                    • String ID:
                                    • API String ID: 2001391462-0
                                    • Opcode ID: 2ad4ee833c9b1154751cc74bbbd1b882d1e030efeb2732d5c4854aac181d1c92
                                    • Instruction ID: d256289cfe833c32a7cc85a4007a34f43aab82e98cef7474761c7df107b72a70
                                    • Opcode Fuzzy Hash: 2ad4ee833c9b1154751cc74bbbd1b882d1e030efeb2732d5c4854aac181d1c92
                                    • Instruction Fuzzy Hash: E701C036600614AFCB14CF28CC89CABB7AAEF88324B004559FC098B311CA71BC91CBE4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SendMessageW.USER32(?,0000036D,00000040,00000000), ref: 00C6E9CA
                                    • SendMessageW.USER32(?,00000085,00000001,00000000), ref: 00C6E9EB
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID:
                                    • API String ID: 3850602802-0
                                    • Opcode ID: 7d64edeaa08b972da58eb21070d212cc782012f4530bfbbbb50af7029bd3ac8f
                                    • Instruction ID: d532ac7b0f9256247fa7c73b22647da8f69b70e80e25150220797b7900aa3b78
                                    • Opcode Fuzzy Hash: 7d64edeaa08b972da58eb21070d212cc782012f4530bfbbbb50af7029bd3ac8f
                                    • Instruction Fuzzy Hash: 2A01D131200710AFD7748B19CCC0EAA77E6FF84711B14852AF0AADB2A0D770EC80CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _memset.LIBCMT ref: 00C72C3C
                                    • GetVersionExW.KERNEL32(?), ref: 00C72C55
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Exception@8H_prolog3ThrowVersion_memset
                                    • String ID:
                                    • API String ID: 3528868769-0
                                    • Opcode ID: 800525363cbfa5da74babe81b3e1467d3b3bb488c95ca97c5c8b118f9899359b
                                    • Instruction ID: e5a9b03be7faf37da1fdb3ae63f677e105db1c0f2c462082619715ffd72d5612
                                    • Opcode Fuzzy Hash: 800525363cbfa5da74babe81b3e1467d3b3bb488c95ca97c5c8b118f9899359b
                                    • Instruction Fuzzy Hash: 6601713090021C9BDB25EB74D886BDD73E4AF14704F4080A9E699DB291DF70AE89DBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00C79CC8
                                    • InterlockedExchange.KERNEL32(00DEACDC,?), ref: 00C79D00
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ExchangeH_prolog3Interlocked
                                    • String ID:
                                    • API String ID: 1299226544-0
                                    • Opcode ID: 35e68a422c709420a991d0a1618ea6ff719760fa98833331814f1fd95e3dafcd
                                    • Instruction ID: 4960ee89dc66f6b422ce4d713586f6013de08ca68f6d28928d3ab95aa4250ff7
                                    • Opcode Fuzzy Hash: 35e68a422c709420a991d0a1618ea6ff719760fa98833331814f1fd95e3dafcd
                                    • Instruction Fuzzy Hash: BC014435700A019FCB14AFA8C899BBDB7E4BF08311F484569E5AAD7291CF30A9059B65
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetErrorMode.KERNELBASE(00000000), ref: 00C8103C
                                    • SetErrorMode.KERNELBASE(00000000), ref: 00C81044
                                      • Part of subcall function 00C6B541: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 00C6B574
                                      • Part of subcall function 00C6B541: SetLastError.KERNEL32(0000006F), ref: 00C6B58B
                                      • Part of subcall function 00C80E52: GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 00C80E8F
                                      • Part of subcall function 00C80E52: PathFindExtensionW.SHLWAPI(?), ref: 00C80EA9
                                      • Part of subcall function 00C80E52: __wcsdup.LIBCMT ref: 00C80EF3
                                      • Part of subcall function 00C80E52: __wcsdup.LIBCMT ref: 00C80F31
                                      • Part of subcall function 00C80E52: __wcsdup.LIBCMT ref: 00C80F65
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Error__wcsdup$FileModeModuleName$ExtensionFindLastPath
                                    • String ID:
                                    • API String ID: 972848482-0
                                    • Opcode ID: 658b9f6674ee442de47df261a4701675455dfb4302e15bae7d9ec89114646be9
                                    • Instruction ID: dc80de74e4be565b9349cbde7d5f254d1cea9da4f69ef4c7a541153d5aeb18d6
                                    • Opcode Fuzzy Hash: 658b9f6674ee442de47df261a4701675455dfb4302e15bae7d9ec89114646be9
                                    • Instruction Fuzzy Hash: 0EF0CD70A142185FCB64FF64C881B593BD8AF44310F09805AF888CB352DB30DC90DBA6
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ActivateActCtx.KERNEL32(?,?,00DCB1E0,00000014,00C72C78), ref: 00C71F4B
                                    • InitNetworkAddressControl.SHELL32(?), ref: 00C71F7D
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ActivateAddressControlInitNetwork
                                    • String ID:
                                    • API String ID: 3189851245-0
                                    • Opcode ID: 919fd9436ccd48a696ecbe6ec24eec0e17c9b76a08a95eda0fae9668cdae4da0
                                    • Instruction ID: 0ba1abe9a8b2c7c801d4a4e0e1957a32b440f90dc416f513b5ce8903acd79750
                                    • Opcode Fuzzy Hash: 919fd9436ccd48a696ecbe6ec24eec0e17c9b76a08a95eda0fae9668cdae4da0
                                    • Instruction Fuzzy Hash: A1F06271D402059FCF24EFF988459AD77F4AF88310B588529E496EB191DB348A019B61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C7E4EC: __EH_prolog3.LIBCMT ref: 00C7E4F3
                                    • GetCurrentThreadId.KERNEL32 ref: 00C746AB
                                    • SetWindowsHookExW.USER32(00000005,00C7446B,00000000,00000000), ref: 00C746BB
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: H_prolog3$CurrentException@8HookThreadThrowWindows
                                    • String ID:
                                    • API String ID: 1415497866-0
                                    • Opcode ID: 8403e518aefae20fa26b556a76744c9939387e9e0183b12e9f16723a0d05b9fd
                                    • Instruction ID: ad7e201715b4411a05a48c3b50fde9e6eab3c298f7b4b0ac7dd654b81f88a110
                                    • Opcode Fuzzy Hash: 8403e518aefae20fa26b556a76744c9939387e9e0183b12e9f16723a0d05b9fd
                                    • Instruction Fuzzy Hash: B6F0A731541B4067C7347B969805B2B7AECDBC1765F018139F61986390E770ED048AB6
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00D69D23: __getptd_noexit.LIBCMT ref: 00D69D23
                                    • __lock_file.LIBCMT ref: 00D6D356
                                      • Part of subcall function 00D7449A: __lock.LIBCMT ref: 00D744BF
                                    • __fclose_nolock.LIBCMT ref: 00D6D361
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                    • String ID:
                                    • API String ID: 2800547568-0
                                    • Opcode ID: a999a1a1ba27142f337e4c70b9f8ff072d79f78e102123a9c09f405805b7db90
                                    • Instruction ID: 23f635f5726764efcdc7347c81182680bc0d4b4f989067ba72b97e009859caa3
                                    • Opcode Fuzzy Hash: a999a1a1ba27142f337e4c70b9f8ff072d79f78e102123a9c09f405805b7db90
                                    • Instruction Fuzzy Hash: 26F0BB31D00715DBD720AB79A80276E7BA1EF01334F14C344E4B4AA2C1D77C99019F76
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • DefWindowProcW.USER32(?,?,?,18846CE9,?,?,00C60004,0000000F,?,00000000,?,18846CE9), ref: 00C6FD9B
                                    • CallWindowProcW.USER32(?,?,?,?,18846CE9), ref: 00C6FDB0
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ProcWindow$Call
                                    • String ID:
                                    • API String ID: 2316559721-0
                                    • Opcode ID: 02103cbc59e51500d51491a1267682d2b34add878735a10ed98d767c45dc2322
                                    • Instruction ID: 7a59d45426d4553ed75121444dded676c7265aa0d7742198f79bd054fe42e5bf
                                    • Opcode Fuzzy Hash: 02103cbc59e51500d51491a1267682d2b34add878735a10ed98d767c45dc2322
                                    • Instruction Fuzzy Hash: 04F01C36100209FFCF218F95EC44DEA7BBAFF08350B048469F959C6520D732E920EB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsWindow.USER32(?), ref: 00C6EB98
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    • SetWindowTextW.USER32(?,?), ref: 00C6EBC0
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$Exception@8H_prolog3TextThrow
                                    • String ID:
                                    • API String ID: 3347280681-0
                                    • Opcode ID: ad522aea98338fb6a5bdcd39573feb81841d6773cbbd81aa19123dad8de9cf0a
                                    • Instruction ID: c6824080068a92e33eaa7ee5d5ea1f463a1e852f041eec9b0912c925a13f0b98
                                    • Opcode Fuzzy Hash: ad522aea98338fb6a5bdcd39573feb81841d6773cbbd81aa19123dad8de9cf0a
                                    • Instruction Fuzzy Hash: DAF06D3B500714EFCB306B65D844AA6BBE9FF85361F00487BE5DA96A60DB71AC10CF94
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ReadFile.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000), ref: 00C76BAC
                                    • GetLastError.KERNEL32(?), ref: 00C76BB9
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ErrorFileLastRead
                                    • String ID:
                                    • API String ID: 1948546556-0
                                    • Opcode ID: de91da94bc3ed5436c0671fbd5222690072451715ce71af423f099dee465bf67
                                    • Instruction ID: 86e42b855f9514eb0fcef2093491971bed6dd2dd9e2cd1e3a7bad770e0aca693
                                    • Opcode Fuzzy Hash: de91da94bc3ed5436c0671fbd5222690072451715ce71af423f099dee465bf67
                                    • Instruction Fuzzy Hash: 14E01232110A08FBDF115FA1DC08FAA7BADEB14325F40C426F92DD6160D771EA24EBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ActivateActCtx.KERNEL32(?,?,00DCB098,00000010,00CACCBA,UxTheme.dll,75FD6BA0,?,00CACD7B,00000004,00C8337D,00000000,00000004,00CCE78D), ref: 00C710CC
                                    • LoadLibraryW.KERNELBASE(?,?,00CACD7B,00000004,00C8337D,00000000,00000004,00CCE78D,?,?,?), ref: 00C710E3
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ActivateLibraryLoad
                                    • String ID:
                                    • API String ID: 389599620-0
                                    • Opcode ID: 2f36d92284e084c7d71a82c5d2098ef76a2cf76f8b82fd68a4eb19cf42b3ad78
                                    • Instruction ID: 7e101bb5c6f929239ac1c94c7d3cbfce0f0b1d3659bc702faeb39f2ba6742091
                                    • Opcode Fuzzy Hash: 2f36d92284e084c7d71a82c5d2098ef76a2cf76f8b82fd68a4eb19cf42b3ad78
                                    • Instruction Fuzzy Hash: EAF01C70D00319AFCF50AFA9CC46AADBAB4BF08711F508516E495E7251D7348A42AFA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00C7AF9D
                                    • CreateMutexW.KERNELBASE(?,?,?,?,00000004,00C6376A,00000000,InstallManager.exe,00000000,?), ref: 00C7AFC2
                                      • Part of subcall function 00C6D035: __CxxThrowException@8.LIBCMT ref: 00C6D04B
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CreateException@8H_prolog3MutexThrow
                                    • String ID:
                                    • API String ID: 3929176447-0
                                    • Opcode ID: 8f74d3b39b58af8f9e0689ac9526f02c6a7233b821f7ba24609e4d66a9815f21
                                    • Instruction ID: 4aeeb3dbdc066f7a160e675443d953cdd03bc53d73b575c441b0a8605cd9652c
                                    • Opcode Fuzzy Hash: 8f74d3b39b58af8f9e0689ac9526f02c6a7233b821f7ba24609e4d66a9815f21
                                    • Instruction Fuzzy Hash: 2AE01A74500316EBCF226FA0CC56B9E7BB0FF00350F00C019F919AA261DB718A11AB64
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __getptd.LIBCMT ref: 00D6CAE7
                                      • Part of subcall function 00D6FFE8: __getptd_noexit.LIBCMT ref: 00D6FFEB
                                      • Part of subcall function 00D6FFE8: __amsg_exit.LIBCMT ref: 00D6FFF8
                                      • Part of subcall function 00D6CABC: __getptd_noexit.LIBCMT ref: 00D6CAC1
                                      • Part of subcall function 00D6CABC: __freeptd.LIBCMT ref: 00D6CACB
                                      • Part of subcall function 00D6CABC: ExitThread.KERNEL32 ref: 00D6CAD4
                                    • __XcptFilter.LIBCMT ref: 00D6CB08
                                      • Part of subcall function 00D6F6A2: __getptd_noexit.LIBCMT ref: 00D6F6A8
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: __getptd_noexit$ExitFilterThreadXcpt__amsg_exit__freeptd__getptd
                                    • String ID:
                                    • API String ID: 418257734-0
                                    • Opcode ID: 01759465292602a7bfe6acbf8e07d041cb497e5ed8d3f2b2814ed5c4f1db56c3
                                    • Instruction ID: debd4a6e1f115d4ae6951a2bf836e4f21ea76a64d50a178ccaeddd9bcf7e50eb
                                    • Opcode Fuzzy Hash: 01759465292602a7bfe6acbf8e07d041cb497e5ed8d3f2b2814ed5c4f1db56c3
                                    • Instruction Fuzzy Hash: AAE0E2B1944A04EFEB08FBE4D816E7E7B75EF44311F200099F1026B2A2CA75A944DA75
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetCurrentThreadId.KERNEL32 ref: 00C7B7C0
                                    • SetWindowsHookExW.USER32(000000FF,Function_0002B612,00000000,00000000), ref: 00C7B7D0
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CurrentHookThreadWindows
                                    • String ID:
                                    • API String ID: 1904029216-0
                                    • Opcode ID: ca2caefa6611affd2026760696e7d03d459f548b8611acacce6557cb7357525c
                                    • Instruction ID: 1b1ef9f7a388920b7ca47656de82ef641c48b870a751ac94ac0c0bb7e6d7ca6d
                                    • Opcode Fuzzy Hash: ca2caefa6611affd2026760696e7d03d459f548b8611acacce6557cb7357525c
                                    • Instruction Fuzzy Hash: F4D0A9318043107EEB382BB0BE0AB2A3AD4AB04360F144242F125EA6D2D7208C828BB5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C6855B: _malloc.LIBCMT ref: 00C68579
                                      • Part of subcall function 00C60280: LoadIconW.USER32(?,00000088), ref: 00C602E8
                                    • Sleep.KERNELBASE(00000064,00C66900,00000000,00000000,00000000,00000000,00000000), ref: 00C64780
                                    • Sleep.KERNELBASE(000000C8), ref: 00C647A6
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Sleep$IconLoad_malloc
                                    • String ID:
                                    • API String ID: 204795271-0
                                    • Opcode ID: 24385b1319f5c8afacee6c45411133d796fa99495a7dab23deaef4b4ac942b7a
                                    • Instruction ID: 64855c2533831001b6754ddd56725a1a2ca3df881ba5011d13d5738d6512b77f
                                    • Opcode Fuzzy Hash: 24385b1319f5c8afacee6c45411133d796fa99495a7dab23deaef4b4ac942b7a
                                    • Instruction Fuzzy Hash: 21B14FB0A00705CFDB28DF68C8C5B69B7B1FF49300F24466AE519DB391D775AA41CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C7711D: __EH_prolog3_GS.LIBCMT ref: 00C77127
                                      • Part of subcall function 00C7711D: GetFullPathNameW.KERNEL32(00000000,00000104,?,?,00000268,00C77302,?,?,00000000,?,00C6AC26,?,?,00000006), ref: 00C77165
                                    • CreateFileW.KERNELBASE(00000000,80000000,00000000,0000000C,00000003,00000080,00000000,?,00000000,?,00000000,00000000,0000000D), ref: 00C774BD
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CreateFileFullH_prolog3_NamePath
                                    • String ID:
                                    • API String ID: 2133410154-0
                                    • Opcode ID: b39ed297f84363645ef7bf00cd88ced00ebb3562deb3fc56a7b0c2eae2d2bfac
                                    • Instruction ID: a81607cee46be78241d99ec2903e6ff2891867e2b5a5854b9f6b8d087696dd94
                                    • Opcode Fuzzy Hash: b39ed297f84363645ef7bf00cd88ced00ebb3562deb3fc56a7b0c2eae2d2bfac
                                    • Instruction Fuzzy Hash: 2851D67154420D9BEB349F25CC89BEABBA5FB50304F24C6A9E52DD2190D7789E80DF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_catch_GS.LIBCMT ref: 00C73311
                                      • Part of subcall function 00C7E4EC: __EH_prolog3.LIBCMT ref: 00C7E4F3
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: H_prolog3$Exception@8H_prolog3_catch_Throw
                                    • String ID:
                                    • API String ID: 2285297229-0
                                    • Opcode ID: b6153a56e6a94a6e52ee572e963bede5770603b07713f841189fd1f173d4aa80
                                    • Instruction ID: 76303134f52d6f232ac61aef164e5a50cf1c4ee4dc543acaf40b11aa692f1d88
                                    • Opcode Fuzzy Hash: b6153a56e6a94a6e52ee572e963bede5770603b07713f841189fd1f173d4aa80
                                    • Instruction Fuzzy Hash: 6A311C75E00249DFCF14DFA9C8818DEBBF6FF48310F11846AE905AB261D730AA41DBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: _memcpy_s
                                    • String ID:
                                    • API String ID: 2001391462-0
                                    • Opcode ID: b3c72b15118b53a334e5c58e014f929b5a5b97173ee7f0de08047e27db4498e0
                                    • Instruction ID: c6a20ed3772f572757c3b9f2eb35cd2a502767a4487ed80d481530dacf6ce047
                                    • Opcode Fuzzy Hash: b3c72b15118b53a334e5c58e014f929b5a5b97173ee7f0de08047e27db4498e0
                                    • Instruction Fuzzy Hash: EC21A171600105EFCB24DF69D8E8D7EB3E9EF94310B608629F954DB340EE31AE559BA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C6B395: __EH_prolog3.LIBCMT ref: 00C6B39C
                                    • LoadIconW.USER32(?,00000088), ref: 00C602E8
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: H_prolog3IconLoad
                                    • String ID:
                                    • API String ID: 763042285-0
                                    • Opcode ID: 08afdd1bcd12b0625afd3a55f7011f4fceb7666083effb63cdcc6361bc6aa4cb
                                    • Instruction ID: e77ec4edc471c94073e23da5a2155b993fcd8dd7bdec791bd884874d67be9319
                                    • Opcode Fuzzy Hash: 08afdd1bcd12b0625afd3a55f7011f4fceb7666083effb63cdcc6361bc6aa4cb
                                    • Instruction Fuzzy Hash: BD3118B0504744DFD720DFA9C445B9AFBE8EF65300F10854EE8AA97342DBB42A08DB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: _memcpy_s
                                    • String ID:
                                    • API String ID: 2001391462-0
                                    • Opcode ID: 14c7c114d027fe1f51e070122f4cb604f6220726bbe7e1b2ef4a4df256b71bf4
                                    • Instruction ID: 336abad72289bce0dd0410b966243bfc4cab1891e1518940041737be61b0b626
                                    • Opcode Fuzzy Hash: 14c7c114d027fe1f51e070122f4cb604f6220726bbe7e1b2ef4a4df256b71bf4
                                    • Instruction Fuzzy Hash: 01118F7A200A05AFC709CF5CC891CAAB3B9FF89310761865DE9598B351EB31ED41CBD4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00C7E4F3
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: H_prolog3$Exception@8Throw
                                    • String ID:
                                    • API String ID: 2489616738-0
                                    • Opcode ID: 9293cb538e7859668d77a1086fbc58c6f22c79703ad143cb7413f4963b95b115
                                    • Instruction ID: 6003d2cb5b78d968ecf0e0230426aecce793445a250051e32d4482c3eafe58ea
                                    • Opcode Fuzzy Hash: 9293cb538e7859668d77a1086fbc58c6f22c79703ad143cb7413f4963b95b115
                                    • Instruction Fuzzy Hash: 67015A72600246CBDB64AF74C85562D7AF6AB983A5B148168E45ACB391EB30CE00DB20
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • KiUserCallbackDispatcher.NTDLL(18846CE9,18846CE9,00000000,7508E8E0,?,00C77D05,00000004,00C6319B,?,?,80070057,00000000,?,00C69C01,000000FF), ref: 00C72349
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CallbackDispatcherUser
                                    • String ID:
                                    • API String ID: 2492992576-0
                                    • Opcode ID: c3435aed7e1e5e30e5727c97f5b7f27121a6c4a54858ce50ac67983dfcb93716
                                    • Instruction ID: 22fbe61b10f50cbd53a63e2d0affbd8a3d0919d12f39279dc62b8d4bc09de644
                                    • Opcode Fuzzy Hash: c3435aed7e1e5e30e5727c97f5b7f27121a6c4a54858ce50ac67983dfcb93716
                                    • Instruction Fuzzy Hash: 87F0F432600A00DF4F369A36D84083673EAFBD5791729881AE4DED3630E634DD46DF11
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Parent
                                    • String ID:
                                    • API String ID: 975332729-0
                                    • Opcode ID: 243af91d76fc1e0198ba1eab2357489599d10aa4eb17e85989d14243333d8e14
                                    • Instruction ID: ecad3b9368ecc374bb0687b4f47929b8870284dd2f8f586518ca26e8895c71ff
                                    • Opcode Fuzzy Hash: 243af91d76fc1e0198ba1eab2357489599d10aa4eb17e85989d14243333d8e14
                                    • Instruction Fuzzy Hash: F1F037326002116B8B20666798045ABB76CEF91761B198532ED59E7200D630ED01D5E5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 80be9ee0d5cd37b9066cb99ea2aa54a52926f05a199a36e1ff90730c1c3b5291
                                    • Instruction ID: 8627ca75a92f5efbe92c893ba66f1f655d4c7a33a4d55f257a10dbfe0621e924
                                    • Opcode Fuzzy Hash: 80be9ee0d5cd37b9066cb99ea2aa54a52926f05a199a36e1ff90730c1c3b5291
                                    • Instruction Fuzzy Hash: 1DF0F832401199BB8F275E919D048EA3F69BF08361F00C421FA7991020C775CB21FBB6
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindResourceW.KERNELBASE(?,?,00000006), ref: 00C55128
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: FindResource
                                    • String ID:
                                    • API String ID: 1635176832-0
                                    • Opcode ID: ee186ddacbfd333cd366ec50abd87acfe3d7fd780519c5b2da4b756fea2646b3
                                    • Instruction ID: c23bfc29fab7eb106a459b5d543142e4788ce274f5ed27a00fa65ee59285dce5
                                    • Opcode Fuzzy Hash: ee186ddacbfd333cd366ec50abd87acfe3d7fd780519c5b2da4b756fea2646b3
                                    • Instruction Fuzzy Hash: F8E0C22A70012837E5205A5EFC11EBBB76CCBC2BB6B000037FD4DDA240D261AC56A2F1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __wcsicoll.LIBCMT ref: 00C7FC8C
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Exception@8H_prolog3Throw__wcsicoll
                                    • String ID:
                                    • API String ID: 1238845444-0
                                    • Opcode ID: 80c75aade497c7589381de761f0a6babb63f4aced4094cdf8594e5154b5588fa
                                    • Instruction ID: aab93959a1594dca05f214080617edd7b5aff6f6a55cb3078f71442bf07a0fcd
                                    • Opcode Fuzzy Hash: 80c75aade497c7589381de761f0a6babb63f4aced4094cdf8594e5154b5588fa
                                    • Instruction Fuzzy Hash: 92E0223220011CA7CB21AE28DC91EDF3758CF00755F008229FC1A861D2DF31EA82E2E9
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: _malloc
                                    • String ID:
                                    • API String ID: 1579825452-0
                                    • Opcode ID: d14f3ef23236044337d5e217681e9abe3888225cd7f27ef88f01d881b3cfd720
                                    • Instruction ID: 50f00fc39f75ee527743f9d3656d973d5711792b6d80965ebe14084e46fb1643
                                    • Opcode Fuzzy Hash: d14f3ef23236044337d5e217681e9abe3888225cd7f27ef88f01d881b3cfd720
                                    • Instruction Fuzzy Hash: D1E092335006156BC7108F4AD458B46FBDCDFA5370F16C427E508DB252CAB1E8488BA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _malloc.LIBCMT ref: 00C68579
                                      • Part of subcall function 00D69251: __FF_MSGBANNER.LIBCMT ref: 00D6926A
                                      • Part of subcall function 00D69251: __NMSG_WRITE.LIBCMT ref: 00D69271
                                      • Part of subcall function 00D69251: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,00D737CE,?,00000001,?,?,00D7745C,00000018,00DD82F0,0000000C,00D774EC), ref: 00D69296
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AllocateHeap_malloc
                                    • String ID:
                                    • API String ID: 501242067-0
                                    • Opcode ID: 4d3f20f7bec5104bddeb812274e1cd58cc137f5da49b1792d13a02f9bb9d79ac
                                    • Instruction ID: 25c6c24368228eb0640d3e7aec33ea2943e87f27d7769356e7d8d4c3e47dacf8
                                    • Opcode Fuzzy Hash: 4d3f20f7bec5104bddeb812274e1cd58cc137f5da49b1792d13a02f9bb9d79ac
                                    • Instruction Fuzzy Hash: 70D05B3260522567EF315B95DC545557748DB817F07584232FD1ADB160EE61DE4483E0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsDialogMessageW.USER32(?,?), ref: 00C6EAED
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: DialogMessage
                                    • String ID:
                                    • API String ID: 547518314-0
                                    • Opcode ID: 178b7c0cc1fe44b96f3411f377942b0a3dfbcb9aaf3845e29dd098d698f69bd7
                                    • Instruction ID: 5a1c93b5c2d8ef6bec0740413d7036f4a2cb0c5fc9c8f76ad2d15518ef05c7a8
                                    • Opcode Fuzzy Hash: 178b7c0cc1fe44b96f3411f377942b0a3dfbcb9aaf3845e29dd098d698f69bd7
                                    • Instruction Fuzzy Hash: FDE08636100214ABC7215BD5D848DD67FA9FF493207004016F58587522CBB1DC90EBD0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00C71CE2
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: MessagePost
                                    • String ID:
                                    • API String ID: 410705778-0
                                    • Opcode ID: a6d331b59dbace2e2ba9574ae8ba214a5abff07e7eb2889ddf4b96d23c14a80e
                                    • Instruction ID: 38090ecb04cace88dd271ee53fcbd2dba6476e60466f414b9d53ebdc6856a3f5
                                    • Opcode Fuzzy Hash: a6d331b59dbace2e2ba9574ae8ba214a5abff07e7eb2889ddf4b96d23c14a80e
                                    • Instruction Fuzzy Hash: 4FD017B2110244AFA300EF68CC45D363BAEFB44324328416AB858CA2A2D332EC13CA20
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SendMessageW.USER32(18846CE9,0000102B,?,?), ref: 00C77A09
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID:
                                    • API String ID: 3850602802-0
                                    • Opcode ID: e1c36f730f460c78386d595dcecef59dae8ef74ced61ea0a41317c43d648f984
                                    • Instruction ID: 32520b638d48e3e23638c2fddedc454e9b38d8bbc1b2c4c470332491bfb0e674
                                    • Opcode Fuzzy Hash: e1c36f730f460c78386d595dcecef59dae8ef74ced61ea0a41317c43d648f984
                                    • Instruction Fuzzy Hash: 4FE0E276900208BBCB00EFA8D845CDEBBB8FB48304B008126FD14AA260D770D8228BA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00C6BFA8
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CallbackDispatcherUser
                                    • String ID:
                                    • API String ID: 2492992576-0
                                    • Opcode ID: f802446f6094f1d0043161a4279c5d9093d425cbbaf2086dca44c4a02316ab90
                                    • Instruction ID: 0a632fb98d07bea6ca4a5adc77c92e248411f23fa706c8f9e655e681fd1563ae
                                    • Opcode Fuzzy Hash: f802446f6094f1d0043161a4279c5d9093d425cbbaf2086dca44c4a02316ab90
                                    • Instruction Fuzzy Hash: 59D01236000248EBCB215B99D848ED57FE5EF45361B048065F98582530CB729D509B90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00CA1AE1: GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 00CA1B14
                                      • Part of subcall function 00CA1AE1: _memset.LIBCMT ref: 00CA1B2D
                                    • SystemParametersInfoW.USER32(00000029,?,?,00000000), ref: 00C7EA13
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AddressInfoParametersProcSystem_memset
                                    • String ID:
                                    • API String ID: 831922234-0
                                    • Opcode ID: 56cc94e9a72761a06369de02dd31a23ac1182b6c607545e256aeae5bb168722d
                                    • Instruction ID: f6d8d2878742acd79b16e722a89d6db602c2148c0f129b9972b25e4b7a537b89
                                    • Opcode Fuzzy Hash: 56cc94e9a72761a06369de02dd31a23ac1182b6c607545e256aeae5bb168722d
                                    • Instruction Fuzzy Hash: 28D01271180205BFE7115B80DC09FA73B69EB95728F144462F909CF191CAB5AC50A679
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ShowWindow
                                    • String ID:
                                    • API String ID: 1268545403-0
                                    • Opcode ID: 8a88ab6733a484d2a645b6a4fde50388587f2c61147da4ed47c9f29617ac83f7
                                    • Instruction ID: 84d0055faeac71d1b69f22a8b42dcf53026751ea96bdeeef94e4c1fe38728535
                                    • Opcode Fuzzy Hash: 8a88ab6733a484d2a645b6a4fde50388587f2c61147da4ed47c9f29617ac83f7
                                    • Instruction Fuzzy Hash: 54D092B6140608EFCB509B41D848BA17BA5FB9931AF6080AAE6594A622C7339862DF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • DeleteObject.GDI32(00000000), ref: 00C6DB58
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: DeleteObject
                                    • String ID:
                                    • API String ID: 1531683806-0
                                    • Opcode ID: c0278369bd578bac175ce431607f484ab5a94b0615256ea28e0e8e652499dd3a
                                    • Instruction ID: 45ede029551ba63b665efb7a63f9b1c2772d9d26c6e7038cce765bcaa471af2f
                                    • Opcode Fuzzy Hash: c0278369bd578bac175ce431607f484ab5a94b0615256ea28e0e8e652499dd3a
                                    • Instruction Fuzzy Hash: FBB09260E12205ABCE20AB309948B2625585BC1306F0188A4A006D210ADA3A8401D920
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsWindowVisible.USER32(?), ref: 00CE11EB
                                    • GetWindowRect.USER32(?,?), ref: 00CE120E
                                    • PtInRect.USER32(?,?,?), ref: 00CE121C
                                      • Part of subcall function 00D1423F: RedrawWindow.USER32(?,00000000,00000000,00000105), ref: 00D142B6
                                    • GetAsyncKeyState.USER32(00000012), ref: 00CE1241
                                    • ScreenToClient.USER32(?,?), ref: 00CE128F
                                    • IsWindow.USER32(?), ref: 00CE12D6
                                    • IsWindow.USER32(?), ref: 00CE1319
                                    • GetWindowRect.USER32(?,?), ref: 00CE1339
                                    • PtInRect.USER32(?,?,?), ref: 00CE1349
                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00CE137E
                                    • PtInRect.USER32(-00000054,?,?), ref: 00CE13C9
                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00CE13EE
                                    • ScreenToClient.USER32(?,?), ref: 00CE1446
                                    • PtInRect.USER32(?,?,?), ref: 00CE1456
                                    • GetParent.USER32(?), ref: 00CE14E0
                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00CE1573
                                    • GetFocus.USER32 ref: 00CE1579
                                    • WindowFromPoint.USER32(?,?,00000000), ref: 00CE15B1
                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00CE15FB
                                    • GetSystemMenu.USER32(?,00000000,?,?,75A8A000,?), ref: 00CE1684
                                    • IsMenu.USER32(?), ref: 00CE16A6
                                    • EnableMenuItem.USER32(?,0000F030,00000000), ref: 00CE16C3
                                    • EnableMenuItem.USER32(?,0000F120,00000000), ref: 00CE16CE
                                    • IsZoomed.USER32(?), ref: 00CE16DC
                                    • IsIconic.USER32(?), ref: 00CE16FB
                                    • EnableMenuItem.USER32(?,0000F120,00000003), ref: 00CE170F
                                    • TrackPopupMenu.USER32(?,00000100,?,?,00000000,?,00000000), ref: 00CE1737
                                    • SendMessageW.USER32(?,00000112,00000000,00000000), ref: 00CE1751
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$MenuRect$MessageSend$EnableItem$ClientScreen$AsyncFocusFromIconicParentPointPopupRedrawStateSystemTrackVisibleZoomed
                                    • String ID:
                                    • API String ID: 3398603409-0
                                    • Opcode ID: a39fb7daf01b467a515f872ef17bab699689b5a6c5a235463a6192d54a396716
                                    • Instruction ID: 96e1d9ce686a29971db8dc818eb2bf7027366c6c4854fcc89e3799c6473fd3f0
                                    • Opcode Fuzzy Hash: a39fb7daf01b467a515f872ef17bab699689b5a6c5a235463a6192d54a396716
                                    • Instruction Fuzzy Hash: F5F15F71A00249AFDB209FA5DC84EADBBF9FB48340F18446AF955E7260DB319D50DF60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00C8827D
                                    • GetParent.USER32(?), ref: 00C882D8
                                    • GetParent.USER32(?), ref: 00C882F4
                                    • UpdateWindow.USER32(?), ref: 00C8833C
                                    • SetCursor.USER32 ref: 00C88361
                                    • GetAsyncKeyState.USER32(00000012), ref: 00C883C3
                                    • UpdateWindow.USER32(?), ref: 00C884C9
                                    • InflateRect.USER32(?,00000002,00000002), ref: 00C88529
                                    • SetCapture.USER32(?), ref: 00C88532
                                    • SetCursor.USER32(00000000), ref: 00C8854A
                                    • IsWindow.USER32(?), ref: 00C885E8
                                    • GetCursorPos.USER32(?), ref: 00C88627
                                    • ScreenToClient.USER32(?,?), ref: 00C88634
                                    • PtInRect.USER32(?,?,?), ref: 00C88650
                                    • RedrawWindow.USER32(?,00000000,00000000,00000505), ref: 00C886C4
                                    • GetParent.USER32(?), ref: 00C886DF
                                    • GetParent.USER32(?), ref: 00C886F3
                                    • RedrawWindow.USER32(?,00000000,00000000,00000505,00000000), ref: 00C88705
                                    • RedrawWindow.USER32(?,00000000,00000000,00000505), ref: 00C88727
                                    • GetParent.USER32(?), ref: 00C88730
                                    • GetParent.USER32(?), ref: 00C8874B
                                    • GetParent.USER32(?), ref: 00C88756
                                    • InvalidateRect.USER32(?,?,00000001), ref: 00C8878E
                                    • RedrawWindow.USER32(?,00000000,00000000,00000505,00000000,?,00000000), ref: 00C888C6
                                      • Part of subcall function 00C859DF: InvalidateRect.USER32(?,?,00000001), ref: 00C85A54
                                      • Part of subcall function 00C859DF: InflateRect.USER32(?,?,?), ref: 00C85A9A
                                      • Part of subcall function 00C859DF: RedrawWindow.USER32(?,?,00000000,00000401,?,?), ref: 00C85AAD
                                    • UpdateWindow.USER32(?), ref: 00C88826
                                    • UpdateWindow.USER32(?), ref: 00C88885
                                    • SetCapture.USER32(?,?,00000000), ref: 00C88890
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$Parent$RectRedraw$Update$Cursor$CaptureInflateInvalidate$AsyncClientH_prolog3_ScreenState
                                    • String ID:
                                    • API String ID: 991125134-0
                                    • Opcode ID: 2c91636ac89b5af205c64c17851edb72ce0c066dcffcbe2e10dab7ea697fd98e
                                    • Instruction ID: 6124bc530fba9c369b6d53aca615abdb1d28eb9f60daf10c128bedb444d4b0a1
                                    • Opcode Fuzzy Hash: 2c91636ac89b5af205c64c17851edb72ce0c066dcffcbe2e10dab7ea697fd98e
                                    • Instruction Fuzzy Hash: B5026970A00210DFCF15BF64C899AAD7BB5FF48714B544279F81AEA6A6CF308948DF64
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00D0048A
                                      • Part of subcall function 00CCE17B: FillRect.USER32(?,?), ref: 00CCE18F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: FillH_prolog3Rect
                                    • String ID: d
                                    • API String ID: 1863035756-2564639436
                                    • Opcode ID: f96794cba67165e2d83e56e42b7912416d77036fc8703be705cfdaad1d1579f7
                                    • Instruction ID: a3334054ee26a5e18b501fa783e9897d6f49cd423726604729e68a74ea29ddfe
                                    • Opcode Fuzzy Hash: f96794cba67165e2d83e56e42b7912416d77036fc8703be705cfdaad1d1579f7
                                    • Instruction Fuzzy Hash: 4AC1B971A00229ABCF14EFA8CC95ABEBFB4EF48300F14452AF555E6291C734D955DBB0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsWindow.USER32(?), ref: 00CA831A
                                    • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 00CA8336
                                    • GetCapture.USER32 ref: 00CA83B0
                                    • GetKeyState.USER32(00000011), ref: 00CA8412
                                    • GetKeyState.USER32(00000010), ref: 00CA841F
                                    • ImmGetContext.IMM32(?), ref: 00CA842D
                                    • ImmGetOpenStatus.IMM32(00000000,?), ref: 00CA843A
                                    • ImmReleaseContext.IMM32(?,00000000,?), ref: 00CA845C
                                    • GetFocus.USER32 ref: 00CA8486
                                    • IsWindow.USER32(?), ref: 00CA84C7
                                    • IsWindow.USER32(?), ref: 00CA854D
                                    • ClientToScreen.USER32(?,?), ref: 00CA855D
                                    • IsWindow.USER32(?), ref: 00CA8583
                                    • ClientToScreen.USER32(?,?), ref: 00CA85B2
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$ClientContextScreenState$CaptureFocusMessageOpenReleaseSendStatus
                                    • String ID:
                                    • API String ID: 1155058817-0
                                    • Opcode ID: cd8bb5d69877da24aa763f004b56e56795109644ebf6985a885f23be3bdeb79e
                                    • Instruction ID: c6acf41a05b2e188ed315319c47430efa908722a8a5c46ab3c3971ab7691bc5e
                                    • Opcode Fuzzy Hash: cd8bb5d69877da24aa763f004b56e56795109644ebf6985a885f23be3bdeb79e
                                    • Instruction Fuzzy Hash: F7A1D031900607EFDF24ABA0CC94ABEBBB4FF16708F10452AE566D6561DF34DA58DB20
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsWindow.USER32(?), ref: 00CA6471
                                    • SendMessageW.USER32(?,0000001F,00000000,00000000), ref: 00CA648D
                                    • GetCapture.USER32 ref: 00CA650D
                                    • GetKeyState.USER32(00000011), ref: 00CA6560
                                    • GetKeyState.USER32(00000010), ref: 00CA656D
                                    • ImmGetContext.IMM32(?), ref: 00CA657B
                                    • ImmGetOpenStatus.IMM32(00000000,?), ref: 00CA6588
                                    • ImmReleaseContext.IMM32(00000000,00000000,?), ref: 00CA65AA
                                    • GetFocus.USER32 ref: 00CA65D4
                                    • IsWindow.USER32(?), ref: 00CA6615
                                    • IsWindow.USER32(?), ref: 00CA669B
                                    • ClientToScreen.USER32(?,?), ref: 00CA66AB
                                    • IsWindow.USER32(?), ref: 00CA66D1
                                    • ClientToScreen.USER32(?,?), ref: 00CA6700
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$ClientContextScreenState$CaptureFocusMessageOpenReleaseSendStatus
                                    • String ID:
                                    • API String ID: 1155058817-0
                                    • Opcode ID: af76f347ad3ac5c46de8d9315d114281f06f68d63ce3b0449ad2692ee52e681d
                                    • Instruction ID: a79fac032592d4ee652aa121e7f60704092237d5074a2a64034c36a465b800d4
                                    • Opcode Fuzzy Hash: af76f347ad3ac5c46de8d9315d114281f06f68d63ce3b0449ad2692ee52e681d
                                    • Instruction Fuzzy Hash: DB91C331500607EFDF25AFA0C894A7DB7B5EF1A308F18842AE566D6161DB31DE90DB20
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetRectEmpty.USER32(?), ref: 00C88D7C
                                    • RedrawWindow.USER32(?,00000000,00000000,00000505), ref: 00C88D9A
                                    • ReleaseCapture.USER32 ref: 00C88DA0
                                    • SetCapture.USER32(?), ref: 00C88DB3
                                    • ReleaseCapture.USER32 ref: 00C88E28
                                    • SetCapture.USER32(?), ref: 00C88E3B
                                    • SendMessageW.USER32(?,00000362,0000E001,00000000), ref: 00C88F14
                                    • UpdateWindow.USER32(?), ref: 00C88F77
                                    • SendMessageW.USER32(?,00000111,000000FF,00000000), ref: 00C88FBF
                                    • IsWindow.USER32(?), ref: 00C88FCA
                                    • IsIconic.USER32(?), ref: 00C88FD7
                                    • IsZoomed.USER32(?), ref: 00C88FE4
                                    • IsWindow.USER32(?), ref: 00C88FF8
                                    • UpdateWindow.USER32(?), ref: 00C89044
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$Capture$MessageReleaseSendUpdate$EmptyIconicRectRedrawZoomed
                                    • String ID:
                                    • API String ID: 2500574155-0
                                    • Opcode ID: a314e76cbf6485e0e0fc3e0c34dc9903d28b28692a4feaa6cdd1f0a599aced71
                                    • Instruction ID: ab62ffbc64edcf00485da38aa7a565ed5ea6d40c0497fbd4f55277b7feb363ff
                                    • Opcode Fuzzy Hash: a314e76cbf6485e0e0fc3e0c34dc9903d28b28692a4feaa6cdd1f0a599aced71
                                    • Instruction Fuzzy Hash: 9DA15B30600205EFCF16AF64CC89AAD7BB6FF48315F1541B9F8199B6A6CF319A44DB24
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetSystemMetrics.USER32(00000021), ref: 00CE094D
                                    • GetSystemMetrics.USER32(00000020), ref: 00CE0954
                                    • IsIconic.USER32(?), ref: 00CE0968
                                    • GetWindowRect.USER32(?,00000020), ref: 00CE09A9
                                    • IsIconic.USER32(?), ref: 00CE09CD
                                    • GetSystemMetrics.USER32(00000004), ref: 00CE09D9
                                    • OffsetRect.USER32(00000020,?,?), ref: 00CE09EB
                                    • GetSystemMetrics.USER32(00000004), ref: 00CE09F3
                                    • IsIconic.USER32(?), ref: 00CE0A21
                                    • GetSystemMetrics.USER32(00000021), ref: 00CE0A2D
                                    • GetSystemMetrics.USER32(00000020), ref: 00CE0A34
                                      • Part of subcall function 00C6EAF8: GetWindowLongW.USER32(?,000000F0), ref: 00C6EB03
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: MetricsSystem$Iconic$RectWindow$LongOffset
                                    • String ID:
                                    • API String ID: 993849457-0
                                    • Opcode ID: 4746611471f7ae7c281d0652c9d536aa549c4ef9a29c14f5ce7a62c6f1e4c8bb
                                    • Instruction ID: a9340a944ad4fe97d7bb6dca1980fb78347639da1e2d3909e782db41bf509181
                                    • Opcode Fuzzy Hash: 4746611471f7ae7c281d0652c9d536aa549c4ef9a29c14f5ce7a62c6f1e4c8bb
                                    • Instruction Fuzzy Hash: B941E571A003099FDB04DFA9C885BAEBBF5FF48300F14406AE519E7251D774A941DFA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsWindowVisible.USER32(?), ref: 00CE0C51
                                    • ScreenToClient.USER32(?,?), ref: 00CE0CCF
                                    • GetSystemMetrics.USER32(00000021), ref: 00CE0CDD
                                    • GetSystemMetrics.USER32(00000020), ref: 00CE0CE6
                                    • IsIconic.USER32(?), ref: 00CE0CF4
                                    • GetSystemMetrics.USER32(00000004), ref: 00CE0D00
                                    • PtInRect.USER32(00000000,?,?), ref: 00CE0D47
                                    • PtInRect.USER32(?,?,?), ref: 00CE0D70
                                    • GetSystemMetrics.USER32(00000004), ref: 00CE0D86
                                    • PtInRect.USER32(00000020,?,?), ref: 00CE0D9E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: MetricsSystem$Rect$ClientIconicScreenVisibleWindow
                                    • String ID:
                                    • API String ID: 1122842830-0
                                    • Opcode ID: 5a5fe34f582745cc79ea2d2de4bab0941d3606a812b6dd58755dd26b2c41a9ac
                                    • Instruction ID: 498135893258e997f186d8d9903a9382ee70cccea74d3e4359902fa38f8647fa
                                    • Opcode Fuzzy Hash: 5a5fe34f582745cc79ea2d2de4bab0941d3606a812b6dd58755dd26b2c41a9ac
                                    • Instruction Fuzzy Hash: 90518E31A00219AFCF14DFA5C980AAEB7B9FF08710F244165E919EB210DB70EE41DBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00C6A7C6
                                    • SetLastError.KERNEL32(0000007B,?,?,00000104), ref: 00C6A7D5
                                      • Part of subcall function 00C6855B: _malloc.LIBCMT ref: 00C68579
                                    • FindFirstFileW.KERNEL32(?,?), ref: 00C6A7E2
                                    • GetLastError.KERNEL32(?,?), ref: 00C6A7F0
                                    • __wfullpath.LIBCMT ref: 00C6A83C
                                    • __wsplitpath_s.LIBCMT ref: 00C6A87C
                                    • __wmakepath_s.LIBCMT ref: 00C6A89B
                                      • Part of subcall function 00C6A366: GetModuleHandleW.KERNEL32(kernel32.dll,?,00000104,?,00C6A7C3,?,?), ref: 00C6A37A
                                      • Part of subcall function 00C6A366: GetProcAddress.KERNEL32(00000000,FindFirstFileTransactedW), ref: 00C6A38A
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ErrorLast$AddressFileFindFirstHandleModuleProc__wfullpath__wmakepath_s__wsplitpath_s_malloclstrlen
                                    • String ID:
                                    • API String ID: 1521982810-0
                                    • Opcode ID: 8dcdbae0191ad8144e9f27ed8cffce2231c8c1a1592c5831c1f020660c1ece0e
                                    • Instruction ID: 40c6dfca1a5d396a199467b8bc7aa99f9454f243d88afe0e503e79df0304ca6c
                                    • Opcode Fuzzy Hash: 8dcdbae0191ad8144e9f27ed8cffce2231c8c1a1592c5831c1f020660c1ece0e
                                    • Instruction Fuzzy Hash: 4F41E570940204BBCB20ABB5CCC9EAFB7BCEF58310F00456AB525E3292DA709944DFB5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsDebuggerPresent.KERNEL32 ref: 00D7048E
                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00D704A3
                                    • UnhandledExceptionFilter.KERNEL32(00DB936C), ref: 00D704AE
                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 00D704CA
                                    • TerminateProcess.KERNEL32(00000000), ref: 00D704D1
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                    • String ID:
                                    • API String ID: 2579439406-0
                                    • Opcode ID: b380f37635e243d0eff69d3a69424a2538a3f50bb4df58a7a4def55323280207
                                    • Instruction ID: 7b6dc4bb1b3cf1c0c63789d40388760996a2af277c734753c62853b613cbe239
                                    • Opcode Fuzzy Hash: b380f37635e243d0eff69d3a69424a2538a3f50bb4df58a7a4def55323280207
                                    • Instruction Fuzzy Hash: BE21ACB8801386EFC700FF68E8C96583BB4FB08714F51911AE509DA760E7B469858FB6
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000104,?,00C6A7C3,?,?), ref: 00C6A37A
                                    • GetProcAddress.KERNEL32(00000000,FindFirstFileTransactedW), ref: 00C6A38A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProc
                                    • String ID: FindFirstFileTransactedW$kernel32.dll
                                    • API String ID: 1646373207-2878570079
                                    • Opcode ID: 99e185972d0d7be751d9bb5dbdaba460a1d6be5935c5e42138708af5a62f66d3
                                    • Instruction ID: e88426bbf0e0c850b1289f466cad5beb4758bbb24b55efbf92d71c69d63e86be
                                    • Opcode Fuzzy Hash: 99e185972d0d7be751d9bb5dbdaba460a1d6be5935c5e42138708af5a62f66d3
                                    • Instruction Fuzzy Hash: 80F08232200600BB87311B9AAC48C67BB6AEBD1B61324867BF565E1270C6328D81DB71
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CoInitialize.OLE32(00000000), ref: 00C7EC8C
                                    • CoCreateInstance.OLE32(00DBC750,00000000,00000001,00D96B84,00DE67EC,-0000043C,?,?,00CA2859,00000000,?,00D0BDAD), ref: 00C7ECAA
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CreateInitializeInstance
                                    • String ID:
                                    • API String ID: 3519745914-0
                                    • Opcode ID: 2dbd59736d55b37c0c6f8c125cfb91b925eebb2c9739ea5329b570932e226e66
                                    • Instruction ID: a8977b7e0e8c8d0992458d15300b779c8f603d9e21e2bc15a7481e795147e806
                                    • Opcode Fuzzy Hash: 2dbd59736d55b37c0c6f8c125cfb91b925eebb2c9739ea5329b570932e226e66
                                    • Instruction Fuzzy Hash: FEF05E7A240202EBDB21AF509CC8AE677A5EB98309F2444BDE6099A180C7725D868F60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetUserDefaultLCID.KERNEL32(18846CE9,?,?,?,?,00000000,00D8D669,000000FF,?,00C65CA7,?,?,?), ref: 00C66547
                                    • GetUserDefaultLCID.KERNEL32(?,?,00000000,00D8D669), ref: 00C66587
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: DefaultUser
                                    • String ID: ARE$BGR$CHS$CHT$CRO$CZE$DAN$DUT$FIN$FRA$GER$HEB$HUN$ITA$JPN$KOR$NOR$POL$POR$PTB$ROM$RUS$SPA$SVK$SVN$SWE$THA$TRK$VIT
                                    • API String ID: 3358694519-1769551305
                                    • Opcode ID: f7cc149300694cca4f5a3f54fc9a52ec2c9155d2d988e1ced7db18f0f732eab7
                                    • Instruction ID: d4b3a5ae7ecfb60107bef14bb27fce53788b7ed3b2e412b0d89b1d1e4b167121
                                    • Opcode Fuzzy Hash: f7cc149300694cca4f5a3f54fc9a52ec2c9155d2d988e1ced7db18f0f732eab7
                                    • Instruction Fuzzy Hash: 5551B128744A10EE99352B265DF397E21616B40FCDFF1046AF807662E1DED42B4D239F
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00CD2089
                                    • GetModuleFileNameW.KERNEL32(00000000,00C82778,00000104,?,?,00000A90,00CD263D,?,00000000,00000084,00CD2AE4,0000000A,0000000A,0000000A,00000000,00000014), ref: 00CD2138
                                    • __wsplitpath_s.LIBCMT ref: 00CD2164
                                    • __wsplitpath_s.LIBCMT ref: 00CD2183
                                    • __wmakepath_s.LIBCMT ref: 00CD21B0
                                    • _wcslen.LIBCMT ref: 00CD21BC
                                    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,00000A90,00CD263D,?,00000000,00000084,00CD2AE4,0000000A), ref: 00CD21F4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: File__wsplitpath_s$CreateH_prolog3_ModuleName__wmakepath_s_wcslen
                                    • String ID:
                                    • API String ID: 1221639053-3916222277
                                    • Opcode ID: 10ca4e896d94b367fdcff4a4d32cbd57bd116ffd29f9cfe804ac8bf2b318c015
                                    • Instruction ID: c66ec7e7027f5f9444db075fb76c64e5087f870dc45ad89ff4b8028c58238dd9
                                    • Opcode Fuzzy Hash: 10ca4e896d94b367fdcff4a4d32cbd57bd116ffd29f9cfe804ac8bf2b318c015
                                    • Instruction Fuzzy Hash: DDD11D75A00328ABCF20AF60CC95EADB778AB19314F1040EAF60AA2651DB355F94DF61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetWindowRect.USER32(?,?), ref: 00CB3486
                                    • PtInRect.USER32(?,?,?), ref: 00CB349C
                                    • GetClientRect.USER32(?,?), ref: 00CB34B9
                                    • PtInRect.USER32(?,?,?), ref: 00CB34D4
                                    • GetSystemMetrics.USER32(0000000D), ref: 00CB3500
                                    • GetSystemMetrics.USER32(0000000E), ref: 00CB350B
                                    • PtInRect.USER32(?,?,?), ref: 00CB354F
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$MetricsSystem$ClientWindow
                                    • String ID:
                                    • API String ID: 2286436557-0
                                    • Opcode ID: d320325fab19543c1a2635ae79b593039e78319252b4af1e4c684989eee03532
                                    • Instruction ID: f0f4bfd4eea6369d383eeb4be18ed0cf185bb6164fec61bc95971945e3184374
                                    • Opcode Fuzzy Hash: d320325fab19543c1a2635ae79b593039e78319252b4af1e4c684989eee03532
                                    • Instruction Fuzzy Hash: 09F1C3B1A0020EAFDF14DFE9CD84DEEBBB9EF48344F14412AE515E7250DA31EA059B60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C6EB12: GetWindowLongW.USER32(?,000000EC), ref: 00C6EB1D
                                    • GetClientRect.USER32(?,?), ref: 00C90290
                                    • CopyRect.USER32(?,?), ref: 00C902C2
                                      • Part of subcall function 00C6D57A: ScreenToClient.USER32(?,?), ref: 00C6D58B
                                      • Part of subcall function 00C6D57A: ScreenToClient.USER32(?,?), ref: 00C6D598
                                    • IntersectRect.USER32(?,?,?), ref: 00C90311
                                    • SetRectEmpty.USER32(?), ref: 00C9031F
                                    • IntersectRect.USER32(?,?,?), ref: 00C90351
                                    • SetRectEmpty.USER32(?), ref: 00C9035F
                                    • IsRectEmpty.USER32(?), ref: 00C9036F
                                    • IsRectEmpty.USER32(?), ref: 00C90379
                                    • GetWindowRect.USER32(?,?), ref: 00C903A4
                                    • GetWindowRect.USER32(?,?), ref: 00C903C7
                                    • UnionRect.USER32(?,?,?), ref: 00C903E4
                                    • EqualRect.USER32(?,?), ref: 00C903F2
                                    • GetWindowRect.USER32(?,?), ref: 00C9047D
                                    • IsRectEmpty.USER32(?), ref: 00C904E7
                                    • MapWindowPoints.USER32(?,?,?,00000002), ref: 00C90504
                                    • RedrawWindow.USER32(?,?,00000000,00000185), ref: 00C90518
                                    • IsRectEmpty.USER32(?), ref: 00C90532
                                    • EqualRect.USER32(?,?), ref: 00C90540
                                    • MapWindowPoints.USER32(?,?,?,00000002), ref: 00C9055D
                                    • RedrawWindow.USER32(?,?,00000000,00000185), ref: 00C90571
                                    • UpdateWindow.USER32(?), ref: 00C90586
                                    • IsRectEmpty.USER32(?), ref: 00C905CA
                                    • InvalidateRect.USER32(?,?,00000001), ref: 00C905DF
                                    • IsRectEmpty.USER32(?), ref: 00C905E5
                                    • EqualRect.USER32(?,?), ref: 00C905F7
                                    • InvalidateRect.USER32(?,?,00000001), ref: 00C9060A
                                    • UpdateWindow.USER32(?), ref: 00C9060F
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$Window$Empty$ClientEqual$IntersectInvalidatePointsRedrawScreenUpdate$CopyLongUnion
                                    • String ID:
                                    • API String ID: 4119827998-0
                                    • Opcode ID: f233726537454435806bea07d5ed39bda44f8d615bf0d8fa141206316b5ba428
                                    • Instruction ID: 8063924527fbae7dbfd185fbe358ca5a3c849c74febc4d4dfba354e7fd087f82
                                    • Opcode Fuzzy Hash: f233726537454435806bea07d5ed39bda44f8d615bf0d8fa141206316b5ba428
                                    • Instruction Fuzzy Hash: AAD1EA7190021DEFDF11DFA4C988AEEB7B9BF08700F2141AAE909E7255D771AA45CF60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00CD2AF6
                                    • CopyImage.USER32(?,00000000,00000000,00000000,00002000), ref: 00CD2B39
                                    • GetObjectW.GDI32(?,00000018,?), ref: 00CD2B73
                                    • DeleteObject.GDI32(?), ref: 00CD2BF0
                                    • CreateCompatibleDC.GDI32(00000000), ref: 00CD2C2A
                                    • GetObjectW.GDI32(?,00000018,?), ref: 00CD2C46
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Object$CompatibleCopyCreateDeleteH_prolog3_Image
                                    • String ID:
                                    • API String ID: 641560573-0
                                    • Opcode ID: 5983dbf54c94f66c301739e6d0823a94eacf4405c9aa645d7b5a4c68acd6f136
                                    • Instruction ID: 986bc6db87c98560a4d4633dcd17c2b98753275cda2317bd8d8a28d49ae38461
                                    • Opcode Fuzzy Hash: 5983dbf54c94f66c301739e6d0823a94eacf4405c9aa645d7b5a4c68acd6f136
                                    • Instruction Fuzzy Hash: 75C1F571900229EFDF21AF60CC84BEDBBB5BF19301F1041EAE659A2261CB315E94DF60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LoadImageW.USER32(?,?,00000000,00000000,00000000,00002000), ref: 00CD3561
                                    • GetObjectW.GDI32(?,00000018,?), ref: 00CD3592
                                    • DeleteObject.GDI32(?), ref: 00CD359F
                                    • CreateCompatibleDC.GDI32(00000000), ref: 00CD35E3
                                    • GetObjectW.GDI32(?,00000018,?), ref: 00CD35FB
                                    • SelectObject.GDI32(?,?), ref: 00CD3621
                                    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00CD363F
                                    • SelectObject.GDI32(?,?), ref: 00CD3652
                                    • CreateCompatibleDC.GDI32(?), ref: 00CD3668
                                    • SelectObject.GDI32(?,?), ref: 00CD367D
                                    • SelectObject.GDI32(?,?), ref: 00CD368C
                                    • DeleteObject.GDI32(?), ref: 00CD3691
                                    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 00CD36B1
                                    • GetPixel.GDI32(?,?,?), ref: 00CD36D0
                                    • SetPixel.GDI32(?,?,?,00000000), ref: 00CD3706
                                    • SelectObject.GDI32(?,?), ref: 00CD3728
                                    • SelectObject.GDI32(?,?), ref: 00CD3730
                                    • DeleteObject.GDI32(?), ref: 00CD3735
                                    • DeleteObject.GDI32(?), ref: 00CD37B7
                                    • __EH_prolog3.LIBCMT ref: 00CD347F
                                      • Part of subcall function 00C8193D: DeleteObject.GDI32(00000000), ref: 00C81956
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Object$Select$Delete$CompatibleCreate$Pixel$BitmapH_prolog3ImageLoad
                                    • String ID:
                                    • API String ID: 2657855633-3916222277
                                    • Opcode ID: 57281d20083493641e3803f61c526d460ef08e0f79f4cf7ce0bd14645571df87
                                    • Instruction ID: c6ad78a79f76884beac681f02325e61b0ea4c2974bb8525d07c5f0f54e6129ac
                                    • Opcode Fuzzy Hash: 57281d20083493641e3803f61c526d460ef08e0f79f4cf7ce0bd14645571df87
                                    • Instruction Fuzzy Hash: 75B13BB5900249EFCF14EFA0DD859EDBBB5FF08300F14802AFA16A6261D7319B55EB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: String$Variant$ClearFree_memset$ChangeException@8H_prolog3ThrowTypelstrlen
                                    • String ID: `)u
                                    • API String ID: 4128688680-4279031584
                                    • Opcode ID: a6f203de2805e2575c6a09b1c0ff647d6b758dfd32328e7ec16cddbf2d153358
                                    • Instruction ID: 979d99d4ab6cf8fa1d72d404b77b292a896844e51bf8b22b39b6a9f7eed28899
                                    • Opcode Fuzzy Hash: a6f203de2805e2575c6a09b1c0ff647d6b758dfd32328e7ec16cddbf2d153358
                                    • Instruction Fuzzy Hash: 56F1ACB090020ADFDF11DFA8D884AAEBBB4FF45310F184159E849AB291D771E965CF70
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: String_memset$ClearFreeH_prolog3Variantlstrlen
                                    • String ID: `)u
                                    • API String ID: 516204547-4279031584
                                    • Opcode ID: 44d09d74a3295e931d869ccc31b84a693f0fe54c89db57f70372da57a430eed2
                                    • Instruction ID: 57843b51570b3fc3a92dfdb3200e1c11b974abf852e883ead2e37075597425a0
                                    • Opcode Fuzzy Hash: 44d09d74a3295e931d869ccc31b84a693f0fe54c89db57f70372da57a430eed2
                                    • Instruction Fuzzy Hash: E0E156B090020ADFDF11DFA8D884AEEBBB4FF45310F18415AE849AB291D771A965CF71
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00CD0B30
                                    • GetObjectW.GDI32(?,00000018,?), ref: 00CD0B72
                                    • CreateCompatibleDC.GDI32(00000000), ref: 00CD0BAE
                                    • SelectObject.GDI32(?,?), ref: 00CD0BD1
                                    • _memset.LIBCMT ref: 00CD0C01
                                    • GetObjectW.GDI32(?,00000054,?), ref: 00CD0C22
                                    • CreateDIBSection.GDI32(?,?,00000000,?,00000000,00000000), ref: 00CD0C84
                                    • CreateCompatibleDC.GDI32(?), ref: 00CD0CC9
                                    • SelectObject.GDI32(?,?), ref: 00CD0CE7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Object$Create$CompatibleSelect$H_prolog3_Section_memset
                                    • String ID: (
                                    • API String ID: 1904682052-3887548279
                                    • Opcode ID: bbc0c7c62361d1de6c643772d770b3d7faf853cf3ae28814d253faabfbcdfc86
                                    • Instruction ID: 372ad2e5fd8801656663dcc3c8633679ad2de418bbd3de6974044c6668fd4382
                                    • Opcode Fuzzy Hash: bbc0c7c62361d1de6c643772d770b3d7faf853cf3ae28814d253faabfbcdfc86
                                    • Instruction Fuzzy Hash: 08B1F874900714EFDB61DF64CC84F9ABBB5FB49300F1085AAE94EE6252DB315A84DF21
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00CCE816
                                    • CreateCompatibleDC.GDI32(00000000), ref: 00CCE84B
                                    • GetObjectW.GDI32(?,00000018,?), ref: 00CCE86C
                                    • SelectObject.GDI32(?,?), ref: 00CCE8BE
                                    • CreateCompatibleDC.GDI32(?), ref: 00CCE8EB
                                    • CreateDIBSection.GDI32(?,00000030,00000000,?,00000000,00000000), ref: 00CCE953
                                    • SelectObject.GDI32(?,?), ref: 00CCE96F
                                    • SelectObject.GDI32(?,00000000), ref: 00CCE98C
                                    • SelectObject.GDI32(?,?), ref: 00CCE9A4
                                    • DeleteObject.GDI32(?), ref: 00CCE9AC
                                    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 00CCE9D5
                                    • GetObjectW.GDI32(?,00000054,?), ref: 00CCEA0B
                                    • SelectObject.GDI32(?,?), ref: 00CCEC00
                                    • SelectObject.GDI32(?,?), ref: 00CCEC0E
                                    • DeleteObject.GDI32(?), ref: 00CCEC16
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Object$Select$Create$CompatibleDelete$H_prolog3_Section
                                    • String ID: $(
                                    • API String ID: 339215182-55695022
                                    • Opcode ID: 340cb90a00f70d29d428544f7194953c989598045bee0dc3c38ed403a20d77b9
                                    • Instruction ID: 84150e1be4cdcf4da9590991b1c351818050581ebd02614f5ee8b4f1e820a5cd
                                    • Opcode Fuzzy Hash: 340cb90a00f70d29d428544f7194953c989598045bee0dc3c38ed403a20d77b9
                                    • Instruction Fuzzy Hash: 7DC13B70D00268DBDB64DF65CC85BADBBB5EF49300F0081EAE59DA6292CB305E94DF61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00CBB595
                                    • IsWindow.USER32(?), ref: 00CBB637
                                    • GetMenuItemCount.USER32(00000001), ref: 00CBB795
                                    • AppendMenuW.USER32(00000001,00000800,00000000,00000000), ref: 00CBB7AB
                                    • AppendMenuW.USER32(00000001,00000000,00000000,00000000), ref: 00CBB7C6
                                    • SendMessageW.USER32(?,0000040C,00000000,00000000), ref: 00CBB83C
                                    • SendMessageW.USER32(?,0000041C,00000000,?), ref: 00CBB879
                                    • GetMenuItemCount.USER32(00000001), ref: 00CBB8CF
                                    • AppendMenuW.USER32(00000001,00000800,00000000,00000000), ref: 00CBB8E5
                                    • AppendMenuW.USER32(00000001,00000000,00000000,?), ref: 00CBB906
                                    • GetMenuItemCount.USER32(00000001), ref: 00CBB96D
                                    • AppendMenuW.USER32(00000001,00000800,00000000,00000000), ref: 00CBB983
                                    • AppendMenuW.USER32(00000001,00000000,00000000,?), ref: 00CBB9A4
                                    • AppendMenuW.USER32(00000002,00000000,00000000,?), ref: 00CBBA8C
                                    • GetWindow.USER32(?,00000005), ref: 00CBBABD
                                    • AppendMenuW.USER32(00000003,00000000,00000000,?), ref: 00CBBB43
                                    • GetMenuItemCount.USER32(00000000), ref: 00CBBB88
                                    • AppendMenuW.USER32(00000000,00000800,00000000,00000000), ref: 00CBBB9E
                                    • AppendMenuW.USER32(00000000,00000000,00000000,?), ref: 00CBBBB3
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Menu$Append$CountItem$MessageSendWindow$H_prolog3_
                                    • String ID:
                                    • API String ID: 2495817426-0
                                    • Opcode ID: be4b87a382c1b9499bf1f1ba3a93171ff9ff513e958deaab70d64f5c72094960
                                    • Instruction ID: d3ca381d0bb04f26ed84b68ac556befb9e31005439853281d6817c44d9ea58ec
                                    • Opcode Fuzzy Hash: be4b87a382c1b9499bf1f1ba3a93171ff9ff513e958deaab70d64f5c72094960
                                    • Instruction Fuzzy Hash: 90021A70A002159FEF24AFA5CC95BADB7B5AF05300F1440A9F51AAB292DFB09E44DF61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetParent.USER32(?), ref: 00D135D4
                                    • GetSystemMenu.USER32(?,00000000,?,00000000,?,?,?,00D13C94,?), ref: 00D135F3
                                    • SetMenuDefaultItem.USER32(?,0000F060,00000000,00000000,?,?,?,00D13C94,?), ref: 00D1361C
                                    • GetParent.USER32(?), ref: 00D13625
                                    • IsZoomed.USER32(?), ref: 00D13630
                                    • EnableMenuItem.USER32(?,0000F000,00000003), ref: 00D1364A
                                    • EnableMenuItem.USER32(?,0000F010,00000003), ref: 00D13656
                                    • EnableMenuItem.USER32(?,0000F030,00000003), ref: 00D13662
                                      • Part of subcall function 00C73CDD: GetParent.USER32(?), ref: 00C73CE7
                                    • EnableMenuItem.USER32(?,0000F120,00000003), ref: 00D13675
                                    • EnableMenuItem.USER32(?,0000F000,00000000), ref: 00D13681
                                    • EnableMenuItem.USER32(?,0000F010,00000000), ref: 00D1368D
                                    • EnableMenuItem.USER32(?,0000F030,00000000), ref: 00D13699
                                    • GetParent.USER32(?), ref: 00D136A1
                                    • DeleteMenu.USER32(?,0000F120,00000000,00000000,?,?,?,00D13C94,?), ref: 00D136C7
                                    • DeleteMenu.USER32(?,0000F030,00000000,?,?,?,00D13C94,?), ref: 00D136D3
                                    • GetParent.USER32(?), ref: 00D136DB
                                    • DeleteMenu.USER32(?,0000F020,00000000,00000000,?,?,?,00D13C94,?), ref: 00D136FB
                                    • GetParent.USER32(?), ref: 00D1370D
                                    • TrackPopupMenu.USER32(?,00000004,00D13C94,6AFFFFFF,00000000,?,00000000), ref: 00D13758
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Menu$Item$Enable$Parent$Delete$DefaultPopupSystemTrackZoomed
                                    • String ID:
                                    • API String ID: 4239930045-0
                                    • Opcode ID: 46b248f236bb9fcf437a8835d4e7cfc2c4abc8a6703154f0c31db2f35357f60c
                                    • Instruction ID: d5934deef5a696da091c646dd132b27bd211be9b64c45a3661162979fd10973f
                                    • Opcode Fuzzy Hash: 46b248f236bb9fcf437a8835d4e7cfc2c4abc8a6703154f0c31db2f35357f60c
                                    • Instruction Fuzzy Hash: FA417F71640304BFEB316B61DD46F6A7AA9FF84B00F154424F249AB5E2CBB1ED50EB24
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00CCE536
                                    • CreateCompatibleDC.GDI32(00000000), ref: 00CCE59D
                                    • GetObjectW.GDI32(?,00000018,?), ref: 00CCE5BB
                                    • SelectObject.GDI32(?,?), ref: 00CCE5F9
                                    • CreateCompatibleDC.GDI32(?), ref: 00CCE617
                                    • CreateDIBSection.GDI32(?,00000030,00000000,000000FF,00000000,00000000), ref: 00CCE66D
                                    • SelectObject.GDI32(?,?), ref: 00CCE682
                                    • SelectObject.GDI32(?,00000000), ref: 00CCE698
                                    • SelectObject.GDI32(?,?), ref: 00CCE6A7
                                    • DeleteObject.GDI32(00C7566D), ref: 00CCE6AE
                                    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 00CCE700
                                    • GetPixel.GDI32(?,00C7566D,00000000), ref: 00CCE7C8
                                    • SetPixel.GDI32(?,00C7566D,00000000,?), ref: 00CCE7DD
                                    • SelectObject.GDI32(?,000000FF), ref: 00CCE7FA
                                    • SelectObject.GDI32(?,?), ref: 00CCE802
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Object$Select$Create$CompatiblePixel$DeleteH_prolog3_Section
                                    • String ID: (
                                    • API String ID: 1942225872-3887548279
                                    • Opcode ID: 35e7b1c5b681856dbd1eb054e1278c562f94abeea775a49e6e57f69683a0c0c5
                                    • Instruction ID: 5bb240afd8e2ac2d69018e5cb7b1bbc2e1f5fc75f5eb42fedb3440f6fd6b65a3
                                    • Opcode Fuzzy Hash: 35e7b1c5b681856dbd1eb054e1278c562f94abeea775a49e6e57f69683a0c0c5
                                    • Instruction Fuzzy Hash: 35A1F271D00218EFDF21EFA4C885AADBBB5FF19304F20452EE526A72A1DB315A46DF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C710AC: ActivateActCtx.KERNEL32(?,?,00DCB098,00000010,00CACCBA,UxTheme.dll,75FD6BA0,?,00CACD7B,00000004,00C8337D,00000000,00000004,00CCE78D), ref: 00C710CC
                                    • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 00C7EE6A
                                    • GetProcAddress.KERNEL32(74580000,DrawThemeTextEx), ref: 00C7EE7D
                                    • GetProcAddress.KERNEL32(74580000,BeginBufferedPaint), ref: 00C7EE90
                                    • GetProcAddress.KERNEL32(74580000,EndBufferedPaint), ref: 00C7EEA3
                                    • GetProcAddress.KERNEL32(00000000,DwmExtendFrameIntoClientArea), ref: 00C7EEED
                                    • GetProcAddress.KERNEL32(73480000,DwmDefWindowProc), ref: 00C7EF00
                                    • GetProcAddress.KERNEL32(73480000,DwmIsCompositionEnabled), ref: 00C7EF13
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AddressProc$Activate
                                    • String ID: BeginBufferedPaint$DrawThemeParentBackground$DrawThemeTextEx$DwmDefWindowProc$DwmExtendFrameIntoClientArea$DwmIsCompositionEnabled$EndBufferedPaint$UxTheme.dll$dwmapi.dll
                                    • API String ID: 2388279185-3875329446
                                    • Opcode ID: 1ffbab19e4e4edaa00735e40d046b766a0ceaed3260545d8e996cc654073c366
                                    • Instruction ID: 143e8ed3f80ea11f033bcb12f1f94b1ff6960d389937ff606d8a2f6fbdde442f
                                    • Opcode Fuzzy Hash: 1ffbab19e4e4edaa00735e40d046b766a0ceaed3260545d8e996cc654073c366
                                    • Instruction Fuzzy Hash: E9213D719407429FCB316FB58C89EDBBAE4EF48308F018C3EE4BA93211DA70A5058B60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C710AC: ActivateActCtx.KERNEL32(?,?,00DCB098,00000010,00CACCBA,UxTheme.dll,75FD6BA0,?,00CACD7B,00000004,00C8337D,00000000,00000004,00CCE78D), ref: 00C710CC
                                    • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 00CACCCE
                                    • GetProcAddress.KERNEL32(?,CloseThemeData), ref: 00CACCDB
                                    • GetProcAddress.KERNEL32(?,DrawThemeBackground), ref: 00CACCE8
                                    • GetProcAddress.KERNEL32(?,GetThemeColor), ref: 00CACCF5
                                    • GetProcAddress.KERNEL32(?,GetThemeSysColor), ref: 00CACD02
                                    • GetProcAddress.KERNEL32(?,GetCurrentThemeName), ref: 00CACD0F
                                    • GetProcAddress.KERNEL32(?,GetWindowTheme), ref: 00CACD1C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AddressProc$Activate
                                    • String ID: CloseThemeData$DrawThemeBackground$GetCurrentThemeName$GetThemeColor$GetThemeSysColor$GetWindowTheme$OpenThemeData$UxTheme.dll
                                    • API String ID: 2388279185-1975976892
                                    • Opcode ID: 803ffd3359bc8e807ff28926cde1a28a75b2b6349261fc189152a8a286665ce3
                                    • Instruction ID: 47c957bc8779ce5487cd1effece30231d1406e932e15d0fd49bac8b8a51bb145
                                    • Opcode Fuzzy Hash: 803ffd3359bc8e807ff28926cde1a28a75b2b6349261fc189152a8a286665ce3
                                    • Instruction Fuzzy Hash: 1C3144B0901B549FCB30AF6B9984807FBF9FFE4B143118A1FE58682A20D7B5A444CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • InflateRect.USER32(?,00000004,00000004), ref: 00CB4DBF
                                    • InvalidateRect.USER32(?,?,00000001), ref: 00CB4DD1
                                    • UpdateWindow.USER32(?), ref: 00CB4DDA
                                    • GetMessageW.USER32(?,00000000,0000000F,0000000F), ref: 00CB4E19
                                    • DispatchMessageW.USER32(?), ref: 00CB4E27
                                    • PeekMessageW.USER32(?,00000000,0000000F,0000000F,00000000), ref: 00CB4E35
                                    • GetCapture.USER32 ref: 00CB4E41
                                    • SetCapture.USER32(?), ref: 00CB4E4D
                                    • GetCapture.USER32 ref: 00CB4E59
                                    • GetWindowRect.USER32(?,?), ref: 00CB4E83
                                    • SetCursorPos.USER32(?,?), ref: 00CB4EA6
                                    • GetCapture.USER32 ref: 00CB4EAC
                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00CB4EC4
                                    • DispatchMessageW.USER32(?), ref: 00CB4EEA
                                    • ReleaseCapture.USER32 ref: 00CB4F28
                                    • IsWindow.USER32(?), ref: 00CB4F31
                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00CB4F4A
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Message$Capture$RectWindow$Dispatch$CursorInflateInvalidatePeekReleaseSendUpdate
                                    • String ID:
                                    • API String ID: 4077352625-0
                                    • Opcode ID: b31989da2bb2d7b8c03922ea027ca9890a71c2eeeeb69c951f14d9119c04f13e
                                    • Instruction ID: d31d4b58f1e34a9f8df33a3ea2a343ca373dd7f717dc0954410ae961833fe994
                                    • Opcode Fuzzy Hash: b31989da2bb2d7b8c03922ea027ca9890a71c2eeeeb69c951f14d9119c04f13e
                                    • Instruction Fuzzy Hash: 58912C72A04219AFCF18EFA4DC899FEBBB9FB04310F15052AF515E7291DA309D45DB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00D3827B
                                    • GetCursorPos.USER32(?), ref: 00D3832D
                                    • IsRectEmpty.USER32(00000000), ref: 00D38361
                                    • IsRectEmpty.USER32(?), ref: 00D38387
                                    • IsRectEmpty.USER32(00000000), ref: 00D383A3
                                    • GetWindowRect.USER32(?,00000000), ref: 00D383C9
                                    • SetRectEmpty.USER32(?), ref: 00D38480
                                      • Part of subcall function 00C6855B: _malloc.LIBCMT ref: 00C68579
                                    • GetWindowRect.USER32(?,00000000), ref: 00D383FD
                                    • PtInRect.USER32(00000000,?,00000000), ref: 00D3843D
                                    • OffsetRect.USER32(00000000,?,00000000), ref: 00D38455
                                      • Part of subcall function 00D16E76: __EH_prolog3.LIBCMT ref: 00D16E7D
                                      • Part of subcall function 00D16E76: SetRectEmpty.USER32(?), ref: 00D16F84
                                      • Part of subcall function 00D16E76: SetRectEmpty.USER32(?), ref: 00D16F8D
                                    • OffsetRect.USER32(00000000,?,?), ref: 00D385DF
                                    • IsRectEmpty.USER32(?), ref: 00D38604
                                    • IsRectEmpty.USER32(?), ref: 00D38629
                                    • PtInRect.USER32(00000000,?,?), ref: 00D38639
                                    • OffsetRect.USER32(00000000,?,?), ref: 00D38662
                                    • IsRectEmpty.USER32(?), ref: 00D38679
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$Empty$Offset$Window$CursorH_prolog3H_prolog3__malloc
                                    • String ID:
                                    • API String ID: 1330315114-0
                                    • Opcode ID: c2e729bfbdcdc6c7a4b9befa784e10db6e886965d0db0cd8898b91a862ef4f8b
                                    • Instruction ID: 137f0fa9b48f9a68ea5373a3d2ad3abef462291e165db2f29861bf7b05304312
                                    • Opcode Fuzzy Hash: c2e729bfbdcdc6c7a4b9befa784e10db6e886965d0db0cd8898b91a862ef4f8b
                                    • Instruction Fuzzy Hash: 40E13671A00314DFCF15DFA4C984AAEBBB9FF08710F18416AF905EB255EB31A945DBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00C82F7D
                                    • CreateRectRgnIndirect.GDI32(?), ref: 00C82FBA
                                    • CopyRect.USER32(?,?), ref: 00C82FD0
                                    • InflateRect.USER32(?,?,?), ref: 00C82FE6
                                    • IntersectRect.USER32(?,?,?), ref: 00C82FF4
                                    • CreateRectRgnIndirect.GDI32(?), ref: 00C82FFE
                                    • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 00C83013
                                      • Part of subcall function 00C82C88: CombineRgn.GDI32(?,?,?,?), ref: 00C82CAD
                                    • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 00C8307B
                                    • SetRectRgn.GDI32(?,0000000A,?,?,?), ref: 00C83098
                                    • CopyRect.USER32(?,0000000A), ref: 00C830A3
                                    • InflateRect.USER32(?,?,?), ref: 00C830B9
                                    • IntersectRect.USER32(?,?,0000000A), ref: 00C830C5
                                    • SetRectRgn.GDI32(?,?,?,?,0000000A), ref: 00C830DA
                                    • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 00C83106
                                      • Part of subcall function 00C82DD7: CreateBitmap.GDI32(00000008,00000008,00000001,00000001,?), ref: 00C82E20
                                      • Part of subcall function 00C82DD7: CreatePatternBrush.GDI32(00000000), ref: 00C82E2D
                                      • Part of subcall function 00C82DD7: DeleteObject.GDI32(00000000), ref: 00C82E39
                                      • Part of subcall function 00C6DC02: SelectObject.GDI32(?,00000000), ref: 00C6DC28
                                      • Part of subcall function 00C6DC02: SelectObject.GDI32(?,?), ref: 00C6DC3E
                                    • PatBlt.GDI32(?,?,?,?,?,005A0049), ref: 00C83177
                                    • PatBlt.GDI32(?,?,?,?,?,005A0049), ref: 00C831CC
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$Create$Object$CopyIndirectInflateIntersectSelect$BitmapBrushCombineDeleteH_prolog3_Pattern
                                    • String ID:
                                    • API String ID: 3107162742-0
                                    • Opcode ID: f5b03aa48915fc373f5f5493d3bd1bd30c9b780730dcf91c4402a0c4848d8814
                                    • Instruction ID: 44487503aeb43f6ddbede03476602b8e269218da4062cd79478f58d213cfc440
                                    • Opcode Fuzzy Hash: f5b03aa48915fc373f5f5493d3bd1bd30c9b780730dcf91c4402a0c4848d8814
                                    • Instruction Fuzzy Hash: B8A10FB1A00219AFCF05EFE4D899EFEBBB9FF08300F14411AF506A6251DB349A45DB64
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • PeekMessageW.USER32(?,00000000,00000201,00000201,00000001), ref: 00D1260A
                                    • SendMessageW.USER32(00000000,00000084,00000000,?), ref: 00D12627
                                    • ReleaseCapture.USER32 ref: 00D12662
                                    • GetMessageW.USER32(?,00000000,000000A1,000000A1), ref: 00D12671
                                    • PeekMessageW.USER32(?,00000000,?,?,00000001), ref: 00D12685
                                    • DispatchMessageW.USER32(?), ref: 00D1268C
                                    • DispatchMessageW.USER32(?), ref: 00D12737
                                    • GetCursorPos.USER32(?), ref: 00D12741
                                    • PeekMessageW.USER32(?,00000000,?,?,00000001), ref: 00D12762
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Message$Peek$Dispatch$CaptureCursorReleaseSend
                                    • String ID:
                                    • API String ID: 597789953-0
                                    • Opcode ID: c0f2310a977818237cbbb5a8c65d71533a7514a46aaaa3d9ea28d226cfadf07d
                                    • Instruction ID: ba8693f960e9ba85c78de7f2b42d07a668e005ad666d6397b69ef55f7386fc42
                                    • Opcode Fuzzy Hash: c0f2310a977818237cbbb5a8c65d71533a7514a46aaaa3d9ea28d226cfadf07d
                                    • Instruction Fuzzy Hash: F6516B70600700BFEB259B65EC88EFF7AADEB45700F14441AF582D6690DA76D9D1CB31
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00CCE34C
                                    • CreateCompatibleDC.GDI32(00000000), ref: 00CCE382
                                    • GetObjectW.GDI32(?,00000018,?), ref: 00CCE399
                                    • SelectObject.GDI32(?,?), ref: 00CCE3C5
                                    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00CCE3E7
                                    • SelectObject.GDI32(?,00000000), ref: 00CCE3FA
                                    • CreateCompatibleDC.GDI32(?), ref: 00CCE40D
                                    • SelectObject.GDI32(?,?), ref: 00CCE41E
                                    • SelectObject.GDI32(?,00000000), ref: 00CCE42F
                                    • DeleteObject.GDI32(?), ref: 00CCE434
                                    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 00CCE460
                                    • GetPixel.GDI32(?,?,?), ref: 00CCE47F
                                    • SetPixel.GDI32(?,?,?,00000000), ref: 00CCE4C6
                                    • SelectObject.GDI32(?,?), ref: 00CCE4EA
                                    • SelectObject.GDI32(?,00000000), ref: 00CCE4F2
                                    • DeleteObject.GDI32(?), ref: 00CCE4FA
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Object$Select$CompatibleCreate$DeletePixel$BitmapH_prolog3
                                    • String ID:
                                    • API String ID: 3639146769-0
                                    • Opcode ID: 07e26923a5582fe49386d4ba47aaa1c00e764bebe05fcb9126a8076f9d1ffc20
                                    • Instruction ID: 6495a1fcbe8f38edc9f37462e043d6e97b3ae6eb1d9439e2abd49880fb3354bd
                                    • Opcode Fuzzy Hash: 07e26923a5582fe49386d4ba47aaa1c00e764bebe05fcb9126a8076f9d1ffc20
                                    • Instruction Fuzzy Hash: 68510531C00249EBCF16EFE4CD45AAEBB76FF09310F244129F525B61A1CB315A92EB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C5E230: SendMessageW.USER32(?,00000080,00000001,?), ref: 00C5E262
                                      • Part of subcall function 00C5E230: SendMessageW.USER32(?,00000080,00000000,?), ref: 00C5E277
                                      • Part of subcall function 00C5E230: EnumChildWindows.USER32(?,00C5E7E0), ref: 00C5E2B6
                                      • Part of subcall function 00C5E230: GetWindowRect.USER32(?,?), ref: 00C5E2D8
                                      • Part of subcall function 00C5E230: SetRect.USER32(?,?,?,?,?), ref: 00C5E2FB
                                      • Part of subcall function 00C5E230: GetWindowThreadProcessId.USER32(?,?), ref: 00C5E32A
                                      • Part of subcall function 00C5E230: GetForegroundWindow.USER32 ref: 00C5E32F
                                      • Part of subcall function 00C5E230: GetWindowThreadProcessId.USER32(00000000,?), ref: 00C5E33D
                                      • Part of subcall function 00C5E230: AttachThreadInput.USER32(00000000,?,00000001), ref: 00C5E34E
                                      • Part of subcall function 00C5E230: KiUserCallbackDispatcher.NTDLL(?), ref: 00C5E355
                                    • InvalidateRect.USER32 ref: 00C605FA
                                      • Part of subcall function 00C5E4D0: SetWindowTextW.USER32(?,18846CE9), ref: 00C5E5E9
                                      • Part of subcall function 00C6EC91: EnableWindow.USER32(?,?), ref: 00C6ECA2
                                    • SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 00C60774
                                    • SendMessageW.USER32(?,0000110A,00000001,00000000), ref: 00C60797
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$MessageSend$RectThread$Process$AttachCallbackChildDispatcherEnableEnumForegroundInputInvalidateTextUserWindows
                                    • String ID: AdView$Common$IDS_BROWSE$IDS_CAMPANYNAME$IDS_CANCEL$IDS_INSTALLDIR$IDS_INSTSETTING_TITLE$IDS_OK_BTN$IDS_TREE_TITLE$IDS_USERNAME
                                    • API String ID: 515234969-3883414788
                                    • Opcode ID: c94a13f2eb9f0b837425cf190e799a8b2fc96f2fd084e36fc3423f18e250930a
                                    • Instruction ID: 489523d1a528eb2a9c1e0194d292ae978a6362dbbcee96f77ba188b48a1a5ef1
                                    • Opcode Fuzzy Hash: c94a13f2eb9f0b837425cf190e799a8b2fc96f2fd084e36fc3423f18e250930a
                                    • Instruction Fuzzy Hash: 6351A635B40701BBD319EB64CCC2FAFB769AF45B10F104258F615AB2D1CBB0B9059BA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00C825DE
                                      • Part of subcall function 00C6855B: _malloc.LIBCMT ref: 00C68579
                                      • Part of subcall function 00CCAF93: __EH_prolog3.LIBCMT ref: 00CCAF9A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: H_prolog3$_malloc
                                    • String ID: MFCButton$MFCColorButton$MFCEditBrowse$MFCFontComboBox$MFCLink$MFCMaskedEdit$MFCMenuButton$MFCPropertyGrid$MFCShellList$MFCShellTree$MFCVSListBox
                                    • API String ID: 1683881009-2110171958
                                    • Opcode ID: 0461072673dfbc2f384c1b993da15505050447be769886fee40a5199a228b661
                                    • Instruction ID: aaed6bd4852c09a5872843ffc7d6cc1c314821f367fbd1064f8ecd32a5b35ea2
                                    • Opcode Fuzzy Hash: 0461072673dfbc2f384c1b993da15505050447be769886fee40a5199a228b661
                                    • Instruction Fuzzy Hash: 7551E431A08215DBDF29FBA8D85A7AE67E05F14B48F10002DF41E961C2EF704B88A75B
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00CCEC3A
                                    • GetObjectW.GDI32(00000000,00000018,?), ref: 00CCEC6C
                                    • GetObjectW.GDI32(?,00000054,?), ref: 00CCECA4
                                    • CreateCompatibleDC.GDI32(00000000), ref: 00CCED3A
                                    • SelectObject.GDI32(?,?), ref: 00CCED59
                                    • GetPixel.GDI32(?,?,00000000), ref: 00CCEDE6
                                    • GetPixel.GDI32(?,?,00000000), ref: 00CCEDF8
                                    • SetPixel.GDI32(?,?,00000000,00000000), ref: 00CCEE07
                                    • SetPixel.GDI32(?,?,00000000,?), ref: 00CCEE19
                                    • SelectObject.GDI32(?,?), ref: 00CCEE50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ObjectPixel$Select$CompatibleCreateH_prolog3_
                                    • String ID: $
                                    • API String ID: 1266819874-227171996
                                    • Opcode ID: b10ad4452d93630120e9972feb7ab116c6d119d6bd15de90823485043c48be8f
                                    • Instruction ID: c0414582fde5bb855408758413ff053c15abfad9de2d11b8bd1671aef10d5389
                                    • Opcode Fuzzy Hash: b10ad4452d93630120e9972feb7ab116c6d119d6bd15de90823485043c48be8f
                                    • Instruction Fuzzy Hash: 5A71F270D00228DBDF20DFA9CC84BADBBB5FF19314F2041A9E919A7252DB319A85DF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetMessageW.USER32(?,00000000,0000000F,0000000F), ref: 00C90AF4
                                    • DispatchMessageW.USER32(?), ref: 00C90B06
                                    • PeekMessageW.USER32(?,00000000,0000000F,0000000F,00000000), ref: 00C90B16
                                    • GetCapture.USER32 ref: 00C90B1C
                                    • SetCapture.USER32(?), ref: 00C90B29
                                    • GetWindowRect.USER32(?,?), ref: 00C90B4D
                                    • GetCapture.USER32 ref: 00C90BAC
                                    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00C90BC7
                                    • DispatchMessageW.USER32(?), ref: 00C90BEB
                                    • GetScrollPos.USER32(?,00000002), ref: 00C90D02
                                    • RedrawWindow.USER32(?,00000000,00000000,00000581), ref: 00C90D1C
                                      • Part of subcall function 00C6EC4F: ShowWindow.USER32(?,?), ref: 00C6EC60
                                    • ReleaseCapture.USER32 ref: 00C90DA8
                                    • IsWindow.USER32(?), ref: 00C90DB1
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Message$CaptureWindow$Dispatch$PeekRectRedrawReleaseScrollShow
                                    • String ID:
                                    • API String ID: 1149966214-0
                                    • Opcode ID: 620bb5b87d289033d363dcfaf245f1788534027832c6e50133e19139c415c757
                                    • Instruction ID: 616c53b4374af639f65abcc5f3526d94ce4eb0fe09d87c41d306a25a82391f86
                                    • Opcode Fuzzy Hash: 620bb5b87d289033d363dcfaf245f1788534027832c6e50133e19139c415c757
                                    • Instruction Fuzzy Hash: 40A12971A002099FDF24DFA5C9999BEB7F9BF48304F24452EE19A97251CB30AE41DB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetKeyState.USER32(00000010), ref: 00C9507E
                                    • GetAsyncKeyState.USER32(00000011), ref: 00C950DD
                                    • IsRectEmpty.USER32(?), ref: 00C951A4
                                    • IsRectEmpty.USER32(?), ref: 00C9524B
                                    • SendMessageW.USER32(?,00000100,00000024,00000000), ref: 00C95382
                                    • SendMessageW.USER32(?,00000362,0000E001,00000000), ref: 00C9544F
                                    • GetClientRect.USER32(?,?), ref: 00C954B7
                                    • InvalidateRect.USER32(?,?,00000001), ref: 00C954F0
                                    • InvalidateRect.USER32(?,?,00000001), ref: 00C954FB
                                    • UpdateWindow.USER32(?), ref: 00C95500
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$EmptyInvalidateMessageSendState$AsyncClientUpdateWindow
                                    • String ID: !
                                    • API String ID: 348497913-2657877971
                                    • Opcode ID: 579ccda528bffe7e113c0d5890ffbe543ee655c1e7a95e415cc43466c8402a15
                                    • Instruction ID: dae67d2244e1a84838eb61730b0fdf7391f272ad00ad6e929f40956608646dda
                                    • Opcode Fuzzy Hash: 579ccda528bffe7e113c0d5890ffbe543ee655c1e7a95e415cc43466c8402a15
                                    • Instruction Fuzzy Hash: 7EE16031A00A149FDF26DF64C8C8BAD7BB5BF48750F19416AEC19AB255D7709E80CFA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • PathFileExistsW.SHLWAPI(?,18846CE9), ref: 00C5D5B7
                                    • _wcsrchr.LIBCMT ref: 00C5D5DB
                                    • _wcsrchr.LIBCMT ref: 00C5D634
                                    • RegCreateKeyExW.ADVAPI32(80000002,00000000,00000000,00000000,00000000,0002001F,00000000,?,?,SOFTWARE\MAX\P-touch Editor\5.2), ref: 00C5D815
                                    • RegSetValueExW.ADVAPI32(?,dwExitCode,00000000,00000004,00000001,00000004), ref: 00C5D834
                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00D8E8E8,000000FF), ref: 00C5D83B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: _wcsrchr$CloseCreateExistsFilePathValue
                                    • String ID: ADECmdOp$ADEFilePath$SOFTWARE\MAX\P-touch Editor\5.2$\US\AccessDatabaseEngine.exe$dwExitCode
                                    • API String ID: 3834673733-2754428573
                                    • Opcode ID: b29072df0bc4ff5138df1134bbeec7f836377ac99f65e4dd394a94a8da35c9de
                                    • Instruction ID: be030ee9eb2277a872c6c5c6d6e46ef98c373496aa4667e41e6136e60aa7f145
                                    • Opcode Fuzzy Hash: b29072df0bc4ff5138df1134bbeec7f836377ac99f65e4dd394a94a8da35c9de
                                    • Instruction Fuzzy Hash: F0C1C475A00605DFD704CBACCC41FAEB7B5BF85325F148358E4269B2D2DB70AA49CBA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: H_prolog3Object_memmove
                                    • String ID:
                                    • API String ID: 107514201-3916222277
                                    • Opcode ID: 2a2dbb395718b289cbf51b9ff43736d384221ed284d5ed70d29c00dd1fa14b9a
                                    • Instruction ID: 6c78a1a5df3a6af9a0024fb7563b10f2932de08d7211a076e2e0068c92042d0f
                                    • Opcode Fuzzy Hash: 2a2dbb395718b289cbf51b9ff43736d384221ed284d5ed70d29c00dd1fa14b9a
                                    • Instruction Fuzzy Hash: 62411571D00219AFCF14EFA5CC91AEEBFB5EF08300F14802AE516B72A1DA715E45DBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00CD0EE7
                                    • TransparentBlt.MSIMG32(00000000,?,00000000,00000000,00000000,?,?,00000000,00000000,00000000,000000FF,00000048,00CD1B10,00000000,?,?), ref: 00CD0F3F
                                    • CreateCompatibleDC.GDI32(?), ref: 00CD0F84
                                    • CreateCompatibleDC.GDI32(?), ref: 00CD0FA1
                                    • CreateCompatibleBitmap.GDI32(?,00000000,00000000), ref: 00CD0FBF
                                    • StretchBlt.GDI32(00000000,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 00CD1023
                                    • BitBlt.GDI32(00000000,00000000,00000000,00000000,00000000,?,?,00000000,00CC0020), ref: 00CD1051
                                    • CreateBitmap.GDI32(00000000,00000000,00000001,00000001,00000000), ref: 00CD105E
                                    • BitBlt.GDI32(00CB0F20,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00CC0020), ref: 00CD1097
                                    • BitBlt.GDI32(00000000,00000000,00000000,00000000,00000000,00CB0F20,00000000,00000000,008800C6), ref: 00CD10C5
                                    • BitBlt.GDI32(?,?,00000000,00000000,00000000,00CB0F20,00000000,00000000,008800C6), ref: 00CD10F2
                                    • BitBlt.GDI32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00EE0086), ref: 00CD110D
                                      • Part of subcall function 00C6D89C: DeleteDC.GDI32(00000000), ref: 00C6D8AE
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Create$Compatible$Bitmap$DeleteH_prolog3StretchTransparent
                                    • String ID:
                                    • API String ID: 646174778-0
                                    • Opcode ID: bd8efec589ef6ca103a65a2104159958cfae0018969cda02459460dc9742f26c
                                    • Instruction ID: ca5f01ad4aedc18179f7fe0f3b2dd2ee119db13daf040e9f18a4d90ffa4ea1a0
                                    • Opcode Fuzzy Hash: bd8efec589ef6ca103a65a2104159958cfae0018969cda02459460dc9742f26c
                                    • Instruction Fuzzy Hash: 0B91EF71900149AFCF12EFA4CD85DEEBB76FF08354F244119FA15A62A1C7329E25EB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00D123F9: LoadCursorW.USER32(00000000,00007F8B), ref: 00D1241A
                                      • Part of subcall function 00D123F9: LoadCursorW.USER32(?,00007901), ref: 00D12433
                                    • PeekMessageW.USER32(?,?,00000367,00000367,00000003), ref: 00D127A9
                                    • PostMessageW.USER32(?,00000111,0000E145,00000000), ref: 00D1280C
                                    • SendMessageW.USER32(?,00000362,0000E002,00000000), ref: 00D1282E
                                    • GetCursorPos.USER32(?), ref: 00D12849
                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00D12875
                                    • ReleaseCapture.USER32 ref: 00D128C2
                                    • SetCapture.USER32(?), ref: 00D128C7
                                    • ReleaseCapture.USER32 ref: 00D128D3
                                    • SendMessageW.USER32(?,00000362,?,00000000), ref: 00D128E7
                                    • SendMessageW.USER32(?,00000111,0000E147,00000000), ref: 00D12912
                                    • PostMessageW.USER32(?,0000036A,00000000,00000000), ref: 00D12930
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Message$CaptureCursorSend$LoadPeekPostRelease
                                    • String ID:
                                    • API String ID: 291007519-0
                                    • Opcode ID: ee938e1d00a77f5eba76482d4bf0553a27574c3802f88509539f7a376b506232
                                    • Instruction ID: f62447108d5ff83ac45f90a5e121a37a9dbb66e76a816b0ce13f28180ba00fb5
                                    • Opcode Fuzzy Hash: ee938e1d00a77f5eba76482d4bf0553a27574c3802f88509539f7a376b506232
                                    • Instruction Fuzzy Hash: 5E512C71A00708BFDB219FA4DC84AFABBB9FF44344F144469E196E62A1DB319D90DB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00CF8B11
                                    • GetSystemMenu.USER32(?,00000000,00000214,00CA6364,00000000,00000000,00000001,?), ref: 00CF8B73
                                    • IsMenu.USER32(?), ref: 00CF8B8C
                                    • IsMenu.USER32(?), ref: 00CF8BA6
                                    • SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 00CF8BDB
                                    • GetClassLongW.USER32(?,000000DE), ref: 00CF8BF1
                                    • GetWindowLongW.USER32(?,000000F0), ref: 00CF8C3C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Menu$Long$ClassH_prolog3_MessageSendSystemWindow
                                    • String ID: 0
                                    • API String ID: 859179710-4108050209
                                    • Opcode ID: cf4b2cfda9928b1095ef3bb1f1c5e18ab39ab3a94a15afc0aaf510abf96e1870
                                    • Instruction ID: 13bc892871ab2a2cc9850e59856f75af4aa7c0a6d0b8e9516ed3ba605a4187fb
                                    • Opcode Fuzzy Hash: cf4b2cfda9928b1095ef3bb1f1c5e18ab39ab3a94a15afc0aaf510abf96e1870
                                    • Instruction Fuzzy Hash: 16817C7050070ADFDB61DF24CC88BAEB7B4FF54310F2046AAE9AA96291DF305A85CF51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CoInitialize.OLE32(00000000), ref: 00C7EFD9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID: D2D1.dll$D2D1CreateFactory$D2D1MakeRotateMatrix$DWrite.dll$DWriteCreateFactory
                                    • API String ID: 2538663250-1403614551
                                    • Opcode ID: c67f76fffcb31aadf6ff3bd7cadca0d54ed2e50935c2bc5d77f111bafab779d9
                                    • Instruction ID: 031f17f82dc02e277011ee0a2178b6b1cb9537c6736fb45664d03f0f993bc964
                                    • Opcode Fuzzy Hash: c67f76fffcb31aadf6ff3bd7cadca0d54ed2e50935c2bc5d77f111bafab779d9
                                    • Instruction Fuzzy Hash: 6F11E4317807407ECB116B769CC5C27BEA8E7A8B91324883EF02DD6259E5B1D9468F70
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetWindowRect.USER32(?,?), ref: 00CA3184
                                    • GetParent.USER32(?), ref: 00CA3191
                                    • IsZoomed.USER32(?), ref: 00CA31F5
                                    • SetWindowRgn.USER32(?,00000000,00000001), ref: 00CA3254
                                    • GetClientRect.USER32(?,?), ref: 00CA327C
                                    • GetClientRect.USER32(?,?), ref: 00CA3291
                                      • Part of subcall function 00C6D5BB: ClientToScreen.USER32(?,00C8FF4D), ref: 00C6D5CC
                                      • Part of subcall function 00C6D5BB: ClientToScreen.USER32(?,00C8FF55), ref: 00C6D5D9
                                    • GetWindowRect.USER32(?,?), ref: 00CA32B1
                                      • Part of subcall function 00C6EE73: SetWindowPos.USER32(?,000000FF,000000FF,?,?,00000000,00C71B6D,?,00C71B6D,00000000,?,?,000000FF,000000FF,00000015), ref: 00C6EE9B
                                    • SetWindowRgn.USER32(?,00000000,00000001), ref: 00CA343C
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$ClientRect$Screen$ParentZoomed
                                    • String ID:
                                    • API String ID: 2314217310-0
                                    • Opcode ID: 43c7b0745acada31437030d9a259dad4738ee548d507904ede58a31446ac4330
                                    • Instruction ID: 158ce208eeaf54fa8ba09722d7c799b432b9004ce756e46ef4f78e03067f86bb
                                    • Opcode Fuzzy Hash: 43c7b0745acada31437030d9a259dad4738ee548d507904ede58a31446ac4330
                                    • Instruction Fuzzy Hash: 67B16071A0121AAFCF11DFA4C894AEEBBB5FF49704F14016AF905EB255DB319E01DBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetCursorPos.USER32(?), ref: 00C912E9
                                    • ScreenToClient.USER32(?,?), ref: 00C912F6
                                    • PtInRect.USER32(?,?,?), ref: 00C91324
                                    • PtInRect.USER32(?,?,?), ref: 00C91349
                                    • KillTimer.USER32(?,00000002), ref: 00C91379
                                    • InvalidateRect.USER32(?,?,00000001), ref: 00C91397
                                    • InvalidateRect.USER32(?,?,00000001), ref: 00C913A5
                                    • _clock.LIBCMT ref: 00C913BA
                                    • KillTimer.USER32(?,00000001), ref: 00C914BF
                                    • ValidateRect.USER32(?,00000000), ref: 00C914DB
                                    • RedrawWindow.USER32(?,00000000,00000000,00000185), ref: 00C91519
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$InvalidateKillTimer$ClientCursorRedrawScreenValidateWindow_clock
                                    • String ID:
                                    • API String ID: 3482734790-0
                                    • Opcode ID: 439153b743d33baf055e8c602fcda2902270a8a5ddc20ecc55cc51e82ad73966
                                    • Instruction ID: e153ac285e4ae6c06a08eea39b8f2fec5db666c0fdac69dd523b328dbaa37a05
                                    • Opcode Fuzzy Hash: 439153b743d33baf055e8c602fcda2902270a8a5ddc20ecc55cc51e82ad73966
                                    • Instruction Fuzzy Hash: 39716331600746EFCF25DF64C989ABA7BF5FF88340F15082AE45BD6661DB70AA41DB10
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00CCD3B2: GdipGetImagePixelFormat.GDIPLUS(?,00DE8244,00000000,00000000,?,00CD03BB,00000000,00000000,00DE8244), ref: 00CCD3C2
                                    • _free.LIBCMT ref: 00CD04C4
                                    • _free.LIBCMT ref: 00CD0510
                                    • GdipBitmapLockBits.GDIPLUS(?,00000000,00000001,00000000,?,00000000,?,?,00000000,00000000,00000000,00000000,00000000,00DE8244), ref: 00CD05D9
                                    • _free.LIBCMT ref: 00CD0609
                                      • Part of subcall function 00CCD3D4: GdipGetImagePaletteSize.GDIPLUS(?,00000000,00000000,00000000,?,00CD0475,00000000,?,?,00000000,00000000,00000000,00000000,00000000), ref: 00CCD3E8
                                    • GdipBitmapUnlockBits.GDIPLUS(?,?,?,00000000,00000001,00000000,?,00000000,?,?,00000000,00000000,00000000,00000000,00000000,00DE8244), ref: 00CD0685
                                    • _free.LIBCMT ref: 00CD0700
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Gdip_free$BitmapBitsImage$FormatLockPalettePixelSizeUnlock
                                    • String ID: &
                                    • API String ID: 4092590016-3042966939
                                    • Opcode ID: f072cd2c7c21cbf1a839b8a31aa4c928f7ebe11b1e6dcb5a175d4e71c7e814cf
                                    • Instruction ID: 2062d9d8daf25cbda7d13e762a255a3ef96d11a40359e2a1da1a7e717d299572
                                    • Opcode Fuzzy Hash: f072cd2c7c21cbf1a839b8a31aa4c928f7ebe11b1e6dcb5a175d4e71c7e814cf
                                    • Instruction Fuzzy Hash: DEA15CB19002289BCB21DF18CC80B99B7B5EF44314F2085EAEB19A7251DB749EC5DF68
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetWindowRect.USER32(?,?), ref: 00CE0472
                                    • MonitorFromPoint.USER32(?,?,00000002), ref: 00CE04AB
                                    • GetMonitorInfoW.USER32(00000000), ref: 00CE04B2
                                    • CopyRect.USER32(?,?), ref: 00CE04CA
                                    • CopyRect.USER32(?,?), ref: 00CE04D4
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00CE050B
                                    • GetSystemMetrics.USER32(00000022), ref: 00CE0589
                                    • GetSystemMetrics.USER32(00000023), ref: 00CE0590
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: RectSystem$CopyInfoMetricsMonitor$Exception@8FromH_prolog3ParametersPointThrowWindow
                                    • String ID: (
                                    • API String ID: 348238172-3887548279
                                    • Opcode ID: fd96bfdae2dae9f382dad56cf101e850a4a416e07ce9505244cde1a477889fbd
                                    • Instruction ID: 10de62fec11d849f56842f7cb8ab8ed84b6ae9c507bd4e2b4a3bdaa6b4cbab20
                                    • Opcode Fuzzy Hash: fd96bfdae2dae9f382dad56cf101e850a4a416e07ce9505244cde1a477889fbd
                                    • Instruction Fuzzy Hash: F1512BB1D016099FCB14DFAAC985AEEBBF9FF88300F24416AE515E7215D7709A40CFA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$ClientMessageScreenSend
                                    • String ID:
                                    • API String ID: 526472501-0
                                    • Opcode ID: 83ba66249a102a6f6ca25875894b98878831f9ff6b9ce9598134e90ccf570000
                                    • Instruction ID: 69a8f4d7cbe9a2045942accb3cd056997e9ddd105b8a822ef3ac48ab13d65a7f
                                    • Opcode Fuzzy Hash: 83ba66249a102a6f6ca25875894b98878831f9ff6b9ce9598134e90ccf570000
                                    • Instruction Fuzzy Hash: 6B517F39600209ABEF309B65CCC4A3E7BB5EB24B00F204567F565E62B1D731EE50DB10
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsWindowVisible.USER32(00000000), ref: 00CE05D9
                                    • IsWindowVisible.USER32(00000000), ref: 00CE05E8
                                    • GetSystemMetrics.USER32(00000021), ref: 00CE061A
                                    • GetSystemMetrics.USER32(00000021), ref: 00CE0621
                                    • GetSystemMetrics.USER32(00000020), ref: 00CE0627
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    • IsWindowVisible.USER32(00000000), ref: 00CE064F
                                    • IsWindowVisible.USER32(00000000), ref: 00CE065E
                                    • IsZoomed.USER32(00000000), ref: 00CE0684
                                    • GetSystemMetrics.USER32 ref: 00CE06A0
                                    • GetSystemMetrics.USER32(00000004), ref: 00CE06E3
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: MetricsSystem$VisibleWindow$Exception@8H_prolog3ThrowZoomed
                                    • String ID:
                                    • API String ID: 1383962431-0
                                    • Opcode ID: f813db252e52443b4eec4f2b53ed221c34f7f6895ee14ad2c52bf44d8f206804
                                    • Instruction ID: 0ea497d0000ece22eb1f205df701beb31526e480e5aef4adbcea8010d388114f
                                    • Opcode Fuzzy Hash: f813db252e52443b4eec4f2b53ed221c34f7f6895ee14ad2c52bf44d8f206804
                                    • Instruction Fuzzy Hash: CD418F712007419FEB20AB66C948BAA77E8FF94314F144069F9A9CB1A1D7B4ED90CF94
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetCapture.USER32 ref: 00D12474
                                    • WindowFromPoint.USER32(?,?,?,00000001,?,00000000), ref: 00D12483
                                    • GetActiveWindow.USER32 ref: 00D124A5
                                    • GetCurrentThreadId.KERNEL32 ref: 00D124BD
                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00D124CC
                                    • GetDesktopWindow.USER32 ref: 00D124D8
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$Thread$ActiveCaptureCurrentDesktopFromPointProcess
                                    • String ID:
                                    • API String ID: 1298419125-0
                                    • Opcode ID: 6126e44d85d021b7969c244dad323cbbe671f345c8a5feb15c1e2b0137164da8
                                    • Instruction ID: fb0b370fd95d8a93099e5cb1347af50d7676a1a62837e3a36108d311f3730845
                                    • Opcode Fuzzy Hash: 6126e44d85d021b7969c244dad323cbbe671f345c8a5feb15c1e2b0137164da8
                                    • Instruction Fuzzy Hash: 5F316A71A00215FFCF11AFA4E9988FEBBB6EB48301B154065E445E7211DB32CE91DB70
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00C7AB3A
                                    • MapDialogRect.USER32(?,?), ref: 00C7ABD8
                                    • SysAllocStringLen.OLEAUT32(?,?), ref: 00C7ABF7
                                    • CLSIDFromString.OLE32(?,?,00000000), ref: 00C7ACF5
                                      • Part of subcall function 00C6855B: _malloc.LIBCMT ref: 00C68579
                                    • CLSIDFromProgID.OLE32(?,?,00000000), ref: 00C7ACFD
                                    • SetWindowPos.USER32(?,?,00000000,00000000,00000000,00000000,00000013,00000001,00000000,?,00000000,?,?,00000000,?,00000000), ref: 00C7ADA5
                                    • SysFreeString.OLEAUT32(00000000), ref: 00C7ADF7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: String$From$AllocDialogFreeH_prolog3_ProgRectWindow_malloc
                                    • String ID: `)u
                                    • API String ID: 2980224915-4279031584
                                    • Opcode ID: 9df0a5c0a3e081624d5d244cb4e84942f6b2aada88f021da880aa0ce48ce778f
                                    • Instruction ID: db3f9e9a3299a0ceb99a0e875c1800c8a196eab8c20acad72108ec1311babc28
                                    • Opcode Fuzzy Hash: 9df0a5c0a3e081624d5d244cb4e84942f6b2aada88f021da880aa0ce48ce778f
                                    • Instruction Fuzzy Hash: EBB10375D00219EFDB14DFA8C984AEDBBB4FF48304F14812AE819AB351E770AA85CF51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00C68FF2
                                    • OleDuplicateData.OLE32(?,?,00000000), ref: 00C69073
                                    • GlobalLock.KERNEL32(00000000,0000005C,00D47621,?,?,?), ref: 00C690A2
                                    • CopyMetaFileW.GDI32(?,00000000), ref: 00C690AE
                                    • GlobalUnlock.KERNEL32(?), ref: 00C690BE
                                    • GlobalFree.KERNEL32(?), ref: 00C690C7
                                    • GlobalUnlock.KERNEL32(?), ref: 00C690D3
                                    • lstrlenW.KERNEL32(?,0000005C,00D47621,?,?,?), ref: 00C69133
                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,0000005C,00D47621,?,?,?), ref: 00C6922B
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Global$CopyFileUnlock$DataDuplicateFreeH_prolog3_LockMetalstrlen
                                    • String ID:
                                    • API String ID: 3489744035-0
                                    • Opcode ID: f22d0cdd1d8d66bfdcbd3740d0a51b1fd86b27cdb3fc01585fa3ff66151ac4e6
                                    • Instruction ID: 1d3c5f0c528ce203e69e0c5f04a686f973e804aa9eda3144132c7445ed0856f3
                                    • Opcode Fuzzy Hash: f22d0cdd1d8d66bfdcbd3740d0a51b1fd86b27cdb3fc01585fa3ff66151ac4e6
                                    • Instruction Fuzzy Hash: 6F8188B1900606AFDB249FA0CDD883ABBBDFF49304B208919F46ADB651D730ED41DB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00D0A2DB: GetParent.USER32(?), ref: 00D0A2E7
                                      • Part of subcall function 00D0A2DB: GetParent.USER32(00000000), ref: 00D0A2EA
                                      • Part of subcall function 00C6EAF8: GetWindowLongW.USER32(?,000000F0), ref: 00C6EB03
                                    • GetParent.USER32(?), ref: 00CA2532
                                    • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 00CA2547
                                    • GetClientRect.USER32(?,?), ref: 00CA25AE
                                    • GetClientRect.USER32(?,?), ref: 00CA25C3
                                      • Part of subcall function 00C6D5BB: ClientToScreen.USER32(?,00C8FF4D), ref: 00C6D5CC
                                      • Part of subcall function 00C6D5BB: ClientToScreen.USER32(?,00C8FF55), ref: 00C6D5D9
                                    • GetWindowRect.USER32(?,?), ref: 00CA25E3
                                      • Part of subcall function 00C6EE73: SetWindowPos.USER32(?,000000FF,000000FF,?,?,00000000,00C71B6D,?,00C71B6D,00000000,?,?,000000FF,000000FF,00000015), ref: 00C6EE9B
                                    • GetParent.USER32(?), ref: 00CA2632
                                    • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 00CA2646
                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00CA269B
                                    • PostMessageW.USER32(?,00000000,00000000), ref: 00CA26BD
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ClientMessageParent$RectSendWindow$Screen$LongPost
                                    • String ID:
                                    • API String ID: 3884207962-0
                                    • Opcode ID: ebb0c3eca4b781fa9cfec2a37c068b3fd0b147629759ce0602db766623a07536
                                    • Instruction ID: 6a66ff0542034f66beedb774061a5a5fafe5ae752f2c076e79ca68671b732f7d
                                    • Opcode Fuzzy Hash: ebb0c3eca4b781fa9cfec2a37c068b3fd0b147629759ce0602db766623a07536
                                    • Instruction Fuzzy Hash: E861F6B1901219AFCF10DFA9DC84AAEBBF5FF88304F14416AF905EB261C6719A01DF64
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsWindow.USER32(?), ref: 00C6E3A3
                                      • Part of subcall function 00C8FF0B: GetClientRect.USER32(?,?), ref: 00C8FF3C
                                      • Part of subcall function 00C8FF0B: PtInRect.USER32(?,?,?), ref: 00C8FF56
                                    • ScreenToClient.USER32(?,?), ref: 00C6E415
                                    • PtInRect.USER32(?,?,?), ref: 00C6E425
                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00C6E451
                                    • GetParent.USER32(?), ref: 00C6E470
                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00C6E4D9
                                    • GetFocus.USER32 ref: 00C6E4DF
                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00C6E51C
                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00C6E540
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: MessageSend$Rect$Client$FocusParentScreenWindow
                                    • String ID:
                                    • API String ID: 4216724418-0
                                    • Opcode ID: 519751bdcd2aafaaf8a4aa33bf5eac53c4d42db89b3a8f3d60eb72e929df7e59
                                    • Instruction ID: 7c366e4209d4865fcd7fd9e7a4ddec66298baa8d0c514379bb52de661e6add65
                                    • Opcode Fuzzy Hash: 519751bdcd2aafaaf8a4aa33bf5eac53c4d42db89b3a8f3d60eb72e929df7e59
                                    • Instruction Fuzzy Hash: 12511E79600205AFDB30AFA4DDC9E6977A4EB04314B148466F956DB2A1DB30EE05DB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • EnableMenuItem.USER32(?,0000420F,00000001), ref: 00C86FFE
                                    • EnableMenuItem.USER32(?,0000420E,00000001), ref: 00C8701A
                                    • CheckMenuItem.USER32(?,00004213,00000008), ref: 00C8704F
                                    • EnableMenuItem.USER32(?,00004212,00000001), ref: 00C8706F
                                    • EnableMenuItem.USER32(?,00004212,00000001), ref: 00C87093
                                    • EnableMenuItem.USER32(?,00004213,00000001), ref: 00C8709F
                                    • EnableMenuItem.USER32(?,00004214,00000001), ref: 00C870AB
                                    • EnableMenuItem.USER32(?,00004215,00000001), ref: 00C870F3
                                    • CheckMenuItem.USER32(?,00004215,00000008), ref: 00C87107
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ItemMenu$Enable$Check
                                    • String ID:
                                    • API String ID: 1852492618-0
                                    • Opcode ID: 5263caadcdd3753fb8622cbb33ec45759dad83fa1742a366cffbc2df831933ca
                                    • Instruction ID: 551115f0f90fd68dcb97d6de07571cab477c79b302f82d1e2e1e427acc47dc76
                                    • Opcode Fuzzy Hash: 5263caadcdd3753fb8622cbb33ec45759dad83fa1742a366cffbc2df831933ca
                                    • Instruction Fuzzy Hash: EC41A570744301FBDB20AF15CD85F26BBA5AB10748F248265FA25AF1E1E7B1DD40DB98
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_catch.LIBCMT ref: 00C7E2CB
                                    • EnterCriticalSection.KERNEL32(?,00000010,00C7E56C,?,00000000,?,00000004,00C6BDE1,00C69392,00C694C8,00C55491,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5,SOFTWARE\Microsoft\Windows NT\CurrentVersion), ref: 00C7E2DC
                                    • TlsGetValue.KERNEL32(?,?,00000000,?,00000004,00C6BDE1,00C69392,00C694C8,00C55491,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5,SOFTWARE\Microsoft\Windows NT\CurrentVersion), ref: 00C7E2FA
                                    • LocalAlloc.KERNEL32(00000000,00000000,00000000,00000010,?,?,00000000,?,00000004,00C6BDE1,00C69392,00C694C8,00C55491,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5), ref: 00C7E32E
                                    • LeaveCriticalSection.KERNEL32(?,?,?,00000000,?,00000004,00C6BDE1,00C69392,00C694C8,00C55491,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5,SOFTWARE\Microsoft\Windows NT\CurrentVersion), ref: 00C7E39A
                                    • _memset.LIBCMT ref: 00C7E3B9
                                    • TlsSetValue.KERNEL32(?,00000000), ref: 00C7E3CA
                                    • LeaveCriticalSection.KERNEL32(?,?,00000000,?,00000004,00C6BDE1,00C69392,00C694C8,00C55491,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5,SOFTWARE\Microsoft\Windows NT\CurrentVersion), ref: 00C7E3EB
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CriticalSection$LeaveValue$AllocEnterH_prolog3_catchLocal_memset
                                    • String ID:
                                    • API String ID: 1891723912-0
                                    • Opcode ID: 8cbb9c8a67463cde2658f711dc021dc7c0be4ed9cf4db8cd3cd457dd4e260e6c
                                    • Instruction ID: 22eadcdbd1464c89a6b7f094966e33552bb1f39b1376e7748e10fd86c7aa995b
                                    • Opcode Fuzzy Hash: 8cbb9c8a67463cde2658f711dc021dc7c0be4ed9cf4db8cd3cd457dd4e260e6c
                                    • Instruction Fuzzy Hash: 3B317C76400605EFCB24AF60CCC5C6ABBB5FF08310B20C66EF56A97661DB30AD55DBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_catch_GS.LIBCMT ref: 00D0601F
                                      • Part of subcall function 00C6BE1C: ActivateActCtx.KERNEL32(?), ref: 00C6BE3F
                                    • lstrlenA.KERNEL32(00000000,00000050,00C99307,00000000,00000001,?,?,000000FF,?,?,?,?,?,?,00000034,00C7A402), ref: 00D06050
                                      • Part of subcall function 00C5DF30: _memcpy_s.LIBCMT ref: 00C5DF43
                                    • _memset.LIBCMT ref: 00D060FF
                                      • Part of subcall function 00D05D8C: __EH_prolog3.LIBCMT ref: 00D05D93
                                    • VariantClear.OLEAUT32(?), ref: 00D061ED
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ActivateClearH_prolog3H_prolog3_catch_Variant_memcpy_s_memsetlstrlen
                                    • String ID: `)u
                                    • API String ID: 3853244332-4279031584
                                    • Opcode ID: 542d86ab3a85b0a3624e41486242f4b989704ec27800e111441ca085d94a751a
                                    • Instruction ID: dec6aed0007122633000f4fe96fbcd0da9c20df9ecc194a76aea9b4f41de6ba6
                                    • Opcode Fuzzy Hash: 542d86ab3a85b0a3624e41486242f4b989704ec27800e111441ca085d94a751a
                                    • Instruction Fuzzy Hash: 9691BF30C00609DBCF14DFA8C4856ADBBB4FF04310F288159E85AAB2A2C731DE55DBB9
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegCreateKeyExW.ADVAPI32(80000002,?,00000000,00000000,00000000,0002001F,00000000,?,?,SOFTWARE\Brother Industries, Ltd.\P-touch Update Software), ref: 00C59107
                                    • RegSetValueExW.ADVAPI32(?,dwExitCode,00000000,00000004,00000001,00000004), ref: 00C59126
                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00D8EBE8,000000FF), ref: 00C5912D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CloseCreateValue
                                    • String ID: LANGID=$SOFTWARE\Brother Industries, Ltd.\P-touch Update Software$UpdateSoftLangID$dwExitCode
                                    • API String ID: 1818849710-26048477
                                    • Opcode ID: 5f502b06b33e5b178cec3fe1558ee24ec11f6b4aff2a14bc64372e6cbe38dcbf
                                    • Instruction ID: 68c71b3f71a05752aaf71ec03aba6aade13de09c5581759a164827fd4917474a
                                    • Opcode Fuzzy Hash: 5f502b06b33e5b178cec3fe1558ee24ec11f6b4aff2a14bc64372e6cbe38dcbf
                                    • Instruction Fuzzy Hash: 54518F716006059FD714DB68CC45BAAB3B9FF89324F148358E526AB2D1D770A905CBA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C6CA21: GetParent.USER32(?), ref: 00C6CA75
                                      • Part of subcall function 00C6CA21: GetLastActivePopup.USER32(?), ref: 00C6CA86
                                      • Part of subcall function 00C6CA21: IsWindowEnabled.USER32(?), ref: 00C6CA9A
                                      • Part of subcall function 00C6CA21: EnableWindow.USER32(?,00000000), ref: 00C6CAAD
                                    • EnableWindow.USER32(?,00000001), ref: 00C6CB20
                                    • GetWindowThreadProcessId.USER32(?,?), ref: 00C6CB34
                                    • GetCurrentProcessId.KERNEL32(?,?), ref: 00C6CB3E
                                    • SendMessageW.USER32(?,00000376,00000000,00000000), ref: 00C6CB56
                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?), ref: 00C6CBD2
                                    • EnableWindow.USER32(00000000,00000001), ref: 00C6CC19
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$Enable$Process$ActiveCurrentEnabledFileLastMessageModuleNameParentPopupSendThread
                                    • String ID: 0
                                    • API String ID: 1877664794-4108050209
                                    • Opcode ID: 7a76f78a533f521ed7d91affc2e69048d9bd83a14073966b466d5bc0783e72cb
                                    • Instruction ID: f5373d9cd5a3a5c7b96a8a83283af0cfd141387b444e82d3f8c5753469d8b99b
                                    • Opcode Fuzzy Hash: 7a76f78a533f521ed7d91affc2e69048d9bd83a14073966b466d5bc0783e72cb
                                    • Instruction Fuzzy Hash: 3B417D71A40319ABDB309F64DCCABBAB7B4EF54710F140599F5A9E6290D770DE808BA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00C888DB
                                    • SetCursor.USER32(00000040,00C8906A,00000000,00000000,?), ref: 00C88975
                                      • Part of subcall function 00C6D8B5: __EH_prolog3.LIBCMT ref: 00C6D8BC
                                      • Part of subcall function 00C6D8B5: GetDC.USER32(00000000), ref: 00C6D8E8
                                      • Part of subcall function 00C82F76: __EH_prolog3_GS.LIBCMT ref: 00C82F7D
                                      • Part of subcall function 00C82F76: CreateRectRgnIndirect.GDI32(?), ref: 00C82FBA
                                      • Part of subcall function 00C82F76: CopyRect.USER32(?,?), ref: 00C82FD0
                                      • Part of subcall function 00C82F76: InflateRect.USER32(?,?,?), ref: 00C82FE6
                                      • Part of subcall function 00C82F76: IntersectRect.USER32(?,?,?), ref: 00C82FF4
                                      • Part of subcall function 00C82F76: CreateRectRgnIndirect.GDI32(?), ref: 00C82FFE
                                      • Part of subcall function 00C82F76: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 00C83013
                                      • Part of subcall function 00C82F76: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 00C8307B
                                      • Part of subcall function 00C6D909: __EH_prolog3.LIBCMT ref: 00C6D910
                                      • Part of subcall function 00C6D909: ReleaseDC.USER32(?,00000000), ref: 00C6D92D
                                    • GetFocus.USER32 ref: 00C88A14
                                    • SetTimer.USER32(?,00000014,000001F4,00000000), ref: 00C88AD4
                                    • SendMessageW.USER32(?,00000362,0000E001,00000000), ref: 00C88B79
                                    • KillTimer.USER32(?,00000014), ref: 00C88CA5
                                    • SetTimer.USER32(?,00000014,000001F4,00000000), ref: 00C88CC2
                                    • UpdateWindow.USER32(?), ref: 00C88CE1
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$Create$Timer$H_prolog3H_prolog3_Indirect$CopyCursorFocusInflateIntersectKillMessageReleaseSendUpdateWindow
                                    • String ID:
                                    • API String ID: 2399994607-0
                                    • Opcode ID: 11b3e26ef97fecdf82b7e3522dd18961cd0594058da2b8487fba06450972234c
                                    • Instruction ID: 7ef15e478cf1b03d2a511812db02a4351b90403d8e59ccf4539ac246a2fa5fe2
                                    • Opcode Fuzzy Hash: 11b3e26ef97fecdf82b7e3522dd18961cd0594058da2b8487fba06450972234c
                                    • Instruction Fuzzy Hash: C1C17E70600204DFDF24AF64C8C5BA977A1EF44329F58427AEC299E6D5DF709A48DB28
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$Visible_memset$MetricsRectSystemZoomed
                                    • String ID:
                                    • API String ID: 3274878110-0
                                    • Opcode ID: eb5bc2db09745bd5c62da356958f0aed7adee16a5b5d685a8bae115cfd5a072d
                                    • Instruction ID: 870925fa62c4d638de32a0f9be8752de449d84e0d29003d27604f23f44b3bfde
                                    • Opcode Fuzzy Hash: eb5bc2db09745bd5c62da356958f0aed7adee16a5b5d685a8bae115cfd5a072d
                                    • Instruction Fuzzy Hash: 0B914DB1E00258DFCF24DFAAC884AEEBBB5FF48700F14416AE915AB255D7709941CFA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$CaptureDestroyEmptyMessageParentPointsRectReleaseSendVisible
                                    • String ID:
                                    • API String ID: 3509494761-0
                                    • Opcode ID: bce8ef91969055501f2b4ac5c64a7b038447e8bac57428bc93c1cf28bdc6f3be
                                    • Instruction ID: bfe1eb9214bb843ad6ddb2fb5ccb526a913c9999ea69b2266b6287bff21cb82e
                                    • Opcode Fuzzy Hash: bce8ef91969055501f2b4ac5c64a7b038447e8bac57428bc93c1cf28bdc6f3be
                                    • Instruction Fuzzy Hash: 6C514D31200201ABDB15AF64CC99BBE77A5EF45305F05047AFA1ADF296DB71DA04CB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetClientRect.USER32(?,?), ref: 00C7284F
                                    • BeginDeferWindowPos.USER32(00000008), ref: 00C72867
                                    • GetTopWindow.USER32(?), ref: 00C7287C
                                    • GetDlgCtrlID.USER32(00000000), ref: 00C7288B
                                    • SendMessageW.USER32(00000000,00000361,00000000,00000000), ref: 00C728BD
                                    • GetWindow.USER32(00000000,00000002), ref: 00C728C6
                                    • CopyRect.USER32(?,?), ref: 00C728E4
                                    • EndDeferWindowPos.USER32(00000000), ref: 00C7295B
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$DeferRect$BeginClientCopyCtrlMessageSend
                                    • String ID:
                                    • API String ID: 1228040700-0
                                    • Opcode ID: 5a4d17443e09dda9071a0050318035d529a7fea711ddc531c3c9d5452e333636
                                    • Instruction ID: b113e48825049275c0e8a73413e023c9688abb5786a1e171fb59f9adf2bac67d
                                    • Opcode Fuzzy Hash: 5a4d17443e09dda9071a0050318035d529a7fea711ddc531c3c9d5452e333636
                                    • Instruction Fuzzy Hash: 79512972900219EFCF11DFA9D8849EEB7F5FF48310F18816AE819B7250D7319A41CBA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetAsyncKeyState.USER32(00000012), ref: 00CB04B8
                                    • GetAsyncKeyState.USER32(00000012), ref: 00CB04D2
                                    • _memset.LIBCMT ref: 00CB04F1
                                    • GetKeyboardState.USER32(?), ref: 00CB0500
                                    • GetKeyboardLayout.USER32(?), ref: 00CB0517
                                    • MapVirtualKeyW.USER32(?,00000000), ref: 00CB0533
                                    • ToUnicodeEx.USER32(?,00000000), ref: 00CB053B
                                    • CharUpperW.USER32(?), ref: 00CB0548
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: State$AsyncKeyboard$CharLayoutUnicodeUpperVirtual_memset
                                    • String ID:
                                    • API String ID: 3224171628-0
                                    • Opcode ID: 4f00383a567aa09d3426fde31f23b43a326601af79cc5bd658365892326b0ab7
                                    • Instruction ID: 3c528e0006925364186bbead1f4a80c72e8af47706ccd9a53926cc4cafab5fdb
                                    • Opcode Fuzzy Hash: 4f00383a567aa09d3426fde31f23b43a326601af79cc5bd658365892326b0ab7
                                    • Instruction Fuzzy Hash: 43219271500219ABDB20AB60DC45FFE776CEB14710F500066F651E6191DBB09E859FB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetMenuItemCount.USER32(?), ref: 00C689F0
                                    • GetMenuItemCount.USER32(?), ref: 00C689F8
                                    • GetSubMenu.USER32(?,-00000001), ref: 00C68A15
                                    • GetMenuItemCount.USER32(00000000), ref: 00C68A25
                                    • GetSubMenu.USER32(00000000,00000000), ref: 00C68A36
                                    • RemoveMenu.USER32(00000000,00000000,00000400), ref: 00C68A53
                                    • GetSubMenu.USER32(?,?), ref: 00C68A6D
                                    • RemoveMenu.USER32(?,?,00000400), ref: 00C68A8B
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Menu$CountItem$Remove
                                    • String ID:
                                    • API String ID: 3494307843-0
                                    • Opcode ID: 4acc2d674c480e4534bd29002a721ac6a5a4bb470fed1621d6504189f1d13ae9
                                    • Instruction ID: b2970560bfbbaf7906784657651750216edb429b7c9d9d95d531d34d10ef127a
                                    • Opcode Fuzzy Hash: 4acc2d674c480e4534bd29002a721ac6a5a4bb470fed1621d6504189f1d13ae9
                                    • Instruction Fuzzy Hash: 20210975914209FBCF21DFE4CD849ADBBB9FB04310F2046A3EA11E2122DB759B54AB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GlobalLock.KERNEL32(?,?,?,?,?,?,00C7412A,?), ref: 00C79084
                                    • lstrcmpW.KERNEL32(00000000,?,?,?,?,?,?,00C7412A,?), ref: 00C79091
                                    • OpenPrinterW.WINSPOOL.DRV(?,?,00000000,?,?,?,?,?,00C7412A,?), ref: 00C790A3
                                    • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,00000000,?,?,?,?,?,00C7412A,?), ref: 00C790C3
                                    • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 00C790CB
                                    • GlobalLock.KERNEL32(00000000,?,?,?,?,?,00C7412A,?), ref: 00C790D5
                                    • DocumentPropertiesW.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000002,?,?,?,?,?,00C7412A,?), ref: 00C790E2
                                    • ClosePrinter.WINSPOOL.DRV(?,00000000,?,?,00000000,00000000,00000002,?,?,?,?,?,00C7412A,?), ref: 00C790FA
                                      • Part of subcall function 00C81964: GlobalFlags.KERNEL32(?), ref: 00C81973
                                      • Part of subcall function 00C81964: GlobalUnlock.KERNEL32(?,?,?,?,00C79895,?,00000414,00C636DD,?,18846CE9,?,?,?,?,?,00D8EFC8), ref: 00C81984
                                      • Part of subcall function 00C81964: GlobalFree.KERNEL32(?), ref: 00C8198E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Global$DocumentLockProperties$AllocCloseFlagsFreeOpenPrinterPrinter.Unlocklstrcmp
                                    • String ID:
                                    • API String ID: 168474834-0
                                    • Opcode ID: c41e1ccdb42d448c174c61b16dd46ea8dcebd61e68ad56e2c82328a856fe46ab
                                    • Instruction ID: 8607f539ec591fe666c09841ecfbfc8532d3ba2bfbf46500b87e8c1d9157a2e7
                                    • Opcode Fuzzy Hash: c41e1ccdb42d448c174c61b16dd46ea8dcebd61e68ad56e2c82328a856fe46ab
                                    • Instruction Fuzzy Hash: 7B119A76500604BEDB22ABA5CD8ADAF7AFEEB89B44B104019FA15D2121CA31DA41E730
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetSystemMetrics.USER32(00000031), ref: 00C7E6CB
                                    • GetSystemMetrics.USER32(00000032), ref: 00C7E6D5
                                    • SetRectEmpty.USER32(00DE672C), ref: 00C7E6E4
                                    • EnumDisplayMonitors.USER32(00000000,00000000,00C7E630,00DE672C,?,?,?,00C6B391,?), ref: 00C7E6F4
                                    • SystemParametersInfoW.USER32(00000030,00000000,00DE672C,00000000), ref: 00C7E70F
                                    • SystemParametersInfoW.USER32(00001002,00000000,00DE6758,00000000), ref: 00C7E72F
                                    • SystemParametersInfoW.USER32(00001012,00000000,00DE675C,00000000), ref: 00C7E747
                                    • SystemParametersInfoW.USER32 ref: 00C7E767
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: System$InfoParameters$Metrics$DisplayEmptyEnumMonitorsRect
                                    • String ID:
                                    • API String ID: 2614369430-0
                                    • Opcode ID: d4688fd2f066fb1491c68913f5e34fd39f3a4024107dfbf3e7f13303afcba816
                                    • Instruction ID: f418adae06646140fc9335f40ef4299878b4a63dcb1f82e1d27b3a1a8ddc96d5
                                    • Opcode Fuzzy Hash: d4688fd2f066fb1491c68913f5e34fd39f3a4024107dfbf3e7f13303afcba816
                                    • Instruction Fuzzy Hash: D3111C76501740AFE3319B668C89EE7BBFCEFCAB00F00491EE5AAC6240D7B06545CA60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Global$Size$LockUnlock$Alloc
                                    • String ID:
                                    • API String ID: 2344174106-0
                                    • Opcode ID: 6e4ff8e164f50c06e7111e457703b2ee64a7bc25f36f5307b5ec478c8394dd6f
                                    • Instruction ID: 36b62c851e01ad1e5e60f92e579a1d4841a6c4bda3ef49aea50c162a1887bb3b
                                    • Opcode Fuzzy Hash: 6e4ff8e164f50c06e7111e457703b2ee64a7bc25f36f5307b5ec478c8394dd6f
                                    • Instruction Fuzzy Hash: 5D017C75901218BFDB216F669D84C6F7F6CEF443A07004522FD09A3251DA71DE14DAB4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: _wcsrchr$ExistsFilePath
                                    • String ID: ADECmdOp$ADEFilePath$\US\AccessDatabaseEngine.exe
                                    • API String ID: 2890317550-2044278110
                                    • Opcode ID: 9a61900e501ee81985147607a9bf4d81d32a8ff2966bb5f642103133f6f4de38
                                    • Instruction ID: 07fd9cdd388def88fdcdaf45a41404085b3a5a83836cfe81772e108bf8d1d606
                                    • Opcode Fuzzy Hash: 9a61900e501ee81985147607a9bf4d81d32a8ff2966bb5f642103133f6f4de38
                                    • Instruction Fuzzy Hash: 15E1A575600605DFD704CB6CCC91FAAB7B5BF95325F148358E4259B2D2DB30AE49CBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00D0E1EF
                                    • GetWindow.USER32(?,00000005), ref: 00D0E253
                                      • Part of subcall function 00D0D8D9: __EH_prolog3.LIBCMT ref: 00D0D8E0
                                      • Part of subcall function 00D0D8D9: GetWindow.USER32(?,00000005), ref: 00D0D900
                                      • Part of subcall function 00D0D8D9: GetWindow.USER32(?,00000002), ref: 00D0D936
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$H_prolog3
                                    • String ID:
                                    • API String ID: 1351209170-0
                                    • Opcode ID: 22c115057bffdd041e985ce2a9224dda333f563bc748bda22e9c6830e321c66e
                                    • Instruction ID: 3724a1e55c7cfaa35b120306a79b5a5da5f3d6a2331a68ea38c4af0db2fd3c13
                                    • Opcode Fuzzy Hash: 22c115057bffdd041e985ce2a9224dda333f563bc748bda22e9c6830e321c66e
                                    • Instruction Fuzzy Hash: 28D15D70A002169FDF14EFB4C899BADB7B5BF08304F480969E55AAB2D2DF74D940DB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00CF462F
                                    • GetMenuItemCount.USER32(0000000D), ref: 00CF4678
                                    • GetMenuItemID.USER32(0000000D,?), ref: 00CF469B
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                      • Part of subcall function 00CD52AD: __EH_prolog3.LIBCMT ref: 00CD52B4
                                    • lstrlenW.KERNEL32(00000000,?), ref: 00CF47BD
                                    • CharUpperBuffW.USER32(00000002,00000001), ref: 00CF47D2
                                    • lstrlenW.KERNEL32(00000000), ref: 00CF47DA
                                    • GetSubMenu.USER32(00000000,?), ref: 00CF490C
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Menu$H_prolog3Itemlstrlen$BuffCharCountException@8H_prolog3_ThrowUpper
                                    • String ID:
                                    • API String ID: 649264743-0
                                    • Opcode ID: ed856cab5c70e2a46ab0d0957f2cea61bf10279ee7137ab911bd6af6241a6d17
                                    • Instruction ID: b8f1e118e799ea85d83fe5382c1930ad1673005bb8377c96c9a8199c76f328b3
                                    • Opcode Fuzzy Hash: ed856cab5c70e2a46ab0d0957f2cea61bf10279ee7137ab911bd6af6241a6d17
                                    • Instruction Fuzzy Hash: 3FD19B30900228EBDF29EB64CC95BEEB774AF05321F5042D9E629A62D1DB305F84DF56
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: _wcsrchr$ExistsFilePath
                                    • String ID: ADECmdOp$ADEFilePath$\US\AccessDatabaseEngine.exe
                                    • API String ID: 2890317550-2044278110
                                    • Opcode ID: 4c16458cc3faa5ebf4d06dfa5d66872b6eafd239dda228a5cde84a9b157c73fb
                                    • Instruction ID: 333720bf32f3126be3ffec964c2c97418b5866b393e6ae81e10263a10085a859
                                    • Opcode Fuzzy Hash: 4c16458cc3faa5ebf4d06dfa5d66872b6eafd239dda228a5cde84a9b157c73fb
                                    • Instruction Fuzzy Hash: BEA1C575A00605DFD704DBACCC41BAEB7B5BF95325F148358E4269B2D2DB70AE09CBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00D00B2B
                                    • CreateCompatibleDC.GDI32(?), ref: 00D00B88
                                      • Part of subcall function 00CCE17B: FillRect.USER32(?,?), ref: 00CCE18F
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CompatibleCreateFillH_prolog3Rect
                                    • String ID:
                                    • API String ID: 2215992850-0
                                    • Opcode ID: 2144a7bd124563bda55e9e11083ac2e587d5557ab29d37b085fc1ca447aa7cb7
                                    • Instruction ID: a5fd820f52008c388e191ab2c9474288816651d2a5758f06d7abc5cf4b293b5f
                                    • Opcode Fuzzy Hash: 2144a7bd124563bda55e9e11083ac2e587d5557ab29d37b085fc1ca447aa7cb7
                                    • Instruction Fuzzy Hash: B0918A71A0021AABCB14EFA8CC85BAEBFB5FF48300F144229F555E6291DB30E915DB70
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetParent.USER32(?), ref: 00C943DB
                                    • SendMessageW.USER32(?,00000362,0000E001,00000000), ref: 00C9441B
                                    • GetParent.USER32(?), ref: 00C944AF
                                    • PostMessageW.USER32(?,-00000111,?,00000000), ref: 00C94553
                                    • GetParent.USER32(?), ref: 00C945B7
                                    • InvalidateRect.USER32(?,?,00000001,?), ref: 00C94629
                                    • UpdateWindow.USER32(?), ref: 00C94635
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Parent$Message$InvalidatePostRectSendUpdateWindow
                                    • String ID:
                                    • API String ID: 896913059-0
                                    • Opcode ID: 3bd8934ade46b30f2bf683320612e49ee96f28abf0030c2b850fc0651c3158e2
                                    • Instruction ID: dd92c340e1593e5662bc80f84e197de09fc765fa4a92a92112557a24257e8260
                                    • Opcode Fuzzy Hash: 3bd8934ade46b30f2bf683320612e49ee96f28abf0030c2b850fc0651c3158e2
                                    • Instruction Fuzzy Hash: 8071D232600205AFCF19AFA4C889F6E77A5AF44700F15416AF956EB291DF709E419BA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00CA7529
                                      • Part of subcall function 00CE243D: __EH_prolog3.LIBCMT ref: 00CE2444
                                    • GetMenuItemCount.USER32(?), ref: 00CA7593
                                    • GetMenuItemID.USER32(?,?), ref: 00CA75B6
                                    • GetMenuItemCount.USER32(?), ref: 00CA75F9
                                    • GetMenuItemID.USER32(?,?), ref: 00CA762D
                                    • SendMessageW.USER32(?,00000234,00000000,00000000), ref: 00CA769F
                                    • GetMenuState.USER32(?,?,00000400), ref: 00CA76F7
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Menu$Item$Count$H_prolog3H_prolog3_MessageSendState
                                    • String ID:
                                    • API String ID: 999183886-0
                                    • Opcode ID: a8025df4e1cafc37e50ef488bc2210347ca23251921b8a1bd8c4db464cf96b46
                                    • Instruction ID: 8508508f0d4aa055966c5107d5dc3608164a4b8a2711d9a2fb8f5a15f9ff3323
                                    • Opcode Fuzzy Hash: a8025df4e1cafc37e50ef488bc2210347ca23251921b8a1bd8c4db464cf96b46
                                    • Instruction Fuzzy Hash: 98713B7180426A9FCF259F64CD84AEDB7B5BB05318F1402EAE929A6291DB305FC1DF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_catch.LIBCMT ref: 00D475B4
                                      • Part of subcall function 00D47525: OleGetClipboard.OLE32(?), ref: 00D4753D
                                    • ReleaseStgMedium.OLE32(?), ref: 00D47629
                                    • ReleaseStgMedium.OLE32(?), ref: 00D4766E
                                    • CoTaskMemFree.OLE32(?), ref: 00D47716
                                    • ReleaseStgMedium.OLE32(?), ref: 00D4768E
                                      • Part of subcall function 00C6855B: _malloc.LIBCMT ref: 00C68579
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: MediumRelease$ClipboardFreeH_prolog3_catchTask_malloc
                                    • String ID: '
                                    • API String ID: 3930503942-1997036262
                                    • Opcode ID: 12134a28a2cbe90f68b05cfc45d0732882277fe46a502ba07cd2e5adcadb692c
                                    • Instruction ID: e9a93cd3f5a66f68f6bf7883560bc2ab31e6e1e37151b543e6626241166c0504
                                    • Opcode Fuzzy Hash: 12134a28a2cbe90f68b05cfc45d0732882277fe46a502ba07cd2e5adcadb692c
                                    • Instruction Fuzzy Hash: 54517E71904209EFCF10EFA8C988AED7BF5AF08340F65446AF945EB281DB749A44DB71
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_catch.LIBCMT ref: 00CB134C
                                    • CloseHandle.KERNEL32(00D02F4A,00000080,00D02F4A,?,00000000,?,00000000), ref: 00CB1385
                                    • GetTempPathW.KERNEL32(00000104,00000000,00000104,00000000,00000080,00D02F4A,?,00000000,?,00000000), ref: 00CB13AC
                                    • GetTempFileNameW.KERNEL32(000000FF,AFX,00000000,00000000,00000104,00000000,000000FF,?,00000000), ref: 00CB13E3
                                    • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000002,04000100,00000000,000000FF,?,00000000), ref: 00CB1405
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: FileTemp$CloseCreateH_prolog3_catchHandleNamePath
                                    • String ID: AFX
                                    • API String ID: 1737446630-1300893600
                                    • Opcode ID: 93be063e87a9284005452e9307e1716136518f5029bbefad0c1bc05319ed3624
                                    • Instruction ID: a2af7e527d9ef765a02b7d680e1988142be63a88a87631c8a56723849553cedd
                                    • Opcode Fuzzy Hash: 93be063e87a9284005452e9307e1716136518f5029bbefad0c1bc05319ed3624
                                    • Instruction Fuzzy Hash: 5D41AF70800119EBCB14EFA4CD95EEEBBB8AF44314F148259F916A72D2DB346A09DB74
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00CC5509
                                      • Part of subcall function 00CF60C5: __EH_prolog3.LIBCMT ref: 00CF60CC
                                      • Part of subcall function 00D43420: SetRectEmpty.USER32(?), ref: 00D43450
                                    • SetRectEmpty.USER32(?), ref: 00CC5651
                                    • SetRectEmpty.USER32(?), ref: 00CC5660
                                    • SetRectEmpty.USER32(?), ref: 00CC5669
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: EmptyRect$H_prolog3
                                    • String ID: False$True
                                    • API String ID: 3752103406-1895882422
                                    • Opcode ID: 4cf7ad39a915e4d67ebd7e2cd9f27435e4279d70d77aa621d4c36464f8d82e55
                                    • Instruction ID: bf8de1fdaf65a31d230e0f814d7181166f902f74c0ef37ed8cbdf8f1e801c1e8
                                    • Opcode Fuzzy Hash: 4cf7ad39a915e4d67ebd7e2cd9f27435e4279d70d77aa621d4c36464f8d82e55
                                    • Instruction Fuzzy Hash: 17519DB0801B408FD362EF7AC5957DAFBE8BF64300F50495EE4AE962A1DBB02644DB15
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _memset.LIBCMT ref: 00C72273
                                    • SendMessageW.USER32(00000000,00000433,00000000,?), ref: 00C7229C
                                    • GetWindowLongW.USER32(?,000000FC), ref: 00C722AE
                                    • GetWindowLongW.USER32(?,000000FC), ref: 00C722BF
                                    • SetWindowLongW.USER32(?,000000FC,?), ref: 00C722DB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: LongWindow$MessageSend_memset
                                    • String ID: ,
                                    • API String ID: 2997958587-3772416878
                                    • Opcode ID: d169b1848cb76dea1365353d90b029858793386024c24f262eb662a6193eefc6
                                    • Instruction ID: ca88067a6381c282c88fd0302f01d80d9085bc0be3a2b3ed9c978eed34ee0676
                                    • Opcode Fuzzy Hash: d169b1848cb76dea1365353d90b029858793386024c24f262eb662a6193eefc6
                                    • Instruction Fuzzy Hash: 70419271600304ABCB25EF75D884A6EB7E4FF48320F15456DE59A97692DB30EE00CB94
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsWindowVisible.USER32(?), ref: 00CE080B
                                      • Part of subcall function 00D1423F: RedrawWindow.USER32(?,00000000,00000000,00000105), ref: 00D142B6
                                    • IsWindowVisible.USER32(?), ref: 00CE0835
                                    • IsWindowVisible.USER32(?), ref: 00CE0879
                                    • RedrawWindow.USER32(?,00000000,00000000,00000585), ref: 00CE089B
                                    • RedrawWindow.USER32(?,00000000,00000000,00000501), ref: 00CE08AD
                                    • RedrawWindow.USER32(?,00000000,00000000,00000105), ref: 00CE08CF
                                    • RedrawWindow.USER32(?,?,00000000,00000541), ref: 00CE0900
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$Redraw$Visible
                                    • String ID:
                                    • API String ID: 1637130220-0
                                    • Opcode ID: 4b938d78f0dfd8c1e3ce0c66b244431aecd08d7d072b6fb76dbf65014db7e7bb
                                    • Instruction ID: 19de06544608107eda280ac949a424144fbcc2bd227d0b244c2e8e53de1a4d06
                                    • Opcode Fuzzy Hash: 4b938d78f0dfd8c1e3ce0c66b244431aecd08d7d072b6fb76dbf65014db7e7bb
                                    • Instruction Fuzzy Hash: 44415E7160064AEFDB20AF65CD81ABA7BB9BF04304F210479E55596262DB709E80DBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C7E013: __EH_prolog3_catch.LIBCMT ref: 00C7E01A
                                    • GetUserDefaultUILanguage.KERNEL32(00000000,00000005,00D646C6,00000000,?,?,00D4E9B0,00000000,?,00D4ED4B,00000000,0000001C,00D4EADE,00000000,00D4ED4B), ref: 00D6472D
                                    • FindResourceExW.KERNEL32(00000000,00000005,?,0000FC11,?,?,00D4E9B0,00000000,?,00D4ED4B,00000000,0000001C,00D4EADE,00000000,00D4ED4B), ref: 00D6476B
                                    • FindResourceW.KERNEL32(00000000,?,00000005,?,?,00D4E9B0,00000000,?,00D4ED4B,00000000,0000001C,00D4EADE,00000000,00D4ED4B), ref: 00D64784
                                    • LoadResource.KERNEL32(00000000,00000000,?,?,00D4E9B0,00000000,?,00D4ED4B,00000000,0000001C,00D4EADE,00000000,00D4ED4B), ref: 00D64792
                                    • GlobalAlloc.KERNEL32(00000040,00000000,00000005,00D646C6,00000000,?,?,00D4E9B0,00000000,?,00D4ED4B,00000000,0000001C,00D4EADE,00000000,00D4ED4B), ref: 00D647C2
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Resource$Find$AllocDefaultException@8GlobalH_prolog3H_prolog3_catchLanguageLoadThrowUser
                                    • String ID: MS UI Gothic
                                    • API String ID: 2010067809-1905310704
                                    • Opcode ID: 847165707f6e2cc444d4dfaff11a181d503e8e60d279fe45c104619688319794
                                    • Instruction ID: 46078578f7827c945dd7acdde575e50021a6bb0dfc2be5f67cab2809624d6e3b
                                    • Opcode Fuzzy Hash: 847165707f6e2cc444d4dfaff11a181d503e8e60d279fe45c104619688319794
                                    • Instruction Fuzzy Hash: 1231AF75600205AFDB24AF65CC9AE7A77A9EF41350B088029FD05DB3A1EF70DD40EAB0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00CF8625
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    • _wcslen.LIBCMT ref: 00CF86A1
                                    • _wcslen.LIBCMT ref: 00CF86DA
                                    • _wcslen.LIBCMT ref: 00CF86F6
                                    • _wcslen.LIBCMT ref: 00CF8712
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: _wcslen$H_prolog3$Exception@8Throw
                                    • String ID: SOFTWARE\
                                    • API String ID: 1893837447-3302998844
                                    • Opcode ID: e8573c3d9e1740f655346cf2f0e8c56ea5a35cd8a22b514eea5aa8f7e14a3bd6
                                    • Instruction ID: b2321c416f07e18fe0cde679dad58d9e1de3b90e0619197fd8632d92aa9f67ae
                                    • Opcode Fuzzy Hash: e8573c3d9e1740f655346cf2f0e8c56ea5a35cd8a22b514eea5aa8f7e14a3bd6
                                    • Instruction Fuzzy Hash: 4031417191151A9FCB14BFA0CCA29BFB778FF003147158429F512AB292DE307E49DBA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ClientCursorMessageScreenSend_free_memset
                                    • String ID: ,
                                    • API String ID: 628317799-3772416878
                                    • Opcode ID: 59612377abee4b399b0f8758fc2ee2fabcd2c86522f4ca6b2a87f86491aef01b
                                    • Instruction ID: e766f962cb90854504db43ae156d6b6d3b99a4e2621921904022c4d34eee714d
                                    • Opcode Fuzzy Hash: 59612377abee4b399b0f8758fc2ee2fabcd2c86522f4ca6b2a87f86491aef01b
                                    • Instruction Fuzzy Hash: 73316E70A00205EFDB18FB64EC85E6E7BB5EB08318F100629F416D72E1DB70A905CB69
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00CA39B2: IsIconic.USER32(?), ref: 00CA39D2
                                    • GetWindowRect.USER32(?,?), ref: 00CA43A3
                                      • Part of subcall function 00C6D57A: ScreenToClient.USER32(?,?), ref: 00C6D58B
                                      • Part of subcall function 00C6D57A: ScreenToClient.USER32(?,?), ref: 00C6D598
                                      • Part of subcall function 00CA3F9B: __EH_prolog3_GS.LIBCMT ref: 00CA3FA5
                                      • Part of subcall function 00CA3F9B: GetWindowRect.USER32(?,?), ref: 00CA3FF4
                                      • Part of subcall function 00CA3F9B: OffsetRect.USER32(?,?,?), ref: 00CA400A
                                      • Part of subcall function 00CA3F9B: CreateCompatibleDC.GDI32(?), ref: 00CA407B
                                      • Part of subcall function 00CA3F9B: SelectObject.GDI32(?,?), ref: 00CA409B
                                    • GetModuleHandleW.KERNEL32(DWMAPI), ref: 00CA43DB
                                    • GetProcAddress.KERNEL32(00000000,DwmSetIconicLivePreviewBitmap), ref: 00CA43EB
                                    • DeleteObject.GDI32(00000000), ref: 00CA4402
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$ClientObjectScreenWindow$AddressCompatibleCreateDeleteH_prolog3_HandleIconicModuleOffsetProcSelect
                                    • String ID: DWMAPI$DwmSetIconicLivePreviewBitmap
                                    • API String ID: 3205686482-239049650
                                    • Opcode ID: 46be6f8389085a7c19147e9c7884f3154732c9bfceb0511fc2a7962ce1a69fe4
                                    • Instruction ID: 90c37f036932360841f8f7ba6346728634c6c292582c5c7436f60854a062f1bc
                                    • Opcode Fuzzy Hash: 46be6f8389085a7c19147e9c7884f3154732c9bfceb0511fc2a7962ce1a69fe4
                                    • Instruction Fuzzy Hash: F5314171A0020AAFCB04DFA9D8958BEFBF9FF89704B10451EF116E3251DA745E01CB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LockWindowUpdate.USER32(00000000,00000000,?,?,?,00D38053,00000000), ref: 00CB921F
                                    • ValidateRect.USER32(?,00000000,?,?,00D38053,00000000), ref: 00CB9254
                                    • UpdateWindow.USER32(?), ref: 00CB9259
                                    • LockWindowUpdate.USER32(00000000,?,00D38053,00000000), ref: 00CB926C
                                    • ValidateRect.USER32(?,00000000,?,?,00D38053,00000000), ref: 00CB9293
                                    • UpdateWindow.USER32(?), ref: 00CB9298
                                    • LockWindowUpdate.USER32(00000000,?,00D38053,00000000), ref: 00CB92AB
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: UpdateWindow$Lock$RectValidate
                                    • String ID:
                                    • API String ID: 797752328-0
                                    • Opcode ID: 5cb20a82452042ef01837688f1008977d86d77d0b83399b558eeed62e27c04d4
                                    • Instruction ID: 35ee0d00bd896e564245d271883f0b54eeb02d54cb870d140c64fb93b2062e86
                                    • Opcode Fuzzy Hash: 5cb20a82452042ef01837688f1008977d86d77d0b83399b558eeed62e27c04d4
                                    • Instruction Fuzzy Hash: 4721E732A04201FFCB259F94CC84BA8B7B6FF44750F25412AE619A7670D730ED50DBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsWindow.USER32(?), ref: 00CE023D
                                    • SendMessageW.USER32(?,0000020A,?,?), ref: 00CE026F
                                    • GetFocus.USER32 ref: 00CE0283
                                    • IsChild.USER32(?,?), ref: 00CE02A5
                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00CE02D6
                                    • IsWindowVisible.USER32(?), ref: 00CE02EB
                                    • SendMessageW.USER32(?,0000020A,?,?), ref: 00CE0309
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: MessageSend$Window$ChildFocusVisible
                                    • String ID:
                                    • API String ID: 1252167185-0
                                    • Opcode ID: 91c3070f5e737749beb4495bf43876013655a71a105e9eb47f0b44a75f38dfaf
                                    • Instruction ID: 9f5cf14a587aa2720d366b34c51d1d1cef1942085b3b0ea2bdb9ad22b66be581
                                    • Opcode Fuzzy Hash: 91c3070f5e737749beb4495bf43876013655a71a105e9eb47f0b44a75f38dfaf
                                    • Instruction Fuzzy Hash: 2A21A332200346AFDB60AF66DC48F657BE5BB08700F254165FA55EB2B1D7B1EC40DBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FillRect.USER32(?,?), ref: 00CAB333
                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 00CAB341
                                    • PatBlt.GDI32(?,?,?,00000001,?,005A0049), ref: 00CAB36D
                                    • PatBlt.GDI32(?,?,?,?,00000001,005A0049), ref: 00CAB382
                                    • PatBlt.GDI32(?,00000000,?,00000001,?,005A0049), ref: 00CAB397
                                    • PatBlt.GDI32(?,?,?,00000000,00000001,005A0049), ref: 00CAB3AD
                                    • FillRect.USER32(?,?), ref: 00CAB3C2
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$Fill$Inflate
                                    • String ID:
                                    • API String ID: 2224923502-0
                                    • Opcode ID: a0278d417adab99790902d83f15c539e2b8feba29406116d1838fc1bf8936468
                                    • Instruction ID: 71228d34a68e3a52898da0b0d3ad8e68200d614c40cbb077b5bdd9ea3c72d636
                                    • Opcode Fuzzy Hash: a0278d417adab99790902d83f15c539e2b8feba29406116d1838fc1bf8936468
                                    • Instruction Fuzzy Hash: 0B21E676110249FFDF019F58DD89DAA3FA9FB58320F048115FE189A264C772E960DBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SendMessageW.USER32(00000000,00000407,00000000,?), ref: 00C90116
                                    • IsRectEmpty.USER32(?), ref: 00C90135
                                    • IsRectEmpty.USER32(?), ref: 00C90142
                                    • GetCursorPos.USER32(00000000), ref: 00C90154
                                    • ScreenToClient.USER32(?,00000000), ref: 00C90161
                                    • PtInRect.USER32(?,00000000,00000000), ref: 00C90174
                                    • PtInRect.USER32(?,00000000,00000000), ref: 00C90187
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$Empty$ClientCursorMessageScreenSend
                                    • String ID:
                                    • API String ID: 703117857-0
                                    • Opcode ID: f7a379b46fee9e91199745ef06a2ef65dd4dbe9938ff7652741ae110b33ece2b
                                    • Instruction ID: 54d66e7405c939947604013573b308b18fec568edcdc07e2397440242f2c5e84
                                    • Opcode Fuzzy Hash: f7a379b46fee9e91199745ef06a2ef65dd4dbe9938ff7652741ae110b33ece2b
                                    • Instruction Fuzzy Hash: AF215B7650020ABFEF119BA0CC49EEE7BB9EF48394F100465E555E2161DB31EA85EB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetRect.USER32(?,00000000,00000000,00000000,00000000), ref: 00C5E802
                                    • GetWindowRect.USER32(?,?), ref: 00C5E80D
                                    • AdjustWindowRectEx.USER32(?,00CF0000,00000000,00000000), ref: 00C5E820
                                    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,00000325), ref: 00C5E840
                                    • GetWindowLongW.USER32(?,000000EC), ref: 00C5E845
                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00C5E866
                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000037), ref: 00C5E879
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$Rect$Long$Adjust
                                    • String ID:
                                    • API String ID: 3150082602-0
                                    • Opcode ID: 0118754174f10a52101a0a13ff593a64d58c681e96a0a66de22854814054cf05
                                    • Instruction ID: 0d634e62ac9a188d0ded900070175e3ab2d224756c01ccda8e6cb2091bea17d1
                                    • Opcode Fuzzy Hash: 0118754174f10a52101a0a13ff593a64d58c681e96a0a66de22854814054cf05
                                    • Instruction Fuzzy Hash: 2F115171640318BBEB14AB64DC4AFBF776CEB45B10F600119F601FB2C0DAB06A0187B9
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _memset.LIBCMT ref: 00D64657
                                    • _wcslen.LIBCMT ref: 00D6465D
                                    • GetDC.USER32(00000000), ref: 00D6468C
                                    • EnumFontFamiliesExW.GDI32(00000000,?,00D645F3,?,00000000,?,?,?,?,?,?,000003EE,?), ref: 00D646A7
                                    • ReleaseDC.USER32(00000000,00000000), ref: 00D646AF
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: EnumException@8FamiliesFontH_prolog3ReleaseThrow_memset_wcslen
                                    • String ID: MS UI Gothic
                                    • API String ID: 2708522728-1905310704
                                    • Opcode ID: 5db1f8c3a82e3c7964526ec1e717749b89941b9bc5f10d9bae3a3bc26ea37b38
                                    • Instruction ID: f3e612e8ce8c2a44ad46162c56ce51b05d3a4191be1eafba50df61e96cc9392e
                                    • Opcode Fuzzy Hash: 5db1f8c3a82e3c7964526ec1e717749b89941b9bc5f10d9bae3a3bc26ea37b38
                                    • Instruction Fuzzy Hash: A6016571901318ABD710EBA5DC89DEF7BBDEB45710B100015F405E7241DA705A0586B6
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL), ref: 00C78EFB
                                    • GetProcAddress.KERNEL32(00000000,ApplicationRecoveryInProgress), ref: 00C78F18
                                    • GetProcAddress.KERNEL32(00000000,ApplicationRecoveryFinished), ref: 00C78F22
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AddressProc$Exception@8H_prolog3HandleModuleThrow
                                    • String ID: ApplicationRecoveryFinished$ApplicationRecoveryInProgress$KERNEL32.DLL
                                    • API String ID: 417325364-4287352451
                                    • Opcode ID: e9dc4be9be102c287bfbddbce5b798b7c70fb665f0e534a0051dbb4713b6f607
                                    • Instruction ID: c0353af06e2d9f3d5ca99719e87d33801f53da7d730d0763b087b155826002aa
                                    • Opcode Fuzzy Hash: e9dc4be9be102c287bfbddbce5b798b7c70fb665f0e534a0051dbb4713b6f607
                                    • Instruction Fuzzy Hash: 4B01B132A40314BFCB109BF58848A6F7BA9DF85360F154469E90AD3240EF74DE0886B0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00C714AA
                                    • GetProcAddress.KERNEL32(00000000,RegisterTouchWindow), ref: 00C71507
                                    • GetProcAddress.KERNEL32(UnregisterTouchWindow), ref: 00C71529
                                      • Part of subcall function 00C710AC: ActivateActCtx.KERNEL32(?,?,00DCB098,00000010,00CACCBA,UxTheme.dll,75FD6BA0,?,00CACD7B,00000004,00C8337D,00000000,00000004,00CCE78D), ref: 00C710CC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AddressProc$ActivateH_prolog3
                                    • String ID: RegisterTouchWindow$UnregisterTouchWindow$user32.dll
                                    • API String ID: 1001276555-2470269259
                                    • Opcode ID: a6e19f07f286c82034d834bb5237b6b1345cd5b5285a5d897c95e510ee86cc76
                                    • Instruction ID: 8cc5f68445a78f6300f75e25689940bc247ebc5fd3b526f3eaa74e81a685462b
                                    • Opcode Fuzzy Hash: a6e19f07f286c82034d834bb5237b6b1345cd5b5285a5d897c95e510ee86cc76
                                    • Instruction Fuzzy Hash: 861181306083849FDB58AB78DD85B147AF4BB647A8F148029D85ADB2E1D770E6448B70
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetCursorPos.USER32(?), ref: 00C910E6
                                    • GetWindowRect.USER32(?,?), ref: 00C910FF
                                    • PtInRect.USER32(?,?,?), ref: 00C9111D
                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00C9112E
                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00C91186
                                      • Part of subcall function 00C73CDD: GetParent.USER32(?), ref: 00C73CE7
                                    • GetFocus.USER32 ref: 00C91262
                                      • Part of subcall function 00CB5D58: __EH_prolog3_GS.LIBCMT ref: 00CB5D62
                                      • Part of subcall function 00CB5D58: GetWindowRect.USER32(?,?), ref: 00CB5DFB
                                      • Part of subcall function 00CB5D58: SetRect.USER32(00000019,00000000,00000000,?,?), ref: 00CB5E1D
                                      • Part of subcall function 00CB5D58: CreateCompatibleDC.GDI32(?), ref: 00CB5E29
                                      • Part of subcall function 00CB5D58: CreateCompatibleBitmap.GDI32(?,00000019,00DDFDB0), ref: 00CB5E53
                                      • Part of subcall function 00CB5D58: GetWindowRect.USER32(?,?), ref: 00CB5EB5
                                      • Part of subcall function 00CB5D58: GetClientRect.USER32(?,?), ref: 00CB5EBE
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$Window$CompatibleCreateMessageSend$BitmapClientCursorFocusH_prolog3_Parent
                                    • String ID:
                                    • API String ID: 2914356772-0
                                    • Opcode ID: df3617547c84ad0ad3ec2366816eb3b1872a2d2c8f182c3fba68d4f24ae3c24d
                                    • Instruction ID: 2f059990fd51cea30f01b09a6bf8d4dbc8edc6c8594f58123f5068baa687cb1a
                                    • Opcode Fuzzy Hash: df3617547c84ad0ad3ec2366816eb3b1872a2d2c8f182c3fba68d4f24ae3c24d
                                    • Instruction Fuzzy Hash: 4B81C2307007419FCF26AF6498CA9BEB7E5FF84700F28056EE816DB291DB319E419B61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C6BE1C: ActivateActCtx.KERNEL32(?), ref: 00C6BE3F
                                    • VariantClear.OLEAUT32(?), ref: 00C9D12A
                                    • _memset.LIBCMT ref: 00C9D15F
                                    • _memset.LIBCMT ref: 00C9D16B
                                    • SysFreeString.OLEAUT32(?), ref: 00C9D1AA
                                    • SysFreeString.OLEAUT32(?), ref: 00C9D1B4
                                    • SysFreeString.OLEAUT32(?), ref: 00C9D1BE
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: FreeString$_memset$ActivateClearException@8H_prolog3ThrowVariant
                                    • String ID:
                                    • API String ID: 3894960473-0
                                    • Opcode ID: 853fcdf3ea9e55c5d52fca3f1cfa93cbb6741e1aa356e9fa00edfe36b041905d
                                    • Instruction ID: 85bca9c8e882ef226ed9d9381ebbada8db8ce864a81ef4c38922c875495d86dc
                                    • Opcode Fuzzy Hash: 853fcdf3ea9e55c5d52fca3f1cfa93cbb6741e1aa356e9fa00edfe36b041905d
                                    • Instruction Fuzzy Hash: 7C413971D00208EFDF21EF95C8889ADFBB9FF84310F14811AE416A7250DB70AA86CF20
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetParent.USER32(?), ref: 00CA0850
                                    • GetWindow.USER32(?,00000002), ref: 00CA0876
                                    • GetWindow.USER32(?,00000002), ref: 00CA0888
                                    • GetWindowLongW.USER32(?,000000EC), ref: 00CA0898
                                    • IsWindowVisible.USER32(?), ref: 00CA08B0
                                    • GetTopWindow.USER32(?), ref: 00CA08DC
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$LongParentVisible
                                    • String ID:
                                    • API String ID: 506644340-0
                                    • Opcode ID: 2ad1b7510b30bc1be9666e548ea1256f236e25b53970fdbb441e6d3f2d6e4b1c
                                    • Instruction ID: 92b8ffe56cf24de0773eedfb71be8b0809e263cd927f512b86181efdce6f8ce8
                                    • Opcode Fuzzy Hash: 2ad1b7510b30bc1be9666e548ea1256f236e25b53970fdbb441e6d3f2d6e4b1c
                                    • Instruction Fuzzy Hash: 1F21B032A0121ABBDB212B758C05E6B7768BF463D4F288114F855A71A1D738ED50DBE4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • PtInRect.USER32(?,?,?), ref: 00C8F107
                                    • ReleaseCapture.USER32 ref: 00C8F115
                                    • PtInRect.USER32(?,?,?), ref: 00C8F167
                                    • InvalidateRect.USER32(?,?,00000001), ref: 00C8F1B5
                                    • SetTimer.USER32(?,00000002,00000050,00000000), ref: 00C8F1D7
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$CaptureInvalidateReleaseTimer
                                    • String ID:
                                    • API String ID: 2903485716-0
                                    • Opcode ID: 51be6cbf6bdbe132a589956f6f30f0c1205db3a2cd7e1872e2d07ea927afc6b5
                                    • Instruction ID: b7b487f4cad40c1c4569cfe43efeb1971f82b804bc1b339f7149c42931901a63
                                    • Opcode Fuzzy Hash: 51be6cbf6bdbe132a589956f6f30f0c1205db3a2cd7e1872e2d07ea927afc6b5
                                    • Instruction Fuzzy Hash: 1E216F3220070AEBCB356F61CC48FBA77B5FF44395F10043EE966925A0DB319A52DBA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GlobalAlloc.KERNEL32(00000002,?,?,?,?,?,00CD08D5,00000000,00000000,?,?,00CD2710,?,?,?,00000084), ref: 00CD079C
                                    • GlobalLock.KERNEL32(00000000,?,00CD08D5,00000000,00000000,?,?,00CD2710,?,?,?,00000084,00CD2AE4,0000000A,0000000A,0000000A), ref: 00CD07B4
                                    • _memmove.LIBCMT ref: 00CD07C1
                                    • CreateStreamOnHGlobal.OLE32(00000000,00000000,00000000,?), ref: 00CD07D0
                                    • EnterCriticalSection.KERNEL32(00DE8244,00000000), ref: 00CD07E9
                                    • LeaveCriticalSection.KERNEL32(00DE8244,00000000), ref: 00CD0850
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Global$CriticalSection$AllocCreateEnterLeaveLockStream_memmove
                                    • String ID:
                                    • API String ID: 861836607-0
                                    • Opcode ID: f34d76589b8edf13c1356292ed34fb8e82987ce3c68b4fca782be2a0ba7decec
                                    • Instruction ID: 0c8394910721cf0bcc4c0dbaa96ef3eaf90a639a5416008332c610021fc2f3e8
                                    • Opcode Fuzzy Hash: f34d76589b8edf13c1356292ed34fb8e82987ce3c68b4fca782be2a0ba7decec
                                    • Instruction Fuzzy Hash: 93218475A00305BBDB10ABB5DC89B6E77ACEF04354F20002AFA05DA391DB30DE00EAA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetWindowLongW.USER32(?,000000F0), ref: 00C6CA54
                                    • GetParent.USER32(?), ref: 00C6CA62
                                    • GetParent.USER32(?), ref: 00C6CA75
                                    • GetLastActivePopup.USER32(?), ref: 00C6CA86
                                    • IsWindowEnabled.USER32(?), ref: 00C6CA9A
                                    • EnableWindow.USER32(?,00000000), ref: 00C6CAAD
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$Parent$ActiveEnableEnabledLastLongPopup
                                    • String ID:
                                    • API String ID: 670545878-0
                                    • Opcode ID: 6a047f8bbdc5f11c1c85b7368f8170545c312b156eacfc7116a7155220dd7c89
                                    • Instruction ID: 4b6f755b09c595409e6d4a6672a8c18cc6a7989da69e7d559b50960e6fbdc418
                                    • Opcode Fuzzy Hash: 6a047f8bbdc5f11c1c85b7368f8170545c312b156eacfc7116a7155220dd7c89
                                    • Instruction Fuzzy Hash: 0811C632601339A7CB31DAEA8CC4B3A7298AF55F60F154216EDA4E7302D730CE0172E1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetDesktopWindow.USER32 ref: 00CEC1D5
                                    • GetWindow.USER32(00000000), ref: 00CEC1DC
                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00CEC218
                                    • ShowWindow.USER32(00000000,00000000,?,?,?,?,00CEDA1B,00000001), ref: 00CEC233
                                    • ShowWindow.USER32(00000000,00000004,?,?,?,?,?,?,?,?,?,?,?,00CEDA1B,00000001), ref: 00CEC257
                                    • GetWindow.USER32(00000000,00000002), ref: 00CEC260
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$Show$DesktopLong
                                    • String ID:
                                    • API String ID: 3178490500-0
                                    • Opcode ID: 9f648a69e025b5f7b5e76d62b55b5b4ae61a0cf0084f0adafd9b506921b0e156
                                    • Instruction ID: 7d9dd4cc24b9ccb2718e5fef4aca6749b3b40878e1322e8157d1ca53deec9190
                                    • Opcode Fuzzy Hash: 9f648a69e025b5f7b5e76d62b55b5b4ae61a0cf0084f0adafd9b506921b0e156
                                    • Instruction Fuzzy Hash: DA11C131500384ABD73197AACDC9F7F77A99FC2764F240108FA21A62A0CB74CD429661
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegCreateKeyExW.ADVAPI32(80000002,?,00000000,00000000,00000000,0002001F,00000000,?,?,SOFTWARE\Brother Industries, Ltd.\P-touch Address Book\1.3), ref: 00C58AE2
                                    • RegSetValueExW.ADVAPI32(?,dwExitCode,00000000,00000004,00000001,00000004), ref: 00C58B01
                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00D8ECC8,000000FF), ref: 00C58B08
                                    Strings
                                    • dwExitCode, xrefs: 00C58AFB
                                    • SOFTWARE\Brother Industries, Ltd.\P-touch Address Book\1.3, xrefs: 00C58AB0
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CloseCreateValue
                                    • String ID: SOFTWARE\Brother Industries, Ltd.\P-touch Address Book\1.3$dwExitCode
                                    • API String ID: 1818849710-3342943090
                                    • Opcode ID: 41ab7e5dcc98417cf5ae9fa0a9cc6a7b12f88142579b3d00c3dd8bc142cba8bd
                                    • Instruction ID: 888584822011d8c2b42fe649d61ac6f583409a797a4fea1f74ededd8b13344f4
                                    • Opcode Fuzzy Hash: 41ab7e5dcc98417cf5ae9fa0a9cc6a7b12f88142579b3d00c3dd8bc142cba8bd
                                    • Instruction Fuzzy Hash: 3751B6716006059FD714DB6CCC41FAAB3B9FF89324F148359E525EB2E1DB70A909CBA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegCreateKeyExW.ADVAPI32(80000002,?,00000000,00000000,00000000,0002001F,00000000,?,00000000,SOFTWARE\Brother Industries, Ltd.\LabelMobile Printer\Printer Setting Tool), ref: 00C5A9C5
                                    • RegSetValueExW.ADVAPI32(?,dwExitCode,00000000,00000004,00000001,00000004), ref: 00C5A9E4
                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,00D8EAF8,000000FF), ref: 00C5A9EB
                                    Strings
                                    • dwExitCode, xrefs: 00C5A9DE
                                    • SOFTWARE\Brother Industries, Ltd.\LabelMobile Printer\Printer Setting Tool, xrefs: 00C5A993
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CloseCreateValue
                                    • String ID: SOFTWARE\Brother Industries, Ltd.\LabelMobile Printer\Printer Setting Tool$dwExitCode
                                    • API String ID: 1818849710-1474349619
                                    • Opcode ID: 27001e2055cd23f731f4d8a893f4b65211e0049bf264eac026315f5dead13b79
                                    • Instruction ID: 9e4660a44b244f2e6a3c676ae3f31944db10eb7d113fe6e4c0c3be0a71e42251
                                    • Opcode Fuzzy Hash: 27001e2055cd23f731f4d8a893f4b65211e0049bf264eac026315f5dead13b79
                                    • Instruction Fuzzy Hash: 6731CE71600A05AFD714DB6CCC41FAAB3B4FF89720F104319F626AB2D1DB70A909CBA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C6EA6E: GetDlgItem.USER32(?,?), ref: 00C6EA7F
                                    • GetMessagePos.USER32 ref: 00C614F8
                                    • MapWindowPoints.USER32(00000000,?,00000000,00000001), ref: 00C61518
                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00C6152D
                                      • Part of subcall function 00C77BD3: SendMessageW.USER32(?,0000113E,00000000,?), ref: 00C77BFD
                                      • Part of subcall function 00C60F40: SendMessageW.USER32(?,0000110A,00000004,?), ref: 00C60F6D
                                      • Part of subcall function 00C60F40: SendMessageW.USER32(?,0000110A,00000001,00000000), ref: 00C60FA5
                                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00C615A5
                                      • Part of subcall function 00C60FC0: SendMessageW.USER32(?,0000110A,00000003,?), ref: 00C60FED
                                      • Part of subcall function 00C60FC0: SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00C61025
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Message$Send$ItemPointsWindow
                                    • String ID: @
                                    • API String ID: 1791654395-2766056989
                                    • Opcode ID: 710768b35def4c3fdffd53b5478df1f5efe36ad6c674962bd2ba6ecabcf9e112
                                    • Instruction ID: 922f9f37196097e679ef8e49315d3511a4b1fccc2a8693e278ef3968db291ff9
                                    • Opcode Fuzzy Hash: 710768b35def4c3fdffd53b5478df1f5efe36ad6c674962bd2ba6ecabcf9e112
                                    • Instruction Fuzzy Hash: 6A313075B00208BBDB15EFA4CC85FBEB7B9EB88700F108559F9059B281DBB49E019B90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetMenuCheckMarkDimensions.USER32 ref: 00C76103
                                    • _memset.LIBCMT ref: 00C7617B
                                    • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 00C761DD
                                    • LoadBitmapW.USER32(00000000,00007FE3), ref: 00C761F5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Bitmap$CheckCreateDimensionsLoadMarkMenu_memset
                                    • String ID:
                                    • API String ID: 4271682439-3916222277
                                    • Opcode ID: 62f49e6ae2353f48de7b9e6448822c2ff0665955c888378a5602ee0cfd5e6af3
                                    • Instruction ID: c80d6573a5bd84fae638650423cf351da7bd6c799352937c1442d88b17cfb76a
                                    • Opcode Fuzzy Hash: 62f49e6ae2353f48de7b9e6448822c2ff0665955c888378a5602ee0cfd5e6af3
                                    • Instruction Fuzzy Hash: CB310B71E003159FEB208F28DCC5BAD7BB4FB44304F5581AAE54DDB282DE718E458B60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00C6B424
                                    • GetClassNameW.USER32(00000000,?,000000FF), ref: 00C6B472
                                    • GetStockObject.GDI32(00000005), ref: 00C6B51B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ClassH_prolog3_NameObjectStock
                                    • String ID: Button$Static
                                    • API String ID: 3900068017-2498952662
                                    • Opcode ID: f86027c42eaf63049ac09994377a2509e37b90bae4b0733715a1f976d58bf908
                                    • Instruction ID: 1b6c7c6acc32ba0d6de7e21033af732e3fa642718becfe4b03d0f5535b4cb66d
                                    • Opcode Fuzzy Hash: f86027c42eaf63049ac09994377a2509e37b90bae4b0733715a1f976d58bf908
                                    • Instruction Fuzzy Hash: 3321A2359402199BCF34EB60CD95BF9B3B0AF14300F044299A92A972C2DF30AEC5CB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleW.KERNEL32(DWMAPI), ref: 00CA42CD
                                    • GetProcAddress.KERNEL32(00000000,DwmSetIconicThumbnail), ref: 00CA42DD
                                    • DeleteObject.GDI32(00000000), ref: 00CA4317
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AddressDeleteHandleModuleObjectProc
                                    • String ID: DWMAPI$DwmSetIconicThumbnail
                                    • API String ID: 3128169092-3761315311
                                    • Opcode ID: 594b2d4d87f581bb54f5d6a42f134b02a2ae7758cb59d5ceaaaf9e11cb7749de
                                    • Instruction ID: ab67e4a6f2549172ade01b14e994d66c95a9008104bd0f6364f0ed1f44d645b6
                                    • Opcode Fuzzy Hash: 594b2d4d87f581bb54f5d6a42f134b02a2ae7758cb59d5ceaaaf9e11cb7749de
                                    • Instruction Fuzzy Hash: 15018471601306BBDF146BA9CC88E6EB7ADEF8A318F008116F91197251DBB4DD00D760
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?,?,00C774BB,00000000,80000000,00000000,0000000C,00000003,00000080,00000000,?,00000000,?,00000000), ref: 00C6AADB
                                    • GetProcAddress.KERNEL32(00000000,CreateFileTransactedW), ref: 00C6AAEB
                                    • CreateFileW.KERNEL32(00000000,00000000,?,00000000,?,00000000,00000000,00000000,?,?,00C774BB,00000000,80000000,00000000,0000000C,00000003), ref: 00C6AB2A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AddressCreateFileHandleModuleProc
                                    • String ID: CreateFileTransactedW$kernel32.dll
                                    • API String ID: 2580138172-2053874626
                                    • Opcode ID: 039376e8a52e9a589ccae58954ea8c27c445da6efeaa49720d435b0a2061205a
                                    • Instruction ID: 53295c33f76b53442fe92175dd7aaf47271c987bf2509fc7b6a070e3ce2b2372
                                    • Opcode Fuzzy Hash: 039376e8a52e9a589ccae58954ea8c27c445da6efeaa49720d435b0a2061205a
                                    • Instruction Fuzzy Hash: 3C01D632100209FF8F224F95DC44CAA7F37EBD9750B148619FA65A0070C7328961EFA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 00C96E60
                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00C96E70
                                      • Part of subcall function 00C7BBBD: GetModuleHandleW.KERNEL32(Advapi32.dll), ref: 00C7BBD1
                                      • Part of subcall function 00C7BBBD: GetProcAddress.KERNEL32(00000000,RegDeleteKeyTransactedW), ref: 00C7BBE1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProc
                                    • String ID: Advapi32.dll$RegDeleteKeyExW
                                    • API String ID: 1646373207-2191092095
                                    • Opcode ID: 4232e6b3a70e778730acab202baa1a7a87ba4a7b53191d94e30b6c0cf8e0e6f8
                                    • Instruction ID: 5be76d96b1c73e0b40bc51062fde5801d3afe73d25e465c9f756218563d57bcd
                                    • Opcode Fuzzy Hash: 4232e6b3a70e778730acab202baa1a7a87ba4a7b53191d94e30b6c0cf8e0e6f8
                                    • Instruction Fuzzy Hash: 81F0FF38204305FFDF242F65DC48F623FA8AF04740F104019F569C62A0CB729940EB70
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetWindowRect.USER32(?,?), ref: 00CE365C
                                    • GetWindowRect.USER32(?,?), ref: 00CE3734
                                    • InflateRect.USER32(?,00000000,?), ref: 00CE375A
                                    • GetWindowRect.USER32(?,?), ref: 00CE380F
                                    • GetWindowRect.USER32(?,?), ref: 00CE391A
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$Window$Inflate
                                    • String ID:
                                    • API String ID: 1123775244-0
                                    • Opcode ID: 05a9d011a9681dde6b39ba17e6e1e1b612b98044665682f5e83b20a5185c0a64
                                    • Instruction ID: dea08324b735ae3751daa9f96487a3b29ee64d1947af8b35c316ec5ffca61ee3
                                    • Opcode Fuzzy Hash: 05a9d011a9681dde6b39ba17e6e1e1b612b98044665682f5e83b20a5185c0a64
                                    • Instruction Fuzzy Hash: F7E11C71E00289EFCB14DFAAC989AAEBBF5FF48310F14456EE515A7251D770AE40CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$Empty$Client
                                    • String ID:
                                    • API String ID: 1457177775-0
                                    • Opcode ID: ddb488cb25142f5e84b7fad4d8a742e7ed236d40a49b32529f711fd0ff1c1fa2
                                    • Instruction ID: 45d5ccca4c74be9071723f27efa63fad0ac37210249699ace17ba6aca7fcaaef
                                    • Opcode Fuzzy Hash: ddb488cb25142f5e84b7fad4d8a742e7ed236d40a49b32529f711fd0ff1c1fa2
                                    • Instruction Fuzzy Hash: 31D1277190061ACFCF15DFA8C5806AEB7B2BF49318F248169E826AB244D775AE41CF94
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00D0C46F
                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00D0C4B6
                                    • GetWindow.USER32(00000000,00000005), ref: 00D0C4DD
                                    • GetWindow.USER32(?,00000002), ref: 00D0C508
                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00D0C537
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: MessageSendWindow$H_prolog3
                                    • String ID:
                                    • API String ID: 1382076901-0
                                    • Opcode ID: 2630c91df4dee8bf63cfb1df8f092a9019ab9e94efe20b29b249edd2123f39c2
                                    • Instruction ID: edf3ed8668b6bd9c59f3dffcb6a1588918c0a0366ea4a247f4cff4fed7f49181
                                    • Opcode Fuzzy Hash: 2630c91df4dee8bf63cfb1df8f092a9019ab9e94efe20b29b249edd2123f39c2
                                    • Instruction Fuzzy Hash: 1671E136610214AFCB25AF64C889BAD77B0AF44710F185269F80DDB2E1DB30ED41DBB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsWindow.USER32(?), ref: 00CB4A41
                                    • GetParent.USER32(?), ref: 00CB4A60
                                    • GetParent.USER32(?), ref: 00CB4A6F
                                      • Part of subcall function 00CA2194: SetParent.USER32(?,?), ref: 00CA21A7
                                    • GetWindowRect.USER32(?,?), ref: 00CB4B06
                                    • GetClientRect.USER32(?,?), ref: 00CB4B7F
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Parent$RectWindow$Client
                                    • String ID:
                                    • API String ID: 3043635113-0
                                    • Opcode ID: 09c743be6579b74f5f2fe64d09beae956b2c6d071fcd385350e45891d6e3da2c
                                    • Instruction ID: c116e8998dda6fdbf137fd8c88f96e1f3daa91ac1c8b0ff69fc4093bac2258bf
                                    • Opcode Fuzzy Hash: 09c743be6579b74f5f2fe64d09beae956b2c6d071fcd385350e45891d6e3da2c
                                    • Instruction Fuzzy Hash: D1711C70700614AFCB14AFA5CC98EAEBBF9AF89700F1405BDF506DB252CB759945CB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetClientRect.USER32(?,?), ref: 00C90754
                                    • InflateRect.USER32(?,00000000,00000000), ref: 00C90780
                                    • GetSystemMetrics.USER32(00000002), ref: 00C907FD
                                    • _memset.LIBCMT ref: 00C90823
                                      • Part of subcall function 00C6EE73: SetWindowPos.USER32(?,000000FF,000000FF,?,?,00000000,00C71B6D,?,00C71B6D,00000000,?,?,000000FF,000000FF,00000015), ref: 00C6EE9B
                                      • Part of subcall function 00C6FFBE: GetScrollInfo.USER32(?,?,?), ref: 00C6FFF2
                                      • Part of subcall function 00C6FF7E: SetScrollInfo.USER32(?,?,?,?), ref: 00C6FFAF
                                    • EnableScrollBar.USER32(?,00000002,00000000), ref: 00C90906
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Scroll$InfoRect$ClientEnableInflateMetricsSystemWindow_memset
                                    • String ID:
                                    • API String ID: 4263531605-0
                                    • Opcode ID: facd7f97bb0a82a88c7c6f9610bc5df6933aa5b90d1db647268f7295b34e6292
                                    • Instruction ID: 4796d55a4d31e4daaf4b6ab054cd25ce17ad1e1961db74af2752e3fdcb59dd2b
                                    • Opcode Fuzzy Hash: facd7f97bb0a82a88c7c6f9610bc5df6933aa5b90d1db647268f7295b34e6292
                                    • Instruction Fuzzy Hash: 95613C71A01219EFDF10DFA8C989AEDB7B5FF04700F24016AE819EB245C7B06E019FA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetWindowRect.USER32(?,?), ref: 00CE34A1
                                    • EqualRect.USER32(?,?), ref: 00CE34CC
                                    • BeginDeferWindowPos.USER32(?), ref: 00CE34D9
                                    • EndDeferWindowPos.USER32(?), ref: 00CE34FE
                                      • Part of subcall function 00CD6CD0: GetWindowRect.USER32(?,?), ref: 00CD6CE6
                                      • Part of subcall function 00CD6CD0: GetParent.USER32(?), ref: 00CD6D28
                                      • Part of subcall function 00CD6CD0: GetParent.USER32(?), ref: 00CD6D38
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    • GetWindowRect.USER32(?,?), ref: 00CE35B3
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$Rect$DeferParent$BeginEqualException@8H_prolog3Throw
                                    • String ID:
                                    • API String ID: 601628497-0
                                    • Opcode ID: 1461995099382c13d8321253163f14fc8b9d16ce3c939aed5227ab5a51a668d3
                                    • Instruction ID: cb57f8253a9f2dcb876461956e2e36fcbd6363f3043bca822c036a95887a0fd9
                                    • Opcode Fuzzy Hash: 1461995099382c13d8321253163f14fc8b9d16ce3c939aed5227ab5a51a668d3
                                    • Instruction Fuzzy Hash: F5512E71E012899FCB11DFAAC9889EEBBF5FF48310B54446AE516E7310DB30AE44DB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: _memset$__filbuf__getptd_noexit__read_memcpy_s
                                    • String ID:
                                    • API String ID: 4048096073-0
                                    • Opcode ID: 4fb2943b42b51c2190652a866852524e8267cb8a3438c8a99a0d554962781a2b
                                    • Instruction ID: 6ed5226937523c1151f0b235e1018e955134529b6fcc3cbf16567ba65e29cb35
                                    • Opcode Fuzzy Hash: 4fb2943b42b51c2190652a866852524e8267cb8a3438c8a99a0d554962781a2b
                                    • Instruction Fuzzy Hash: 5C51D731F00209DFCB20DFA9E94469EB7B2EF51324F288669E46696590DB70EE50CF70
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00D58793
                                    • CreateCompatibleDC.GDI32(00000000), ref: 00D587E1
                                    • GetBoundsRect.GDI32(?,00D58D0A,00000000,00000000), ref: 00D58809
                                    • CreateSolidBrush.GDI32 ref: 00D58823
                                    • FillRect.USER32(00000000,00D58D0A,?), ref: 00D5883C
                                      • Part of subcall function 00D57B44: FrameRgn.GDI32(00000000,?,00000000,00D58D0A,0000003C), ref: 00D57B6C
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CreateRect$BoundsBrushCompatibleFillFrameH_prolog3_Solid
                                    • String ID:
                                    • API String ID: 2864772683-0
                                    • Opcode ID: 6e5dbdbb2e6285994dbbb55fee6afb7398904fcb4418612b8b578fa1b38781b4
                                    • Instruction ID: 23fb281bf63d36499b53d5ab7e062ef5739964046232467c4f269c3731764865
                                    • Opcode Fuzzy Hash: 6e5dbdbb2e6285994dbbb55fee6afb7398904fcb4418612b8b578fa1b38781b4
                                    • Instruction Fuzzy Hash: FD511570910219EBCF11EFA4D885AEDBAB5FF08711F18016AFC01BA251CB715A89DFB5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00CE0A53
                                    • RedrawWindow.USER32(?,?,?,00000541), ref: 00CE0C19
                                      • Part of subcall function 00C6EAF8: GetWindowLongW.USER32(?,000000F0), ref: 00C6EB03
                                    • GetSystemMenu.USER32(?,00000000), ref: 00CE0A8D
                                    • IsMenu.USER32(?), ref: 00CE0AAC
                                    • IsMenu.USER32(?), ref: 00CE0ABA
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Menu$Window$H_prolog3LongRedrawSystem
                                    • String ID:
                                    • API String ID: 1445310841-0
                                    • Opcode ID: 585cc1810667d8e6004360b6d1414128aad7dfd3e0e7e264f2c30bcdf5f4f063
                                    • Instruction ID: e652aee05801865e421d6b17514f874f43add7fb13964743cac8fc58c0e0f199
                                    • Opcode Fuzzy Hash: 585cc1810667d8e6004360b6d1414128aad7dfd3e0e7e264f2c30bcdf5f4f063
                                    • Instruction Fuzzy Hash: 4051D031A002459BDB14EFB9C845BAEB7B5BF04314F244238E915FB291DFB09A80DBB0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetParent.USER32(?), ref: 00CAC7A9
                                    • GetWindowRect.USER32(?,?), ref: 00CAC7CB
                                    • GetClientRect.USER32(?,?), ref: 00CAC85B
                                    • MapWindowPoints.USER32(?,?,?,00000002), ref: 00CAC86E
                                    • FillRect.USER32(?,?), ref: 00CAC8AE
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$Window$ClientFillParentPoints
                                    • String ID:
                                    • API String ID: 1064458942-0
                                    • Opcode ID: a3b4c9f4d760946943259ae5ac1f81334b74511664c0c7379d5228fa990e8625
                                    • Instruction ID: 1f6bbe74a121682e975891811457859511dc446e0a4233532f3b9f7fc35f23ce
                                    • Opcode Fuzzy Hash: a3b4c9f4d760946943259ae5ac1f81334b74511664c0c7379d5228fa990e8625
                                    • Instruction Fuzzy Hash: 84513871A0121AEFCB10DFA8C8C49AEBBB9FF49744B14406AF815E7251E7749E10CFA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00D58C1F
                                    • RedrawWindow.USER32(?,00000000,00000000,00000105,0000005C,00D58EE3,?,00D5901C,?,?,?,00D16232,00000004,?,00000001,?), ref: 00D58C44
                                    • GetClientRect.USER32(?,?), ref: 00D58C62
                                    • CreateCompatibleDC.GDI32(00D5901C), ref: 00D58CCA
                                    • UpdateLayeredWindow.USER32(?,00000000,00000000,?,?,?,00000000), ref: 00D58D2A
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$ClientCompatibleCreateH_prolog3_LayeredRectRedrawUpdate
                                    • String ID:
                                    • API String ID: 2227077885-0
                                    • Opcode ID: 76b40cb469fbd9ada4a160ea7f06fb7360d36db708be6b2c893baea91867e827
                                    • Instruction ID: cf8fc339b914ccb0fe74acde7dba16ba29cbe40555b732eb9b5a311707991e11
                                    • Opcode Fuzzy Hash: 76b40cb469fbd9ada4a160ea7f06fb7360d36db708be6b2c893baea91867e827
                                    • Instruction Fuzzy Hash: 2A410171C01218AFCF11EFE4C9859EEBBB8EF08301F14415AE816B6252DB705A49DBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Parent$FocusMessageSendUpdateWindow
                                    • String ID:
                                    • API String ID: 2438739141-0
                                    • Opcode ID: 648faff62522c555fa7f050b739827911f30ac6d618742a7be182160ba65f382
                                    • Instruction ID: 473046df958aa68fa82416243abdfa6d267cdea85e06e99ea0f1b14bb43899d0
                                    • Opcode Fuzzy Hash: 648faff62522c555fa7f050b739827911f30ac6d618742a7be182160ba65f382
                                    • Instruction Fuzzy Hash: 2E31CF31600700AFCB25AB788C45A3EB6E5FFC4769B29462DF06AD72E1DB709A019B54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ClientCursorScreen$Rect
                                    • String ID:
                                    • API String ID: 1082406499-0
                                    • Opcode ID: f1aa787f9bc35e458cf5cc65537ccad2f809b71eb0fe3b3e1a5f1d60bff8a1f2
                                    • Instruction ID: 068cb19a67bdaa69b924a21844fbd0f36ff99aded717c9b89fb9e0de4579efaf
                                    • Opcode Fuzzy Hash: f1aa787f9bc35e458cf5cc65537ccad2f809b71eb0fe3b3e1a5f1d60bff8a1f2
                                    • Instruction Fuzzy Hash: 7D312DB1A00209DFCF10EFA5D8849AEBBF5FF48314B10453EE556E6250DB34AA05CB65
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CallNextHookEx.USER32(00000000,?,?), ref: 00C89480
                                    • WindowFromPoint.USER32(?,?), ref: 00C894AB
                                    • ScreenToClient.USER32(?,00000000), ref: 00C894DC
                                    • GetParent.USER32(?), ref: 00C8954A
                                    • UpdateWindow.USER32(?), ref: 00C895A2
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$CallClientFromHookNextParentPointScreenUpdate
                                    • String ID:
                                    • API String ID: 160110263-0
                                    • Opcode ID: 1a4c91bbd09a2042bfee5465f5693c1012f9e6a02afb6b2473133b78bf484f22
                                    • Instruction ID: d847deff4baa02cf4281e21e2520376bf2479ba6ab4e9cdc91d10ed894557765
                                    • Opcode Fuzzy Hash: 1a4c91bbd09a2042bfee5465f5693c1012f9e6a02afb6b2473133b78bf484f22
                                    • Instruction Fuzzy Hash: E4318F36600201EFCB15AF64DC84AA97BB5FB98354F188279F916EB760CB32D904DF64
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetWindowRect.USER32(?,?), ref: 00C8F237
                                      • Part of subcall function 00C6EB12: GetWindowLongW.USER32(?,000000EC), ref: 00C6EB1D
                                    • OffsetRect.USER32(?,?,00000000), ref: 00C8F292
                                    • UnionRect.USER32(?,?,?), ref: 00C8F2B0
                                    • EqualRect.USER32(?,?), ref: 00C8F2BE
                                    • UpdateWindow.USER32(?), ref: 00C8F2FA
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$Window$EqualLongOffsetUnionUpdate
                                    • String ID:
                                    • API String ID: 4261707372-0
                                    • Opcode ID: 0e269d01540b75d67a18b5656a5648177235a6f7dde1e1f47b1499afd4acb446
                                    • Instruction ID: 8fa488fd2bf116b5758e375a97587feb227b449338bc1e63dcc33da1066c7f59
                                    • Opcode Fuzzy Hash: 0e269d01540b75d67a18b5656a5648177235a6f7dde1e1f47b1499afd4acb446
                                    • Instruction Fuzzy Hash: 0E310CB5901209EBCB10EFA5D9849EEBBF9FF48314F20462EE516E3250DB30AA01DB54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00D0A2DB: GetParent.USER32(?), ref: 00D0A2E7
                                      • Part of subcall function 00D0A2DB: GetParent.USER32(00000000), ref: 00D0A2EA
                                    • GetWindowLongW.USER32(?,000000EC), ref: 00D0AB9F
                                    • RedrawWindow.USER32(?,00000000,00000000,00000081,?,?,?,?,?,00D0AF4B,00000000), ref: 00D0ABF0
                                    • SetWindowLongW.USER32(?,000000EC,?), ref: 00D0ABFF
                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000137,?,?,?,?,?,00D0AF4B,00000000), ref: 00D0AC15
                                    • GetClientRect.USER32(?,?), ref: 00D0AC29
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$LongParent$ClientRectRedraw
                                    • String ID:
                                    • API String ID: 556606033-0
                                    • Opcode ID: ae52a7e140db369b5c155fea4f96ac9a1bfe2c400a6f0dd25c75d8b4ee8dafd6
                                    • Instruction ID: a90bc35e49944686ee1d4afe9d486f7583ab6375d6a8f9b6cfdc43f0fabe3f22
                                    • Opcode Fuzzy Hash: ae52a7e140db369b5c155fea4f96ac9a1bfe2c400a6f0dd25c75d8b4ee8dafd6
                                    • Instruction Fuzzy Hash: A7218832610308BFDB25AFBCCD85BAE76AAEB44360F190539F15AD61D0DA309D41D671
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetCursorPos.USER32(?), ref: 00C9492A
                                    • GetClientRect.USER32(?,?), ref: 00C9496B
                                    • PtInRect.USER32(?,?,?), ref: 00C94983
                                    • MapWindowPoints.USER32(?,?,?,00000001), ref: 00C949AD
                                    • SendMessageW.USER32(?,00000200,?,?), ref: 00C949CC
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$ClientCursorMessagePointsSendWindow
                                    • String ID:
                                    • API String ID: 1257894355-0
                                    • Opcode ID: 5ab8435d40f7f9cbf7dc62d659ba636050615829e36889b5dfd954e7bd4b42ed
                                    • Instruction ID: 853d385f72c0f0b50e0546261184cca712bf3d68e953410a99a767300d8f2a72
                                    • Opcode Fuzzy Hash: 5ab8435d40f7f9cbf7dc62d659ba636050615829e36889b5dfd954e7bd4b42ed
                                    • Instruction Fuzzy Hash: 48313E71A0024ABFDF18DFA5CC85DBFBBB9FF44310B10412AF92596250DB70AA11DBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SendMessageW.USER32(?,0000040D,00000000,00000000), ref: 00CB52F8
                                    • SendMessageW.USER32(?,0000040D,00000000,00000000), ref: 00CB5314
                                    • SendMessageW.USER32(?,0000040D,00000000,00000000), ref: 00CB5357
                                      • Part of subcall function 00CF6502: SendMessageW.USER32(?,00000433,00000000,?), ref: 00CF6535
                                    • SendMessageW.USER32(?,0000040D,00000000,00000000), ref: 00CB5342
                                    • SetRectEmpty.USER32(?), ref: 00CB5377
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: MessageSend$EmptyRect
                                    • String ID:
                                    • API String ID: 4004678023-0
                                    • Opcode ID: 806f6ac0c7629d0356d074f22dad8e584f2dbce6f60303c38bc086b8b340fcce
                                    • Instruction ID: 7ebb000ec8ae4cf8628f11534c33831578206ba27029f9da78c696c9bb157633
                                    • Opcode Fuzzy Hash: 806f6ac0c7629d0356d074f22dad8e584f2dbce6f60303c38bc086b8b340fcce
                                    • Instruction Fuzzy Hash: C23101B1900609AFDB14DF65DC82EFEBBF8EF48340F510569E255E7250DA70A9419BA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C6EAF8: GetWindowLongW.USER32(?,000000F0), ref: 00C6EB03
                                      • Part of subcall function 00D0A2DB: GetParent.USER32(?), ref: 00D0A2E7
                                      • Part of subcall function 00D0A2DB: GetParent.USER32(00000000), ref: 00D0A2EA
                                    • SendMessageW.USER32(?,00000234,00000000,00000000), ref: 00D0ADAE
                                    • SendMessageW.USER32(?,00000229,00000000,00000000), ref: 00D0ADD5
                                    • SendMessageW.USER32(?,00000229,00000000,00000000), ref: 00D0ADF2
                                    • SendMessageW.USER32(?,00000222,?,00000000), ref: 00D0AE09
                                    • SendMessageW.USER32(?,00000222,00000000,?), ref: 00D0AE2E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: MessageSend$Parent$LongWindow
                                    • String ID:
                                    • API String ID: 4191550487-0
                                    • Opcode ID: 9ed31bb273ce9dd5c45de53c605d1285f432a75e6c264fed81cb2659d0ac2924
                                    • Instruction ID: 2c1e5ba359d397b93f3a991d95eab84679feb85c7d219c5e6ed3ce7d81d5f2da
                                    • Opcode Fuzzy Hash: 9ed31bb273ce9dd5c45de53c605d1285f432a75e6c264fed81cb2659d0ac2924
                                    • Instruction Fuzzy Hash: C621C7327103187AEF196B68CC87BFD7656EB44750F18053AF6199A1D2DAF0AC40A6B2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$Window
                                    • String ID:
                                    • API String ID: 924285169-0
                                    • Opcode ID: e5abeef71d2e0df00fa249558427de3f47838782a3c3dfe501c1036db34cb067
                                    • Instruction ID: 4ccc944977854946e896778878262cbd60c827f14685f00ff10e64e4ff9909c2
                                    • Opcode Fuzzy Hash: e5abeef71d2e0df00fa249558427de3f47838782a3c3dfe501c1036db34cb067
                                    • Instruction Fuzzy Hash: 9031E671910259EFCB10DFA9D8889EEBBF8FB48710B24406AF515E7221D7709A45DFA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00D10255
                                    • SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 00D1027C
                                    • SendMessageW.USER32(?,0000007F,00000001,00000000), ref: 00D10290
                                    • GetClassLongW.USER32(?,000000DE), ref: 00D10308
                                    • GetClassLongW.USER32(?,000000F2), ref: 00D10316
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ClassLongMessageSend$H_prolog3
                                    • String ID:
                                    • API String ID: 350087385-0
                                    • Opcode ID: 820a2fb74b973f61d4e79e3f7907dad4186728faf622e62b80932cc4cecad23a
                                    • Instruction ID: 9cd965dd2ed0dce1a15fed15a2e19f41829ef8d64b8a808f8789ffa1b616e0a1
                                    • Opcode Fuzzy Hash: 820a2fb74b973f61d4e79e3f7907dad4186728faf622e62b80932cc4cecad23a
                                    • Instruction Fuzzy Hash: F421C271A40219BBDB20FB64CC85FEE77A8AF55710F254214F954BB2E2CEB09C819764
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C8C90E: __EH_prolog3_GS.LIBCMT ref: 00C8C915
                                      • Part of subcall function 00C8C90E: GetWindowRect.USER32(?,?), ref: 00C8C956
                                      • Part of subcall function 00C8C90E: CreateRoundRectRgn.GDI32(00000000,00000000,?,?,00000004,00000004), ref: 00C8C980
                                      • Part of subcall function 00C8C90E: SetWindowRgn.USER32(?,?,00000000), ref: 00C8C996
                                    • GetSystemMenu.USER32(?,00000000), ref: 00C8CF1D
                                    • DeleteMenu.USER32(?,0000F120,00000000,00000000), ref: 00C8CF3E
                                    • DeleteMenu.USER32(?,0000F020,00000000), ref: 00C8CF4A
                                    • DeleteMenu.USER32(?,0000F030,00000000), ref: 00C8CF56
                                    • EnableMenuItem.USER32(?,0000F060,00000001), ref: 00C8CF70
                                      • Part of subcall function 00C85ACB: SetRectEmpty.USER32(?), ref: 00C85AFE
                                      • Part of subcall function 00C85ACB: ReleaseCapture.USER32 ref: 00C85B04
                                      • Part of subcall function 00C85ACB: SetCapture.USER32(?), ref: 00C85B13
                                      • Part of subcall function 00C85ACB: GetCapture.USER32 ref: 00C85B55
                                      • Part of subcall function 00C85ACB: ReleaseCapture.USER32 ref: 00C85B65
                                      • Part of subcall function 00C85ACB: SetCapture.USER32(?), ref: 00C85B74
                                      • Part of subcall function 00C85ACB: RedrawWindow.USER32(?,?,?,00000505), ref: 00C85BDF
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CaptureMenu$DeleteRectWindow$Release$CreateEmptyEnableH_prolog3_ItemRedrawRoundSystem
                                    • String ID:
                                    • API String ID: 2818640433-0
                                    • Opcode ID: 603c6612b0980f4eeb2e17c9ec0d867a560f3ecc57efe2d793c401fe3ce4acb6
                                    • Instruction ID: d6929d55b1ff752c1c4254ff413c1b303b9293aabb703c1c11eab36dd4876f66
                                    • Opcode Fuzzy Hash: 603c6612b0980f4eeb2e17c9ec0d867a560f3ecc57efe2d793c401fe3ce4acb6
                                    • Instruction Fuzzy Hash: 6821AE31600214AFEB216F60CC8AE6E7A2AEF05754F044076F6059A6A2CB719820EBA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SelectObject.GDI32(?,00000000), ref: 00CCE0C8
                                      • Part of subcall function 00C8193D: DeleteObject.GDI32(00000000), ref: 00C81956
                                    • SelectObject.GDI32(?,00000000), ref: 00CCE0DE
                                    • DeleteObject.GDI32(00000000), ref: 00CCE149
                                    • DeleteDC.GDI32(00000000), ref: 00CCE158
                                    • LeaveCriticalSection.KERNEL32(00DE8244), ref: 00CCE171
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Object$Delete$Select$CriticalLeaveSection
                                    • String ID:
                                    • API String ID: 3849354926-0
                                    • Opcode ID: 54637668dc1ce9b90ee49342b893a11f344f7ee349ee34646e696be44f9f7602
                                    • Instruction ID: 929eca545edafc55a4f1bf31a14600cc0fb22cbcef82adeadcd1b5957a630369
                                    • Opcode Fuzzy Hash: 54637668dc1ce9b90ee49342b893a11f344f7ee349ee34646e696be44f9f7602
                                    • Instruction Fuzzy Hash: E421AF71900204EFCF11EF65DC84D69BBB5FF86350B0881AAEA18DF266C7719952DFA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetFileType.KERNEL32(00000000,00DD7E20,0000000C,00C7C27C,?,00004000,00000000,?,?), ref: 00D6D024
                                    • GetLastError.KERNEL32 ref: 00D6D02E
                                    • __dosmaperr.LIBCMT ref: 00D6D035
                                    • __alloc_osfhnd.LIBCMT ref: 00D6D056
                                    • __set_osfhnd.LIBCMT ref: 00D6D080
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ErrorFileLastType__alloc_osfhnd__dosmaperr__set_osfhnd
                                    • String ID:
                                    • API String ID: 43408053-0
                                    • Opcode ID: 3a1ce3023b31631a4fdf457dccc4372af0f930b2503db6497a11290c3756ddc9
                                    • Instruction ID: e4adff1894331c1f077e969ba7c1249e04b4750554b05cb02d61d55c0cdb3c0f
                                    • Opcode Fuzzy Hash: 3a1ce3023b31631a4fdf457dccc4372af0f930b2503db6497a11290c3756ddc9
                                    • Instruction Fuzzy Hash: 2B212530A012059FDF119F78E9427A9BB61AF42324F6C8645E4A08F2E3C7798943DFB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00C92580
                                    • DestroyMenu.USER32(?,00000004,00C929FE), ref: 00C925BC
                                    • IsWindow.USER32(?), ref: 00C925CD
                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00C925E1
                                    • ~_Task_impl.LIBCPMT ref: 00C9265A
                                      • Part of subcall function 00CFE06E: GetParent.USER32(?), ref: 00CFE0D4
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: DestroyH_prolog3MenuMessageParentSendTask_implWindow
                                    • String ID:
                                    • API String ID: 1857064102-0
                                    • Opcode ID: 2cf7128a2b728d88ff532ef45580b92ada26551b62f313f1f88b62027aa19cc2
                                    • Instruction ID: eb198e8b38c168a6fe6033413fdd7d3e6ef0798ef1a143223a02d6e3f3995808
                                    • Opcode Fuzzy Hash: 2cf7128a2b728d88ff532ef45580b92ada26551b62f313f1f88b62027aa19cc2
                                    • Instruction Fuzzy Hash: 1E31CE34100784DBCB26EF78C4697BEBBF4AF45300F14488CE49A57292CBB02B05EB26
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C6EAF8: GetWindowLongW.USER32(?,000000F0), ref: 00C6EB03
                                    • SendMessageW.USER32(?,00000086,00000001,00000000), ref: 00CEC8FA
                                    • SendMessageW.USER32(?,00000086,00000000,00000000), ref: 00CEC911
                                    • GetDesktopWindow.USER32 ref: 00CEC915
                                    • SendMessageW.USER32(00000000,0000036D,0000000C,00000000), ref: 00CEC936
                                    • GetWindow.USER32(00000000), ref: 00CEC93B
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: MessageSendWindow$DesktopLong
                                    • String ID:
                                    • API String ID: 2272707703-0
                                    • Opcode ID: 0c98498408f7fdc3a88c1433cdd295616f0377c7789c0b3291fcf6779800189f
                                    • Instruction ID: c6571f942d651aa1b5ac275fb38456df40c7df0dc654c51d5990a3cef0505dd5
                                    • Opcode Fuzzy Hash: 0c98498408f7fdc3a88c1433cdd295616f0377c7789c0b3291fcf6779800189f
                                    • Instruction Fuzzy Hash: 3511E33224079477EB352B278CCAF6E3A58AF44790F160125FA51592E2CBA1CE02D6A4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • EnableMenuItem.USER32(?,00004212,00000001), ref: 00C94865
                                    • EnableMenuItem.USER32(?,00004213,00000000), ref: 00C94871
                                    • EnableMenuItem.USER32(?,00004214,00000000), ref: 00C9489D
                                    • CheckMenuItem.USER32(?,00004213,00000008), ref: 00C948C6
                                    • CheckMenuItem.USER32(?,00004214,00000000), ref: 00C948D2
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ItemMenu$Enable$Check
                                    • String ID:
                                    • API String ID: 1852492618-0
                                    • Opcode ID: 990160cbda5ee194b1625d030c4462a9ad1cff70d1f80ca6dd8dbf60f7a75df1
                                    • Instruction ID: 67f6a114073e875fcecfe9b9935370a45cafbc5064db9b59baf46e73d8e98be9
                                    • Opcode Fuzzy Hash: 990160cbda5ee194b1625d030c4462a9ad1cff70d1f80ca6dd8dbf60f7a75df1
                                    • Instruction Fuzzy Hash: E511E271240640BEDF28AF22DC86F2777A9BF90B10F108029F616DA5E1C660E801DB24
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetMapMode.GDI32(?), ref: 00C82CC9
                                    • GetDeviceCaps.GDI32(?,00000058), ref: 00C82D03
                                    • GetDeviceCaps.GDI32(?,0000005A), ref: 00C82D0C
                                      • Part of subcall function 00C6D6B2: MulDiv.KERNEL32(?,00000000,00000000), ref: 00C6D6F4
                                      • Part of subcall function 00C6D6B2: MulDiv.KERNEL32(?,00000000,00000000), ref: 00C6D711
                                    • MulDiv.KERNEL32(?,000009EC,00000060), ref: 00C82D30
                                    • MulDiv.KERNEL32(?,000009EC,?), ref: 00C82D3B
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CapsDevice$Mode
                                    • String ID:
                                    • API String ID: 696222070-0
                                    • Opcode ID: 460b722f01b57eb5cc18358c4e285817b8f4ce03bf552411641ba5df92520e50
                                    • Instruction ID: d1880dbfb388810db3ca2832860dc0f325c7c157d47de00633094fec9ec465ab
                                    • Opcode Fuzzy Hash: 460b722f01b57eb5cc18358c4e285817b8f4ce03bf552411641ba5df92520e50
                                    • Instruction Fuzzy Hash: A2117071600704AFDB216F56CC88C2EBBE9EF88750711441AFA869B360C771ED41DFA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetMapMode.GDI32(?), ref: 00C82D59
                                    • GetDeviceCaps.GDI32(?,00000058), ref: 00C82D93
                                    • GetDeviceCaps.GDI32(?,0000005A), ref: 00C82D9C
                                      • Part of subcall function 00C6D647: MulDiv.KERNEL32(?,00000000,00000000), ref: 00C6D689
                                      • Part of subcall function 00C6D647: MulDiv.KERNEL32(?,00000000,00000000), ref: 00C6D6A6
                                    • MulDiv.KERNEL32(?,00000060,000009EC), ref: 00C82DC0
                                    • MulDiv.KERNEL32(?,?,000009EC), ref: 00C82DCB
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CapsDevice$Mode
                                    • String ID:
                                    • API String ID: 696222070-0
                                    • Opcode ID: 0d7441f6f27774e043def76c8d7e2d41c1ae4348c65e5fc6d5c492058d66a458
                                    • Instruction ID: a38e5f0f27b9425fbe329d80211e16931676635bf77ac84237b476dd4cac5c2c
                                    • Opcode Fuzzy Hash: 0d7441f6f27774e043def76c8d7e2d41c1ae4348c65e5fc6d5c492058d66a458
                                    • Instruction Fuzzy Hash: 3311E031600704AFCB216F55CC88C2EBBFAEF84754B11441AF94297360C771EC41DBA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00C8C915
                                    • GetWindowRect.USER32(?,?), ref: 00C8C956
                                    • CreateRoundRectRgn.GDI32(00000000,00000000,?,?,00000004,00000004), ref: 00C8C980
                                    • SetWindowRgn.USER32(?,?,00000000), ref: 00C8C996
                                    • SetWindowRgn.USER32(?,00000000,00000000), ref: 00C8C9B2
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$Rect$CreateH_prolog3_Round
                                    • String ID:
                                    • API String ID: 2502471913-0
                                    • Opcode ID: 186b5c980e5e06486b8353478f7fec2285fbc328c902dea41b895b129c66dea2
                                    • Instruction ID: 05969f1dfbf095d2c3525440406b26ec6f2f7846154171b0c471c689a66c1b4d
                                    • Opcode Fuzzy Hash: 186b5c980e5e06486b8353478f7fec2285fbc328c902dea41b895b129c66dea2
                                    • Instruction Fuzzy Hash: 89112C71800309EBDB20EFA5C8859EEFBB8FF88701F14026EE552A2260D7315901DB78
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C69EE6: __EH_prolog3_catch_GS.LIBCMT ref: 00C69EF0
                                    • ~_Task_impl.LIBCPMT ref: 00C60494
                                      • Part of subcall function 00C77AA7: __EH_prolog3.LIBCMT ref: 00C77AAE
                                    • ~_Task_impl.LIBCPMT ref: 00C604A3
                                      • Part of subcall function 00C762ED: __EH_prolog3.LIBCMT ref: 00C762F4
                                    • ~_Task_impl.LIBCPMT ref: 00C604B2
                                      • Part of subcall function 00C76298: __EH_prolog3.LIBCMT ref: 00C7629F
                                    • ~_Task_impl.LIBCPMT ref: 00C604C1
                                      • Part of subcall function 00C764F6: __EH_prolog3.LIBCMT ref: 00C764FD
                                    • ~_Task_impl.LIBCPMT ref: 00C604D0
                                      • Part of subcall function 00C6BE93: __EH_prolog3.LIBCMT ref: 00C6BE9A
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: H_prolog3Task_impl$H_prolog3_catch_
                                    • String ID:
                                    • API String ID: 3990957366-0
                                    • Opcode ID: 2ad2d15adc011a2120be17014eae6f00ad143423be02242d39ce1981fb64c5fa
                                    • Instruction ID: 7c3bf9cb560451b8c5a0ba25aa464d96b428a699da44d06415aca5f619e9d507
                                    • Opcode Fuzzy Hash: 2ad2d15adc011a2120be17014eae6f00ad143423be02242d39ce1981fb64c5fa
                                    • Instruction Fuzzy Hash: 9C216A34904788DEC721EBA8C5457DEBBE8EF15310F10469DD85A63382DBB52608DB62
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetCapture.USER32(?), ref: 00CB2215
                                    • GetCursorPos.USER32(?), ref: 00CB2254
                                    • LoadCursorW.USER32(00000000,00007F86), ref: 00CB227E
                                    • SetCursor.USER32(00000000), ref: 00CB2285
                                    • GetCursorPos.USER32(?), ref: 00CB2292
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Cursor$CaptureLoad
                                    • String ID:
                                    • API String ID: 1460996051-0
                                    • Opcode ID: fb4bf9f69fbe9444472ed07925949adb86fd8ec88e45011b2f49b06610f04236
                                    • Instruction ID: 373f9252db668500b756981a3216409485f5b906d87d28692512843de366299b
                                    • Opcode Fuzzy Hash: fb4bf9f69fbe9444472ed07925949adb86fd8ec88e45011b2f49b06610f04236
                                    • Instruction Fuzzy Hash: 881151316007059FDB24ABB4C81DFEA7BE9EF59711F01042DE59AC7251CB71A941CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindResourceW.KERNEL32(?,?,75FD6BA0,00000000,00D9FBE4,?,00CD2710,?,?,?,00000084,00CD2AE4,0000000A,0000000A,0000000A,00000000), ref: 00CD0882
                                    • LoadResource.KERNEL32(?,00000000,?,00CD2710,?,?,?,00000084,00CD2AE4,0000000A,0000000A,0000000A,00000000,00000014,00CCAFD7,00000004), ref: 00CD0898
                                    • LockResource.KERNEL32(00000000,?,?,00CD2710,?,?,?,00000084,00CD2AE4,0000000A,0000000A,0000000A,00000000,00000014,00CCAFD7,00000004), ref: 00CD08A7
                                    • FreeResource.KERNEL32(?,00000000,00000000,?,?,00CD2710,?,?,?,00000084,00CD2AE4,0000000A,0000000A,0000000A,00000000,00000014), ref: 00CD08B8
                                    • SizeofResource.KERNEL32(?,00000000,?,?,00CD2710,?,?,?,00000084,00CD2AE4,0000000A,0000000A,0000000A,00000000,00000014,00CCAFD7), ref: 00CD08C5
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Resource$FindFreeLoadLockSizeof
                                    • String ID:
                                    • API String ID: 4159136517-0
                                    • Opcode ID: 429c144e84f37617e2d70aecfc7409f887bbf1728b73ab7c10ec57899e8457c3
                                    • Instruction ID: 46afe34a45a2e39ee78bd3a266f54fbd8f18acefc7abd914362bf5533944c274
                                    • Opcode Fuzzy Hash: 429c144e84f37617e2d70aecfc7409f887bbf1728b73ab7c10ec57899e8457c3
                                    • Instruction Fuzzy Hash: 2901BC76541715BB8B116BA9AC08E6B7BACEF85360B214026FA15D7350DB30DE00EBF4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ScreenToClient.USER32(?,?), ref: 00D1237D
                                    • SendMessageW.USER32(?,00000366,00000000,?), ref: 00D12399
                                    • ClientToScreen.USER32(?,?), ref: 00D123A6
                                    • GetWindowLongW.USER32(?,000000F0), ref: 00D123AF
                                    • GetParent.USER32(?), ref: 00D123BD
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ClientScreen$LongMessageParentSendWindow
                                    • String ID:
                                    • API String ID: 4240056119-0
                                    • Opcode ID: 217df367ffb499e31021122f4b0bf68f76f2c2d803c7678542c9f8b2f86f27e4
                                    • Instruction ID: 75ea65b405af5bb5a2a7643dcfe9e2654147e6e6eebe950aa755794da1d4aed1
                                    • Opcode Fuzzy Hash: 217df367ffb499e31021122f4b0bf68f76f2c2d803c7678542c9f8b2f86f27e4
                                    • Instruction Fuzzy Hash: A7F08C3610162877E7120B58BC08EFE376CEF85771F18421AFD35D6290DB79DA9182B4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetKeyboardState.USER32(?), ref: 00CB0419
                                    • _memset.LIBCMT ref: 00CB0433
                                    • GetKeyboardLayout.USER32(?), ref: 00CB0443
                                    • MapVirtualKeyW.USER32(?,00000000), ref: 00CB0461
                                    • ToUnicodeEx.USER32(?,00000000), ref: 00CB046B
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Keyboard$Exception@8H_prolog3LayoutStateThrowUnicodeVirtual_memset
                                    • String ID:
                                    • API String ID: 4204171240-0
                                    • Opcode ID: 020fb448a22d257d291467f708fbba0da5dac180892b48e0b5defbf930b57bee
                                    • Instruction ID: c8c9fdf3dd06ee867916a82522c26ab07b2cccc0a4bce6bdeef63975e0a592ec
                                    • Opcode Fuzzy Hash: 020fb448a22d257d291467f708fbba0da5dac180892b48e0b5defbf930b57bee
                                    • Instruction Fuzzy Hash: 09014F71600208BBDB50ABA5DC4AFEE77ACEF14700F504066B646E61A1DAB0DA458B65
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetCursorPos.USER32(00000000), ref: 00C9069B
                                    • ScreenToClient.USER32(?,00000000), ref: 00C906A8
                                    • PtInRect.USER32(?,00000000,00000000), ref: 00C906BB
                                    • LoadCursorW.USER32(00000000,00007F86), ref: 00C906DA
                                    • SetCursor.USER32(00000000), ref: 00C906E6
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Cursor$ClientLoadRectScreen
                                    • String ID:
                                    • API String ID: 2747913190-0
                                    • Opcode ID: bca5ff50be76f9c276bb2326a10e978fef95460c4b5808fe05b46de20895bd94
                                    • Instruction ID: d8e4b885de76ca5734c81f8fb512d51e03bcfefa5aed673fa49c1cdd763bf394
                                    • Opcode Fuzzy Hash: bca5ff50be76f9c276bb2326a10e978fef95460c4b5808fe05b46de20895bd94
                                    • Instruction Fuzzy Hash: 75015A72510349FFDF109FA1DC48EAE7BBDFB08355F100419F905E5220D7759A609B60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __getptd.LIBCMT ref: 00D7429E
                                      • Part of subcall function 00D6FFE8: __getptd_noexit.LIBCMT ref: 00D6FFEB
                                      • Part of subcall function 00D6FFE8: __amsg_exit.LIBCMT ref: 00D6FFF8
                                    • __getptd.LIBCMT ref: 00D742B5
                                    • __amsg_exit.LIBCMT ref: 00D742C3
                                    • __lock.LIBCMT ref: 00D742D3
                                    • __updatetlocinfoEx_nolock.LIBCMT ref: 00D742E7
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                    • String ID:
                                    • API String ID: 938513278-0
                                    • Opcode ID: 4fc4c0fa9ce37bd3d24ae939f65f03f72720d69803a939f99f9f51d5afd6d24f
                                    • Instruction ID: 04dec94774a89a352df345248fe31afe1156f474a71b78f24d59f1eb02f54d83
                                    • Opcode Fuzzy Hash: 4fc4c0fa9ce37bd3d24ae939f65f03f72720d69803a939f99f9f51d5afd6d24f
                                    • Instruction Fuzzy Hash: 21F09631944710DFE722B7785406B6D37A0EF01720F558149F448B76D3EF245961DABA
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 00D32510
                                    • IsRectEmpty.USER32(?), ref: 00D3292F
                                    • OffsetRect.USER32(?,00000000,00000001), ref: 00D3296B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$EmptyH_prolog3_Offset
                                    • String ID: !
                                    • API String ID: 307044148-2657877971
                                    • Opcode ID: 324f99acc6835f9d8d6206f87965dc6cb7daf36d40d98e5ab66bd25a0a1f889d
                                    • Instruction ID: 4d675166387b32d00f1b01525cb2d18c2910478fb04bca5fa0109b0248087de9
                                    • Opcode Fuzzy Hash: 324f99acc6835f9d8d6206f87965dc6cb7daf36d40d98e5ab66bd25a0a1f889d
                                    • Instruction Fuzzy Hash: B1024871E00619DFCF15DFA4C895AEEBBB9FF48300F184169E806AB295DB70A945CF60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _memset.LIBCMT ref: 00C546F5
                                    • _memset.LIBCMT ref: 00C54712
                                    • GetModuleFileNameExW.PSAPI(00000000,?,?,00000104), ref: 00C5476F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: _memset$FileModuleName
                                    • String ID: GGANA=
                                    • API String ID: 3867707140-2716513001
                                    • Opcode ID: 5315457443b3d9c848da39577c00ab4745732428548dfbf1f0b71b6887de86aa
                                    • Instruction ID: d37c3cb9493bff7da7ed27949161ff11cbd8116584ad770b2202e90f9cf06179
                                    • Opcode Fuzzy Hash: 5315457443b3d9c848da39577c00ab4745732428548dfbf1f0b71b6887de86aa
                                    • Instruction Fuzzy Hash: 65D10975600205DFD714DF68CC41BAAB3B5FF95325F148299E825D72D0D731AE88CB94
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __snwprintf_s.LIBCMT ref: 00C75574
                                    • __snwprintf_s.LIBCMT ref: 00C755A6
                                      • Part of subcall function 00D69D23: __getptd_noexit.LIBCMT ref: 00D69D23
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: __snwprintf_s$__getptd_noexit
                                    • String ID: Afx:%p:%x$Afx:%p:%x:%p:%p:%p
                                    • API String ID: 101746997-2801496823
                                    • Opcode ID: 9745dec3fe2b117f09000c3075204cbd12a52b5592a125d666f892dfc7c03b43
                                    • Instruction ID: 798f02200e690ddc58ab3ad69e1ec1367eaa6baebfbf871f7425a4898157df0a
                                    • Opcode Fuzzy Hash: 9745dec3fe2b117f09000c3075204cbd12a52b5592a125d666f892dfc7c03b43
                                    • Instruction Fuzzy Hash: 89312EB5D00609AFCB11EFA5D88199EBBF9EF48750F108026F914A7222D7709A51DFB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleW.KERNEL32(DWMAPI,?,?,00000000,?,?,?,?,?,?,?,?,00D0BDA4), ref: 00CA27B8
                                    • GetProcAddress.KERNEL32(00000000,DwmInvalidateIconicBitmaps), ref: 00CA27C8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProc
                                    • String ID: DWMAPI$DwmInvalidateIconicBitmaps
                                    • API String ID: 1646373207-1098356003
                                    • Opcode ID: 65e55ce7ede91e45e3f2004114496235ea1aeae5067bcb435edaf73ea0093068
                                    • Instruction ID: be34fc92e13f5f03e1c99815a02c7ef940b8837c397e7e4cc8ff21e6bf0d63b6
                                    • Opcode Fuzzy Hash: 65e55ce7ede91e45e3f2004114496235ea1aeae5067bcb435edaf73ea0093068
                                    • Instruction Fuzzy Hash: FA114F71A002199BCB00EF79DC85AAB77F9AF4A304B140479A816EB241EA71DE04CB70
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _memset.LIBCMT ref: 00C7E7A1
                                    • GetSysColor.USER32(00000014), ref: 00C7E7EB
                                    • CreateDIBitmap.GDI32(?,00000028,00000004,?,00000028,00000000), ref: 00C7E83E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: BitmapColorCreate_memset
                                    • String ID: (
                                    • API String ID: 3930187609-3887548279
                                    • Opcode ID: d5c542f4672ca32c86adff153ee4ba48af08df5ffcae51f5ac43641069c1ed52
                                    • Instruction ID: 3512f8de81c26a30dfa682a3333cc8be37cebb8de00afc1ff3732905df35a28d
                                    • Opcode Fuzzy Hash: d5c542f4672ca32c86adff153ee4ba48af08df5ffcae51f5ac43641069c1ed52
                                    • Instruction Fuzzy Hash: F621D331A103589BDB04DBA8C846BEDBBF8EB54700F00846EE546EB281DA315948CB71
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00C7F2F8
                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00C7F324
                                    • GetClassInfoW.USER32(?,00000000,?), ref: 00C7F368
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: H_prolog3$ClassCursorException@8InfoLoadThrow
                                    • String ID: %s:%x:%x:%x:%x
                                    • API String ID: 3308755097-1000192757
                                    • Opcode ID: 88cad0d35b4f69bea0f1aa6f5371f00667d09f01c855cf72d948067742afa173
                                    • Instruction ID: 10b6418793d8ba7b2812f953657ba1e08b6892e62e9a368e05ba9e13c8976f7b
                                    • Opcode Fuzzy Hash: 88cad0d35b4f69bea0f1aa6f5371f00667d09f01c855cf72d948067742afa173
                                    • Instruction Fuzzy Hash: E821F9B4E01219AFDB10EFA5D8C5AAEBBB4FF08300F10842AF554E7351D7749A45DBA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • KillTimer.USER32(?,00000002), ref: 00D132C5
                                    • GetFocus.USER32 ref: 00D132D1
                                    • RedrawWindow.USER32(?,00000000,00000000,00000105,00000000), ref: 00D13302
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: FocusKillRedrawTimerWindow
                                    • String ID: y
                                    • API String ID: 1950525498-4225443349
                                    • Opcode ID: 69d3eefd582754d7d4b8433e693232594828934eb4b91f4369a218d3a0d2b507
                                    • Instruction ID: 68fe834de83658060dd8ef6dd353daf945aa659d5515301490ea9b51e70ed8e5
                                    • Opcode Fuzzy Hash: 69d3eefd582754d7d4b8433e693232594828934eb4b91f4369a218d3a0d2b507
                                    • Instruction Fuzzy Hash: 8CF0AF31154304FBDB30BBA1FC09BAA3B64BB11721F24802AF556951A1DE719AC0DF78
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleW.KERNEL32(Advapi32.dll,0002001F,?,00C696CA,00000000,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 00C695CB
                                    • GetProcAddress.KERNEL32(00000000,RegCreateKeyTransactedW), ref: 00C695DB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProc
                                    • String ID: Advapi32.dll$RegCreateKeyTransactedW
                                    • API String ID: 1646373207-2994018265
                                    • Opcode ID: f3b15aefdda20d2f4dfec263dd4f4b662823a930675e285b4cc3321e06410572
                                    • Instruction ID: 8e4e6af8f6d8e56e7c035f807897d1ac30f376b5b26d23f16616f6687d9d7cb4
                                    • Opcode Fuzzy Hash: f3b15aefdda20d2f4dfec263dd4f4b662823a930675e285b4cc3321e06410572
                                    • Instruction Fuzzy Hash: A9F03732100309FFCF225F96DC04BEA3BB9EF48795F04442AFA5491060C672C960EBA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleW.KERNEL32(Advapi32.dll,0002001F,?,00C69674,80000001,software,00000000,0002001F,?,00000000,00000000,18846CE9,00000000,FilePath,18846CE9,?), ref: 00C69572
                                    • GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedW), ref: 00C69582
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProc
                                    • String ID: Advapi32.dll$RegOpenKeyTransactedW
                                    • API String ID: 1646373207-3913318428
                                    • Opcode ID: 6382d6c7b3df59b2b259a5df2b0e3e59c654f273808e7980b1963b1070a82b99
                                    • Instruction ID: 1934a65159e3be5acf4b67f0477555503227df6f51a73d74d917532e9e7c3b5d
                                    • Opcode Fuzzy Hash: 6382d6c7b3df59b2b259a5df2b0e3e59c654f273808e7980b1963b1070a82b99
                                    • Instruction Fuzzy Hash: 95F05E32140205BFDF321F95DC44BA67BA9EF49751F044526B952D1160D771C660DB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleW.KERNEL32(?), ref: 00C68156
                                    • LoadLibraryW.KERNEL32(?), ref: 00C68167
                                    • GetProcAddress.KERNEL32(00000000,ImageList_AddMasked), ref: 00C68181
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AddressHandleLibraryLoadModuleProc
                                    • String ID: ImageList_AddMasked
                                    • API String ID: 310444273-822293376
                                    • Opcode ID: ada208a690de7364c0920cb18b055a8e38e5468384e2fc764fffb4eb04fa00de
                                    • Instruction ID: 9b35741d57f159247f4ef7c1fc96dd8b5bb98a09f63d0982ed5a7c4a1bb5ad25
                                    • Opcode Fuzzy Hash: ada208a690de7364c0920cb18b055a8e38e5468384e2fc764fffb4eb04fa00de
                                    • Instruction Fuzzy Hash: F1F01D75501711DFC730CFA8C948A5ABBE8EB16711B00C82EE5AAC3710D670F944CB24
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,00C6AC43,?,00000000,?,?,?,00000006), ref: 00C6AB4D
                                    • GetProcAddress.KERNEL32(00000000,GetFileAttributesTransactedW), ref: 00C6AB5D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AddressHandleModuleProc
                                    • String ID: GetFileAttributesTransactedW$kernel32.dll
                                    • API String ID: 1646373207-1378992308
                                    • Opcode ID: 85ec2bb8a7d4bdadbe45c7cbbd617e1db5343cc749c4007d8fb96c066c633fd9
                                    • Instruction ID: 1c9bbf1c89852c147c6f7dd2cad8e6e25782a4af46cb3ac92d133b4dcf9906dd
                                    • Opcode Fuzzy Hash: 85ec2bb8a7d4bdadbe45c7cbbd617e1db5343cc749c4007d8fb96c066c633fd9
                                    • Instruction Fuzzy Hash: 20F03031100305FFCB351FA99C48FA67B9AEB84761F04842AF554E1160D675CA50DF61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsWindowVisible.USER32(?), ref: 00C9F499
                                    • GetDesktopWindow.USER32 ref: 00C9F4C1
                                    • GetWindowRect.USER32(?,?), ref: 00C9F4D4
                                    • GetWindowRect.USER32(?,?), ref: 00C9F4E1
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$Rect$DesktopException@8H_prolog3ThrowVisible
                                    • String ID:
                                    • API String ID: 584671360-0
                                    • Opcode ID: eec8202796b2d4a1863ecffe850e997e324c6ad25c23e48c8dea1de8d1a5da2b
                                    • Instruction ID: fc7b9801290f623c8a0b048ecde442e248da14ac6e404012430aa9b8a19ef18a
                                    • Opcode Fuzzy Hash: eec8202796b2d4a1863ecffe850e997e324c6ad25c23e48c8dea1de8d1a5da2b
                                    • Instruction Fuzzy Hash: 7B610975A00609AFCF10DFA8C9C8CAEBBB9FF88704B244459F512E7264DB31AD41DB20
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindResourceW.KERNEL32(?,00000000,000000F1), ref: 00C8B13C
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    • LoadResource.KERNEL32(?,00000000), ref: 00C8B14F
                                    • LockResource.KERNEL32(00000000), ref: 00C8B15D
                                    • FreeResource.KERNEL32(?), ref: 00C8B301
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Resource$Exception@8FindFreeH_prolog3LoadLockThrow
                                    • String ID:
                                    • API String ID: 1564530344-0
                                    • Opcode ID: 4e3b91ae13e0bbffaba4ea3b56c3a6361344836ec7338bd442563937c6453767
                                    • Instruction ID: c45fecaae1dc6d68813004f9a726c6e069f0ad048788c66fa8ecdc20633b2306
                                    • Opcode Fuzzy Hash: 4e3b91ae13e0bbffaba4ea3b56c3a6361344836ec7338bd442563937c6453767
                                    • Instruction Fuzzy Hash: 5661D470A00206EFDB15AFA5C994ABEB7B5FF04348F108569F856DA360EB70DE40DB64
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _memset.LIBCMT ref: 00CDE3A7
                                    • GetSysColorBrush.USER32(0000000F), ref: 00CDE410
                                    • SetClassLongW.USER32(?,000000F6,00000000), ref: 00CDE41C
                                    • GetWindowRect.USER32(?,?), ref: 00CDE43F
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: BrushClassColorLongRectWindow_memset
                                    • String ID:
                                    • API String ID: 2638262843-0
                                    • Opcode ID: 8a50aaf68b9693cd1662d9ad6876c78e6b6ca42b32c49537ab09d61c8841c26f
                                    • Instruction ID: 62c1a2e5aea1eea3e443002964b94f261a2038909f48cfc144208d877c6b5f17
                                    • Opcode Fuzzy Hash: 8a50aaf68b9693cd1662d9ad6876c78e6b6ca42b32c49537ab09d61c8841c26f
                                    • Instruction Fuzzy Hash: A5610771A00209AFDF10EFA9C885AAEBBF9FF48350F10452AE519E7351DB749901DF61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 00D0B343
                                    • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 00D0B389
                                    • RedrawWindow.USER32(?,00000000,00000000,00000185), ref: 00D0B399
                                    • IsWindowVisible.USER32(?), ref: 00D0B43E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: MessageSendWindow$RedrawVisible
                                    • String ID:
                                    • API String ID: 2376333906-0
                                    • Opcode ID: 74696d9744fd936e65c775fa9f87c86736c62bbdf7b5b482bd4c17a942618a60
                                    • Instruction ID: e71ea0031abb64f58b93b56c2ffac0cae779309932c19a38e7114045d1dd4cf5
                                    • Opcode Fuzzy Hash: 74696d9744fd936e65c775fa9f87c86736c62bbdf7b5b482bd4c17a942618a60
                                    • Instruction Fuzzy Hash: 91519231204600AFCB219F65C889E6A77F6FF84714F28456EF54A8B692DB32ED41DB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: File$SizeTime_memset
                                    • String ID:
                                    • API String ID: 151880914-0
                                    • Opcode ID: 2bfb9cf092a7b234b87d367abe1905c1df3c6e8842c2de9ceee14736033c247a
                                    • Instruction ID: 983126565739df7d1151aa94208f3e6bb9f4df0380a647f7ff3ebfd279ffa5ea
                                    • Opcode Fuzzy Hash: 2bfb9cf092a7b234b87d367abe1905c1df3c6e8842c2de9ceee14736033c247a
                                    • Instruction Fuzzy Hash: ED51F871910705AFCB24DFA5D9858AAB7F8FF183107108A2EE166E7690EB30E904CF61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetAsyncKeyState.USER32(00000001), ref: 00CA6DC6
                                    • WindowFromPoint.USER32(?,?), ref: 00CA6E06
                                    • SendMessageW.USER32(?,00000000,?,00000000), ref: 00CA6E79
                                    • ScreenToClient.USER32(?,?), ref: 00CA6EDA
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: AsyncClientFromMessagePointScreenSendStateWindow
                                    • String ID:
                                    • API String ID: 227561881-0
                                    • Opcode ID: 05556a6257114ec02adfb85c6161f51d3bd66a48184083657b3bda39a2e6dc44
                                    • Instruction ID: b5f3fb2a1b7c902d4443f061468dc5b4a75053dffb92589f10122dd53cc16ef7
                                    • Opcode Fuzzy Hash: 05556a6257114ec02adfb85c6161f51d3bd66a48184083657b3bda39a2e6dc44
                                    • Instruction Fuzzy Hash: A7516E71A0020AAFCF149FA4DC84ABEBBB5FF45304F14452AF916D7290EB709A51DBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                    • String ID:
                                    • API String ID: 2782032738-0
                                    • Opcode ID: cd69f269b0485826f3ba61cd8e53f38c9aa5618363be7e3a723f5b1e1d6dac0b
                                    • Instruction ID: 94d8f7412b0958405ebd1ca16aad7a1216d2925cafa93569b80ed0f9c320be2a
                                    • Opcode Fuzzy Hash: cd69f269b0485826f3ba61cd8e53f38c9aa5618363be7e3a723f5b1e1d6dac0b
                                    • Instruction Fuzzy Hash: C641A131F006059FDB259F69E884AAEBBB7EF80320F288529E45697280D770DD45DB71
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: EmptyRect
                                    • String ID:
                                    • API String ID: 2270935405-0
                                    • Opcode ID: 3f85af332a684be7bedabfd25e53caeb593a50e951ca59f90f2ecb3cc7a6c434
                                    • Instruction ID: fb7a731176c2516657ffa7102034762c270b2ee147898cc87b869bba0ac40b67
                                    • Opcode Fuzzy Hash: 3f85af332a684be7bedabfd25e53caeb593a50e951ca59f90f2ecb3cc7a6c434
                                    • Instruction Fuzzy Hash: 32519FB1805B858EC360DF3AC5806E6FBF8FF98304F144A2FD0AAD2261DBB065819F51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ClientScreenWindow
                                    • String ID:
                                    • API String ID: 1643562046-0
                                    • Opcode ID: 84d3d4da8e2d39bd626dfd6d3447aa8b4f2fa4eb2ffbc693d218feae7624e83f
                                    • Instruction ID: ec0bf7cbe389606a4b99134002f2856c7158b76a4bced7c36a102b3d33e7c29d
                                    • Opcode Fuzzy Hash: 84d3d4da8e2d39bd626dfd6d3447aa8b4f2fa4eb2ffbc693d218feae7624e83f
                                    • Instruction Fuzzy Hash: BA41E431500A02EFDF249FA4CC94DBE7BB9EF05308F10842AE996D6161EB71DE40DB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Parent$MessageSend
                                    • String ID:
                                    • API String ID: 2251359880-0
                                    • Opcode ID: 96d2f95127a32505f02efa8410c67ae76037911531988581bc8d7b00f6b85a15
                                    • Instruction ID: 5e6ebe104e42d3971d99b61486a07c16b43e0831b06b13183554544d0ff9e8a6
                                    • Opcode Fuzzy Hash: 96d2f95127a32505f02efa8410c67ae76037911531988581bc8d7b00f6b85a15
                                    • Instruction Fuzzy Hash: 0D315071604605EFCF289FA5C888E6EBBB9FF44314B104569E566E3250DB30DE129B64
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00C6F0F2
                                    • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00C6F14C
                                    • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00C6F182
                                    • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00C6F1A7
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: MessageSend
                                    • String ID:
                                    • API String ID: 3850602802-0
                                    • Opcode ID: 66f3af0fcb16f8c9cf141e33d304f5c7e40d52308ca7b971168f9c0171aba061
                                    • Instruction ID: 083387209e30efe6233bf030668daf85ab2b4d12c83a9466b84046b6c55cd5df
                                    • Opcode Fuzzy Hash: 66f3af0fcb16f8c9cf141e33d304f5c7e40d52308ca7b971168f9c0171aba061
                                    • Instruction Fuzzy Hash: 72315030640204EFDB31CF15ECD4D6EBBA6EB87B90B24847EE4159B215D631DE82DB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$ClientEmptyWindow
                                    • String ID:
                                    • API String ID: 742297903-0
                                    • Opcode ID: c0d1fed90624cd5750762e4fa7056cc86b03670668bb069a54b178d41713f8fe
                                    • Instruction ID: ce78b711cfd56e0f3455dc06ea35597289e2bf39cbd4d015dd4dabded11f041d
                                    • Opcode Fuzzy Hash: c0d1fed90624cd5750762e4fa7056cc86b03670668bb069a54b178d41713f8fe
                                    • Instruction Fuzzy Hash: E23108B1604209EFCB04EF68C984EA9B7F4FF49304F10816AE41ADB251D730A901CBA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetClientRect.USER32(?,?), ref: 00C94760
                                    • PtInRect.USER32(?,?,?), ref: 00C94784
                                      • Part of subcall function 00C93D9F: ScreenToClient.USER32(?,?), ref: 00C93DBC
                                      • Part of subcall function 00C93D9F: GetParent.USER32(?), ref: 00C93DD3
                                    • MapWindowPoints.USER32(?,?,?,00000001), ref: 00C947AF
                                    • SendMessageW.USER32(?,00000202,?,?), ref: 00C947CE
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ClientRect$MessageParentPointsScreenSendWindow
                                    • String ID:
                                    • API String ID: 4233697448-0
                                    • Opcode ID: f9e87d710b3ce5474e85dd3f9e9e97d17104f9f7db902adb63bd5de436fbe4fe
                                    • Instruction ID: 6c2481f28493766699263a354474789f85ab6dae07111e396df8d359df13d90e
                                    • Opcode Fuzzy Hash: f9e87d710b3ce5474e85dd3f9e9e97d17104f9f7db902adb63bd5de436fbe4fe
                                    • Instruction Fuzzy Hash: A4313C71600249EFDF14AFA4DC88CAE7BB5FF48304B10852EF92AD6260DB309A51DB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CharNext$__fassign_wcstoul
                                    • String ID:
                                    • API String ID: 833777423-0
                                    • Opcode ID: 115dc36aac4df972da5ac49a7f376823b236f29bbb2bac8efff36302ca82161a
                                    • Instruction ID: 984a4e72a0fd467d6b0df17f2c0ca59a7f196e113ea539f62b1b7fb44051a5ce
                                    • Opcode Fuzzy Hash: 115dc36aac4df972da5ac49a7f376823b236f29bbb2bac8efff36302ca82161a
                                    • Instruction Fuzzy Hash: 9D21D272500216ABDF21AB69CC49BBAB3F8EF44750F204169F564E7141EB30DE429BB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetClientRect.USER32 ref: 00C946A0
                                    • PtInRect.USER32(?,?,?), ref: 00C946B8
                                      • Part of subcall function 00C93D9F: ScreenToClient.USER32(?,?), ref: 00C93DBC
                                      • Part of subcall function 00C93D9F: GetParent.USER32(?), ref: 00C93DD3
                                    • MapWindowPoints.USER32(?,?,?,00000001), ref: 00C946EF
                                    • SendMessageW.USER32(?,00000201,?,?), ref: 00C9470E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ClientRect$MessageParentPointsScreenSendWindow
                                    • String ID:
                                    • API String ID: 4233697448-0
                                    • Opcode ID: 337ff4f2c8eb759fad69f7cca5b629e8e13df82d57beb095e7c8820d62baa6eb
                                    • Instruction ID: a8d188d21758262fe7a1cc5a9c0c398f56146198c68d3f42c8dd1fd703dc3bd6
                                    • Opcode Fuzzy Hash: 337ff4f2c8eb759fad69f7cca5b629e8e13df82d57beb095e7c8820d62baa6eb
                                    • Instruction Fuzzy Hash: 0B212A71A00209EFDF149FA5CC88DBEBBB5FB08300F10442EF815E6250EB719A15DBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: __getptd_noexit
                                    • String ID:
                                    • API String ID: 3074181302-0
                                    • Opcode ID: 9b130f9bdb85c4704f8a2f3b795604a555a8f1ee6d3acd1aa7cdd92edb991203
                                    • Instruction ID: 68593acef8dca19fe456692388ee61e8fbef935ff51dcfb1d9d0ca9f766c06a3
                                    • Opcode Fuzzy Hash: 9b130f9bdb85c4704f8a2f3b795604a555a8f1ee6d3acd1aa7cdd92edb991203
                                    • Instruction Fuzzy Hash: 8311D035500304FFEB206B64EC49B9A7BAAEB867A2F244129F951D72A0D770DD409FB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$CallCursorHookNextWindow
                                    • String ID:
                                    • API String ID: 3719484595-0
                                    • Opcode ID: e4f39b32c03af450bbedc0713763aaa8c7898e08cbf68aa41df77b78af80af2d
                                    • Instruction ID: 5a4451aeae020d3b565d3e7b9f4924c0a25326880836afb079282928b27b52c3
                                    • Opcode Fuzzy Hash: e4f39b32c03af450bbedc0713763aaa8c7898e08cbf68aa41df77b78af80af2d
                                    • Instruction Fuzzy Hash: 26214D36D0024AEFCF15DFA9DD889AEBBB8FF48310B10406AE520E7260D7359A15DB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindResourceW.KERNEL32(?,?,00000005,00000005,?,00000000,?,00D4ED4B,00000005,?), ref: 00D4EA88
                                    • LoadResource.KERNEL32(?,00000000,?,00000000,?,00D4ED4B,00000005,?), ref: 00D4EA9D
                                    • LockResource.KERNEL32(00000000,?,00000000,?,00D4ED4B,00000005,?), ref: 00D4EAAF
                                    • GlobalFree.KERNEL32(?), ref: 00D4EAE9
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Resource$FindFreeGlobalLoadLock
                                    • String ID:
                                    • API String ID: 3898064442-0
                                    • Opcode ID: 6617a5bb0c4fb320e8f9e989cb7dc7cd028103b31ea1b05cf72caf6eead52b3d
                                    • Instruction ID: 2a53368128fa35954227bd91545b27e9177449c3a8bb23fff3368186347d47b9
                                    • Opcode Fuzzy Hash: 6617a5bb0c4fb320e8f9e989cb7dc7cd028103b31ea1b05cf72caf6eead52b3d
                                    • Instruction Fuzzy Hash: 12115435100701BBCB21AF65C889B267BE9FF84761B198429F966C7221DB70D801DF70
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00C68B41
                                      • Part of subcall function 00C6855B: _malloc.LIBCMT ref: 00C68579
                                    • __CxxThrowException@8.LIBCMT ref: 00C68B86
                                    • FormatMessageW.KERNEL32(00001100,00000000,?,00000800,00C558A8,00000000,00000000,?,?,00DCA8DC,00000004,00C558A8,?), ref: 00C68BB0
                                    • LocalFree.KERNEL32(00C558A8,00000004,00C558A8,?), ref: 00C68BDE
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Exception@8FormatFreeH_prolog3LocalMessageThrow_malloc
                                    • String ID:
                                    • API String ID: 1776251131-0
                                    • Opcode ID: 8f26b63ae8c4a377809994237055a7bb1092e7b3841b0a561150d19d2f0d666f
                                    • Instruction ID: a1ca247076354dc5f1ece257bcec602d1a016c87883214af7bd3fc7b4a514e77
                                    • Opcode Fuzzy Hash: 8f26b63ae8c4a377809994237055a7bb1092e7b3841b0a561150d19d2f0d666f
                                    • Instruction Fuzzy Hash: 7311E6B1500305EFEB20DFA4CC41EBE77A8EF84710F208619F9258A291DB719A159BA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C6BE1C: ActivateActCtx.KERNEL32(?), ref: 00C6BE3F
                                    • IntersectRect.USER32(?,?,?), ref: 00C9CEB8
                                    • EqualRect.USER32(?,?), ref: 00C9CEC3
                                    • IsRectEmpty.USER32(?), ref: 00C9CECD
                                    • InvalidateRect.USER32(?,?,?), ref: 00C9CEEA
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Rect$ActivateEmptyEqualIntersectInvalidate
                                    • String ID:
                                    • API String ID: 4049613494-0
                                    • Opcode ID: bf5d1ff70c1f1606acf2b8986e0e4d3fb69dc91508c98d540d35386be908b9ab
                                    • Instruction ID: 2dd9e46349451bae2ca80b9c3cb1ac052040c4d82ca82d3d4bc8b0652f710364
                                    • Opcode Fuzzy Hash: bf5d1ff70c1f1606acf2b8986e0e4d3fb69dc91508c98d540d35386be908b9ab
                                    • Instruction Fuzzy Hash: 1611B47290021AAFCF10DFA9D9889AFBBB9FF49300B514066E916E7211D770AA05DB71
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetParent.USER32(?), ref: 00CA2A4B
                                    • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 00CA2A8E
                                    • RedrawWindow.USER32(?,00000000,00000000,00000185), ref: 00CA2A9A
                                    • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 00CA2A79
                                      • Part of subcall function 00D0AD33: SendMessageW.USER32(?,00000234,00000000,00000000), ref: 00D0ADAE
                                      • Part of subcall function 00D0AD33: SendMessageW.USER32(?,00000229,00000000,00000000), ref: 00D0ADD5
                                      • Part of subcall function 00D0AD33: SendMessageW.USER32(?,00000229,00000000,00000000), ref: 00D0ADF2
                                      • Part of subcall function 00D0AD33: SendMessageW.USER32(?,00000222,?,00000000), ref: 00D0AE09
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: MessageSend$ParentRedrawWindow
                                    • String ID:
                                    • API String ID: 2139789815-0
                                    • Opcode ID: c2471322443b25d6b0c9bd3d198987d87bff6d9379b1c2013a6738f38dbf38b8
                                    • Instruction ID: 76e5b8840869e4d721e2aaa485c46a0bde849b84cd351a22b4ab6739a7c6c97a
                                    • Opcode Fuzzy Hash: c2471322443b25d6b0c9bd3d198987d87bff6d9379b1c2013a6738f38dbf38b8
                                    • Instruction Fuzzy Hash: F411A372200219BFDB30AF69CCC5F7A7AA9FF90354F140429F54696650D7709E90AB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00C7954F
                                      • Part of subcall function 00C7B541: __EH_prolog3.LIBCMT ref: 00C7B548
                                    • __wcsdup.LIBCMT ref: 00C79571
                                    • GetCurrentThread.KERNEL32 ref: 00C7959E
                                    • GetCurrentThreadId.KERNEL32 ref: 00C795A7
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CurrentH_prolog3Thread$__wcsdup
                                    • String ID:
                                    • API String ID: 190065205-0
                                    • Opcode ID: 61f2f1c1921199cfbd20bfe9d109c7b6b770ab79223cf03ab9c8c95b49b57f3f
                                    • Instruction ID: c4c86bc516c3c5098daf7d89718f87b559bd852d50a8f68522b08504ee408a10
                                    • Opcode Fuzzy Hash: 61f2f1c1921199cfbd20bfe9d109c7b6b770ab79223cf03ab9c8c95b49b57f3f
                                    • Instruction Fuzzy Hash: B03199B0900B108FD7619F7AC58568AFAE8FFA4700F108A1FD1AAC7722DBB0A541DF55
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindResourceW.KERNEL32(?,00000000,00000005), ref: 00C6C3BF
                                    • LoadResource.KERNEL32(?,00000000), ref: 00C6C3C7
                                    • LockResource.KERNEL32(00000000), ref: 00C6C3D9
                                    • FreeResource.KERNEL32(00000000), ref: 00C6C427
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Resource$FindFreeLoadLock
                                    • String ID:
                                    • API String ID: 1078018258-0
                                    • Opcode ID: 3b2c37ecd1dbc57c2074f4e5576d4f86c750b643f156ed83c1d94f2d769a1ea2
                                    • Instruction ID: d66b89960f35ad1e21656f6eb1a9ad15c57e3950947914aed8a845500e395934
                                    • Opcode Fuzzy Hash: 3b2c37ecd1dbc57c2074f4e5576d4f86c750b643f156ed83c1d94f2d769a1ea2
                                    • Instruction Fuzzy Hash: 3D116D75600611EBD7349F65C8D9A76B7B4FF04751F10802AE8E293A60EB74EE44E7A0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C6EA98: GetDlgItem.USER32(00000000,?), ref: 00C6EAA9
                                    • GetWindowLongW.USER32(?,000000F0), ref: 00C76ABB
                                    • GetWindowTextLengthW.USER32(?), ref: 00C76AE8
                                    • GetWindowTextW.USER32(?,00000000,00000100), ref: 00C76B17
                                    • SendMessageW.USER32(?,0000014D,000000FF,?), ref: 00C76B38
                                      • Part of subcall function 00C818A4: lstrlenW.KERNEL32(?,?,?), ref: 00C818D0
                                      • Part of subcall function 00C818A4: _memset.LIBCMT ref: 00C818EE
                                      • Part of subcall function 00C818A4: GetWindowTextW.USER32(00000000,?,00000100), ref: 00C81908
                                      • Part of subcall function 00C818A4: lstrcmpW.KERNEL32(?,?,?,?), ref: 00C8191A
                                      • Part of subcall function 00C818A4: SetWindowTextW.USER32(00000000,?), ref: 00C81926
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$Text$ItemLengthLongMessageSend_memsetlstrcmplstrlen
                                    • String ID:
                                    • API String ID: 205973220-0
                                    • Opcode ID: ee488cc2478bb4ee0756894aaf4b95bc631441bcf6320417502bfaf4cc9fcf7e
                                    • Instruction ID: 2cf13b1c753a42c8c853d27bb7b403d406394d9c2b29f8447058931a043b5618
                                    • Opcode Fuzzy Hash: ee488cc2478bb4ee0756894aaf4b95bc631441bcf6320417502bfaf4cc9fcf7e
                                    • Instruction Fuzzy Hash: 9C118C31104649FBCF15AFA0CC05EA97FA9FF05360F148229F9799A2E1CB319991FB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetObjectW.GDI32(?,0000000C,?), ref: 00C70D35
                                    • SetBkColor.GDI32(?,?), ref: 00C70D3F
                                    • GetSysColor.USER32(00000008), ref: 00C70D4F
                                    • SetTextColor.GDI32(?,?), ref: 00C70D57
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Color$ObjectText
                                    • String ID:
                                    • API String ID: 829078354-0
                                    • Opcode ID: c72fd84f1239d341073ce2ea8a282b56013f0bce59586564671e7ca012f4a291
                                    • Instruction ID: 2b88e334772bbb7142d1b10713dbf54be97c6b11e70ca7bf3aab4f43e7169eaf
                                    • Opcode Fuzzy Hash: c72fd84f1239d341073ce2ea8a282b56013f0bce59586564671e7ca012f4a291
                                    • Instruction Fuzzy Hash: 5E116131600708EBDB309FA8DC49ABF77A8EF59750B648515F92AD6291DB30EE01C7A1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: RectWindow$CursorFromPoint
                                    • String ID:
                                    • API String ID: 3445796726-0
                                    • Opcode ID: a4efd5adfbce1c853120e6d8a9a53ab27baf4170bec0d2b0698ea08f044d4a6b
                                    • Instruction ID: d7a155f68ea03cdf6c11da24dc81ea19df111690e82bb7602f85cb01098ba2b8
                                    • Opcode Fuzzy Hash: a4efd5adfbce1c853120e6d8a9a53ab27baf4170bec0d2b0698ea08f044d4a6b
                                    • Instruction Fuzzy Hash: 3411EF71E0034AEF8F119FA9D8898FFBBFDFF48310B10451AE515E2210D6759A06DB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindResourceW.KERNEL32(?,?,000000F0), ref: 00C7A730
                                    • LoadResource.KERNEL32(?,00000000), ref: 00C7A73C
                                    • LockResource.KERNEL32(00000000), ref: 00C7A74A
                                    • FreeResource.KERNEL32(00000000), ref: 00C7A778
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Resource$FindFreeLoadLock
                                    • String ID:
                                    • API String ID: 1078018258-0
                                    • Opcode ID: 13fc26ce4dc8e30d6088f769174452f28bf90cd57181c0e570ba19f677779b20
                                    • Instruction ID: ccd9f82c64fe604db7658087d75becc43a7ac7b99bc1fccc0242bc13d004470d
                                    • Opcode Fuzzy Hash: 13fc26ce4dc8e30d6088f769174452f28bf90cd57181c0e570ba19f677779b20
                                    • Instruction Fuzzy Hash: 3F113675200309FFDB158FA5C888AAE7BB9FF44325F04806AF919D7260DB749E00DB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetMenuItemCount.USER32(00000000), ref: 00D0A241
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CountItemMenu
                                    • String ID:
                                    • API String ID: 1409047151-0
                                    • Opcode ID: 3038008bf044eeebeb721a356e4e76658560e4aa05d0885f0422be901b211349
                                    • Instruction ID: 13133a2cd507c2dee8775f10745f785dc4dfbcaadd3d85ad7969b0e1cd111a3f
                                    • Opcode Fuzzy Hash: 3038008bf044eeebeb721a356e4e76658560e4aa05d0885f0422be901b211349
                                    • Instruction Fuzzy Hash: FE018671901309BFDB014BBCCC84B7E7BA9EB85790F24153AF409E6190E632DD419675
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetTopWindow.USER32(?), ref: 00C736C8
                                    • GetTopWindow.USER32(00000000), ref: 00C73707
                                    • GetWindow.USER32(00000000,00000002), ref: 00C73725
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window
                                    • String ID:
                                    • API String ID: 2353593579-0
                                    • Opcode ID: 2e0d082ab115e49ec59eccaf5602dac19f87eb15ac1e7b882daa8e8327148308
                                    • Instruction ID: b0324352635af53da0ff50c932d5ebbf5aeb1d833be6df1584cf915de1396704
                                    • Opcode Fuzzy Hash: 2e0d082ab115e49ec59eccaf5602dac19f87eb15ac1e7b882daa8e8327148308
                                    • Instruction Fuzzy Hash: 8301ED7200169ABBCF126F519D05E9F3E6AFF48351F148015F91851120CB35CA62FBA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetDlgItem.USER32(?,?), ref: 00C727A0
                                    • GetTopWindow.USER32(00000000), ref: 00C727B3
                                      • Part of subcall function 00C72793: GetWindow.USER32(00000000,00000002), ref: 00C727FA
                                    • GetTopWindow.USER32(?), ref: 00C727E3
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$Item
                                    • String ID:
                                    • API String ID: 369458955-0
                                    • Opcode ID: c82ef85e2c8442275f71744c5dfd1494dda5f31e9fd3b7b8830f283a05d5ec62
                                    • Instruction ID: c3af34730c77ddf5df0b2344f8ec228cc4ad84e8cf0ab47b526cd10fd113bb7a
                                    • Opcode Fuzzy Hash: c82ef85e2c8442275f71744c5dfd1494dda5f31e9fd3b7b8830f283a05d5ec62
                                    • Instruction Fuzzy Hash: F301AD32501225B7CF322F61CD01EAF3B58AF443A0F14C020FD2CA5150DB32CA11A6F2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ~_Task_impl.LIBCPMT ref: 00C624BC
                                      • Part of subcall function 00C762ED: __EH_prolog3.LIBCMT ref: 00C762F4
                                    • ~_Task_impl.LIBCPMT ref: 00C624CB
                                      • Part of subcall function 00C76298: __EH_prolog3.LIBCMT ref: 00C7629F
                                    • ~_Task_impl.LIBCPMT ref: 00C624DA
                                      • Part of subcall function 00C77CE5: __EH_prolog3.LIBCMT ref: 00C77CEC
                                    • ~_Task_impl.LIBCPMT ref: 00C624E9
                                      • Part of subcall function 00C778EC: __EH_prolog3.LIBCMT ref: 00C778F3
                                      • Part of subcall function 00C6BE93: __EH_prolog3.LIBCMT ref: 00C6BE9A
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: H_prolog3$Task_impl
                                    • String ID:
                                    • API String ID: 2843614703-0
                                    • Opcode ID: e17b802eb6f3142a378d68d2c5edb8151c62edeae8337884eb17ca612c084d50
                                    • Instruction ID: a33a13252f06eb5414c2c8028afd033e1c83712ff827b602a4cee0485f6e636c
                                    • Opcode Fuzzy Hash: e17b802eb6f3142a378d68d2c5edb8151c62edeae8337884eb17ca612c084d50
                                    • Instruction Fuzzy Hash: 19116D70804748DED724EFA4C5457D9BBE8EB15710F10469DE46A533C1DBB52608DB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ~_Task_impl.LIBCPMT ref: 00C5F463
                                      • Part of subcall function 00C762ED: __EH_prolog3.LIBCMT ref: 00C762F4
                                    • ~_Task_impl.LIBCPMT ref: 00C5F472
                                    • ~_Task_impl.LIBCPMT ref: 00C5F481
                                      • Part of subcall function 00C764F6: __EH_prolog3.LIBCMT ref: 00C764FD
                                    • ~_Task_impl.LIBCPMT ref: 00C5F490
                                      • Part of subcall function 00C6BE93: __EH_prolog3.LIBCMT ref: 00C6BE9A
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Task_impl$H_prolog3
                                    • String ID:
                                    • API String ID: 1204490572-0
                                    • Opcode ID: 94597673d41a05bf0f01ddc4c1e075699ac78fcc8bcc6cfe463fd6ae53caf8c8
                                    • Instruction ID: aaa171b7a26889fcc31c1d77760139d35824fee61847c36ba30e914d7fc8eed9
                                    • Opcode Fuzzy Hash: 94597673d41a05bf0f01ddc4c1e075699ac78fcc8bcc6cfe463fd6ae53caf8c8
                                    • Instruction Fuzzy Hash: 6611AC30404B88EFC710EFA4C545BDEBBE8EF15310F10859ED86A63381DB742608DB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Parent$Focus
                                    • String ID:
                                    • API String ID: 384096180-0
                                    • Opcode ID: 17708e68d57e25a42269f08d1ca470540f2b1ec5e6b3fbe331fccba63bc0832c
                                    • Instruction ID: ebd7fc1844aae961197faa5a085942c0b225a96ceaad3818119281e7302e6db1
                                    • Opcode Fuzzy Hash: 17708e68d57e25a42269f08d1ca470540f2b1ec5e6b3fbe331fccba63bc0832c
                                    • Instruction Fuzzy Hash: 5EF04936510704AFCB307771DC09A5B76AABF84310F164869E48983662DF75E850DA60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindResourceW.KERNEL32(?,?,00000005), ref: 00C6C85C
                                    • LoadResource.KERNEL32(?,00000000), ref: 00C6C864
                                    • LockResource.KERNEL32(00000000), ref: 00C6C871
                                    • FreeResource.KERNEL32(00000000,00000000,?,?), ref: 00C6C889
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Resource$FindFreeLoadLock
                                    • String ID:
                                    • API String ID: 1078018258-0
                                    • Opcode ID: 8ecb36e47895b893d3b327be91b590386b9de9751303866de4442f90d9dd8a85
                                    • Instruction ID: 0aee642c572b507d65737459cb54054ecfe4ac649665bdf5206875eb8174c695
                                    • Opcode Fuzzy Hash: 8ecb36e47895b893d3b327be91b590386b9de9751303866de4442f90d9dd8a85
                                    • Instruction Fuzzy Hash: 4AF05E76201214BBC7116BA99C89DBFBBADEF8A7617054026FA45D3221DA748D009BB4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00C6EC4F: ShowWindow.USER32(?,?), ref: 00C6EC60
                                    • UpdateWindow.USER32(?), ref: 00D5756B
                                    • UpdateWindow.USER32(?), ref: 00D57577
                                    • SetRectEmpty.USER32(?), ref: 00D57583
                                    • SetRectEmpty.USER32(?), ref: 00D5758C
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$EmptyRectUpdate$Show
                                    • String ID:
                                    • API String ID: 1262231214-0
                                    • Opcode ID: 6d51edd7e9b594b1346569362561f70b12f0fa70951f5569a6072c48408bcccd
                                    • Instruction ID: ec5284675f7a4fdb8de5f0a25d9ea55e9f6d10403a9fbea797466d4326e3ba7e
                                    • Opcode Fuzzy Hash: 6d51edd7e9b594b1346569362561f70b12f0fa70951f5569a6072c48408bcccd
                                    • Instruction Fuzzy Hash: F3F01232204B14AFEB21AB35DC00F57B7F9BF84711F2A0669E994D7170DB71E8058A70
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: EmptyRect
                                    • String ID:
                                    • API String ID: 2270935405-0
                                    • Opcode ID: bd4070df3d08f635af610e7318791523beeb97a042868f4484559e628db8e864
                                    • Instruction ID: 1fd422716062452c3da858b57a0693cf878a9e00679e79dcc85487926533248a
                                    • Opcode Fuzzy Hash: bd4070df3d08f635af610e7318791523beeb97a042868f4484559e628db8e864
                                    • Instruction Fuzzy Hash: 29E0C9B6400B199AC730AB6AE844AC7B3FCAF84311F124A1AE586C3914D674F589CF54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_catch.LIBCMT ref: 00D0E01A
                                      • Part of subcall function 00CF861E: __EH_prolog3.LIBCMT ref: 00CF8625
                                      • Part of subcall function 00CF8341: __EH_prolog3.LIBCMT ref: 00CF8348
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: H_prolog3$H_prolog3_catch
                                    • String ID: %sMDIClientArea-%d$MDITabsState
                                    • API String ID: 1670334802-353449602
                                    • Opcode ID: dce9cb0d3314bc70d182ab2777909da4b10163cd30340195d465d35626be1e8d
                                    • Instruction ID: a968718b1d93cc25a7724ae4e126926d8cbc96971f28158aed8e6aaef322dcd6
                                    • Opcode Fuzzy Hash: dce9cb0d3314bc70d182ab2777909da4b10163cd30340195d465d35626be1e8d
                                    • Instruction Fuzzy Hash: 2D51A130900209EFDF15EFA4C855BEDBBB4AF05704F184049F51AAB2C2CB715E44DBA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 00CA2741: GetModuleHandleW.KERNEL32(DWMAPI,?,?,00000000,?,?,?,?,?,?,?,?,00D0BDA4), ref: 00CA27B8
                                      • Part of subcall function 00CA2741: GetProcAddress.KERNEL32(00000000,DwmInvalidateIconicBitmaps), ref: 00CA27C8
                                      • Part of subcall function 00C8333F: __EH_prolog3.LIBCMT ref: 00C83346
                                    • GetWindowRect.USER32(?,?), ref: 00CA2B7A
                                    • SetWindowRgn.USER32(?,00000000,00000001), ref: 00CA2BC7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Window$AddressH_prolog3HandleModuleProcRect
                                    • String ID:
                                    • API String ID: 2106468464-3916222277
                                    • Opcode ID: 90609349764757773cc9556d2d8a46f66944f8101f8b16ee8e8f0e4e1c022e0d
                                    • Instruction ID: 27769df857d0253a979f2df5cecb6e48e0417777af9d3c5dc17b0cef9ff131cb
                                    • Opcode Fuzzy Hash: 90609349764757773cc9556d2d8a46f66944f8101f8b16ee8e8f0e4e1c022e0d
                                    • Instruction Fuzzy Hash: 2D518130A00719EFCB22DF69C8449EFBBF5FF89714F10452EE85A96210DB309A40DB54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetWindowRect.USER32(?,?), ref: 00CA6B60
                                    • SystemParametersInfoW.USER32(00000026,00000000,?,00000000), ref: 00CA6BFD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: InfoParametersRectSystemWindow
                                    • String ID:
                                    • API String ID: 85510744-3916222277
                                    • Opcode ID: dbe90759283027a8961633582227be1516c505d6e55d85061d97e11a4b5fa0fa
                                    • Instruction ID: ae2b66d41ee9b7f655123e514f86595e37f36f22a2ea2074dbf052ae68cb853c
                                    • Opcode Fuzzy Hash: dbe90759283027a8961633582227be1516c505d6e55d85061d97e11a4b5fa0fa
                                    • Instruction Fuzzy Hash: DD413F71A00709EFCB25DF65C8849EEBBF5FF89314F14842EE85AA6250DB315A80DF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsChild.USER32(?,?), ref: 00CA0B63
                                    • GetWindowLongW.USER32(?,000000EC), ref: 00CA0B7A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ChildLongWindow
                                    • String ID: 0
                                    • API String ID: 1178903432-4108050209
                                    • Opcode ID: 8011f80ec31819bd3dbec29d21e9159310ef5f3f760edad6eb9d7e748573cdaa
                                    • Instruction ID: 6ff48a5adad6ff542a22221b0dbcf113a58f3d657599eeb355d1f2b88eeed9e4
                                    • Opcode Fuzzy Hash: 8011f80ec31819bd3dbec29d21e9159310ef5f3f760edad6eb9d7e748573cdaa
                                    • Instruction Fuzzy Hash: AE21C7315007077BDB21A624AE45FAFA2AC9F477ECF340555F825E7581EB34EE40A274
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00CAF25F
                                      • Part of subcall function 00C6D534: MoveToEx.GDI32(?,?,?,?), ref: 00C6D55E
                                      • Part of subcall function 00C6D534: MoveToEx.GDI32(?,?,?,?), ref: 00C6D56F
                                      • Part of subcall function 00C6CF56: MoveToEx.GDI32(?,?,?,00000000), ref: 00C6CF73
                                      • Part of subcall function 00C6CF56: LineTo.GDI32(?,?,?), ref: 00C6CF82
                                      • Part of subcall function 00C6DC02: SelectObject.GDI32(?,00000000), ref: 00C6DC28
                                      • Part of subcall function 00C6DC02: SelectObject.GDI32(?,?), ref: 00C6DC3E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Move$ObjectSelect$H_prolog3Line
                                    • String ID: iii$iii
                                    • API String ID: 3726201289-3499908146
                                    • Opcode ID: 2b7b7548a6860983c05f43a889bff383b62933ca5981cb3f0ff7844df72095ec
                                    • Instruction ID: 96bb25c8067607afcf63562de547b193e4557514768f4c6c889a335e8d5d8b32
                                    • Opcode Fuzzy Hash: 2b7b7548a6860983c05f43a889bff383b62933ca5981cb3f0ff7844df72095ec
                                    • Instruction Fuzzy Hash: A8316F71A0010EEBCF15EFA4C9929EE7B7AAF18304F004118F916A7291DB719A11EBA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: __fdopen
                                    • String ID: +$t
                                    • API String ID: 194168367-1842947216
                                    • Opcode ID: 65c3f6109fd97060ea2f779bd953e41ca29ee0d9c89bacd8eebbd162e438a059
                                    • Instruction ID: eb98e112f5da970c60a653041ac9ec38be30b66edaff23d439c697c8d1b4a306
                                    • Opcode Fuzzy Hash: 65c3f6109fd97060ea2f779bd953e41ca29ee0d9c89bacd8eebbd162e438a059
                                    • Instruction Fuzzy Hash: A92135311087429EE7209EA8D8C97AABBC8EF11350F24C52DED6EC61D3DB78D9818370
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindResourceW.KERNEL32(?,?,00000006,?,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,?,00C5549E,00000000,SOFTWARE\Microsoft\Windows NT\CurrentVersion,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5,SOFTWARE\Microsoft\Windows NT\CurrentVersion), ref: 00C551FB
                                      • Part of subcall function 00C550A0: LoadResource.KERNEL32(?,00000001,?,?,?,00C5520D,?,00000000,00000001,?,00C5549E,00000000,SOFTWARE\Microsoft\Windows NT\CurrentVersion,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5), ref: 00C550AD
                                    • _wmemcpy_s.LIBCMT ref: 00C55276
                                    Strings
                                    • SOFTWARE\Microsoft\Windows NT\CurrentVersion, xrefs: 00C551E4
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: Resource$FindLoad_wmemcpy_s
                                    • String ID: SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                    • API String ID: 3991362986-2278330950
                                    • Opcode ID: bd074df071e99186f67f91e0ea47103345966cad8a2b0975ecd4f746b4408c27
                                    • Instruction ID: f6e9b616f09aebad0047c122e8cf21fb6163dc66f4c25d7f84b0af94d33c6704
                                    • Opcode Fuzzy Hash: bd074df071e99186f67f91e0ea47103345966cad8a2b0975ecd4f746b4408c27
                                    • Instruction Fuzzy Hash: E621343A6008209FD7209B69DCA5A3BB3E8EF81722F04416AFC54DB291D630FD8493A5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    • SOFTWARE\Microsoft\Windows NT\CurrentVersion, xrefs: 00C54D17
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: _vswprintf_s_vwprintf
                                    • String ID: SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                    • API String ID: 2206667278-2278330950
                                    • Opcode ID: 33cae1b5b9e2c73b96f1d355d75aa5d63cecc6e0766478df790540b7cc115099
                                    • Instruction ID: 0342456ee3befa025dc2226abf3270dec0ad081747b2b7d46919f7342332f40c
                                    • Opcode Fuzzy Hash: 33cae1b5b9e2c73b96f1d355d75aa5d63cecc6e0766478df790540b7cc115099
                                    • Instruction Fuzzy Hash: AA01B57A601501AFC714EF58C8C5C6EF3ADEF54321B50411AFE059B301EA71B9949BE4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CopyInfoMonitorRect
                                    • String ID: (
                                    • API String ID: 2119610155-3887548279
                                    • Opcode ID: 128860a3ae9907e319e087e6898449790aa86d4594f78550879ccb9a69888b71
                                    • Instruction ID: 92d274566a7491ea758f19c93c6dd69effccc4b3a92498ed6ac501ffe8cc4acc
                                    • Opcode Fuzzy Hash: 128860a3ae9907e319e087e6898449790aa86d4594f78550879ccb9a69888b71
                                    • Instruction Fuzzy Hash: BF11D372A00209AFCB10DFA9D885D9EB7F4FB18700B508899E469E3210DB30FA45CB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00CD4189
                                    • RegisterClipboardFormatW.USER32(00000010), ref: 00CD41D2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ClipboardFormatH_prolog3Register
                                    • String ID: ToolbarButton%p
                                    • API String ID: 1070914459-899657487
                                    • Opcode ID: b4fe2a6d85ab80fe7033d2142acfe8c6e1b89506329fad8883d824f7a995c05a
                                    • Instruction ID: 06c3fcc0df23bbe2b6e504091c15e5241036300cceda5c0c5cbb4bd6a7748be1
                                    • Opcode Fuzzy Hash: b4fe2a6d85ab80fe7033d2142acfe8c6e1b89506329fad8883d824f7a995c05a
                                    • Instruction Fuzzy Hash: 90F08C35801601ABCF14FBA4DC52AAE73B8AF00314F404555EA20A7392DF7056899BB9
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3.LIBCMT ref: 00C810A2
                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00C810DB
                                      • Part of subcall function 00C710AC: ActivateActCtx.KERNEL32(?,?,00DCB098,00000010,00CACCBA,UxTheme.dll,75FD6BA0,?,00CACD7B,00000004,00C8337D,00000000,00000004,00CCE78D), ref: 00C710CC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: ActivateAddressH_prolog3Proc
                                    • String ID: UxTheme.dll
                                    • API String ID: 323876227-352951104
                                    • Opcode ID: 9583c7b762b087ebe9c927912eacdf83e58f90e42b91143542b789d5c473fdb5
                                    • Instruction ID: b6cf20d7860652229db13bf4e52c7eeaa1b70ffca038a88f1db00fb96f1cd98e
                                    • Opcode Fuzzy Hash: 9583c7b762b087ebe9c927912eacdf83e58f90e42b91143542b789d5c473fdb5
                                    • Instruction Fuzzy Hash: F7E065706013815BCB24BFB49E45B3937E8AB54754F0A4064FC14DB3A2C775CA81CB74
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • EnterCriticalSection.KERNEL32(00DE6544,?,00DE6528,00DE6544,00DE6528,?,00C7E4D8,006E5B50,00000000,00000000,?,?,00C7B168,00000000,00000000,000000FF), ref: 00C7E458
                                    • LeaveCriticalSection.KERNEL32(00DE6544,00000000,?,00C7E4D8,006E5B50,00000000,00000000,?,?,00C7B168,00000000,00000000,000000FF,00000010,00C7B4D4,00000000), ref: 00C7E468
                                    • LocalFree.KERNEL32(?,?,00C7E4D8,006E5B50,00000000,00000000,?,?,00C7B168,00000000,00000000,000000FF,00000010,00C7B4D4,00000000), ref: 00C7E471
                                    • TlsSetValue.KERNEL32(00DE6528,00000000,?,00C7E4D8,006E5B50,00000000,00000000,?,?,00C7B168,00000000,00000000,000000FF,00000010,00C7B4D4,00000000), ref: 00C7E483
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CriticalSection$EnterFreeLeaveLocalValue
                                    • String ID:
                                    • API String ID: 2949335588-0
                                    • Opcode ID: 6c1981a6ef0f2922444d3e8e340a5f0b8b4022bb4016d15734d92e1bb2ab8e83
                                    • Instruction ID: ef4ce806c729cbb8cee2c74b806fa203b8f32006ed15b4b42b23b656acc4bebf
                                    • Opcode Fuzzy Hash: 6c1981a6ef0f2922444d3e8e340a5f0b8b4022bb4016d15734d92e1bb2ab8e83
                                    • Instruction Fuzzy Hash: FF114932600604EFD724CF98D884F6AB7B4FF49315F2484ADF56A8B2A1CB71A945DB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • EnterCriticalSection.KERNEL32(00DE6998,?,?,00000000,?,00C7E02E,00000010,00000008,00C6BE00,00C6BD97,00C69392,00C694C8,00C55491,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5), ref: 00C80DAF
                                    • InitializeCriticalSection.KERNEL32(?,?,00000000,?,00C7E02E,00000010,00000008,00C6BE00,00C6BD97,00C69392,00C694C8,00C55491,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5,SOFTWARE\Microsoft\Windows NT\CurrentVersion), ref: 00C80DC1
                                    • LeaveCriticalSection.KERNEL32(00DE6998,?,00000000,?,00C7E02E,00000010,00000008,00C6BE00,00C6BD97,00C69392,00C694C8,00C55491,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5,SOFTWARE\Microsoft\Windows NT\CurrentVersion), ref: 00C80DCE
                                    • EnterCriticalSection.KERNEL32(?,?,?,00000000,?,00C7E02E,00000010,00000008,00C6BE00,00C6BD97,00C69392,00C694C8,00C55491,SOFTWARE\Microsoft\Windows NT\CurrentVersion,?,00C64CE5), ref: 00C80DDE
                                      • Part of subcall function 00C69376: __CxxThrowException@8.LIBCMT ref: 00C6938C
                                      • Part of subcall function 00C69376: __EH_prolog3.LIBCMT ref: 00C69399
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3346719779.0000000000C51000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C50000, based on PE: true
                                    • Associated: 00000006.00000002.3346630283.0000000000C50000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347157677.0000000000D92000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347292520.0000000000DDE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                    • Associated: 00000006.00000002.3347376726.0000000000DED000.00000002.00000001.01000000.00000006.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_c50000_InstallManager.jbxd
                                    Similarity
                                    • API ID: CriticalSection$Enter$Exception@8H_prolog3InitializeLeaveThrow
                                    • String ID:
                                    • API String ID: 2895727460-0
                                    • Opcode ID: 7847a829b059082b888bfeeb955d46117cd5f8a5c5c8a23646da0f8ff1ce58e4
                                    • Instruction ID: 5dc335fe42b566a6de16da26dbf5be4522e2e040ab5f40c2d9a7de96cb9a68c0
                                    • Opcode Fuzzy Hash: 7847a829b059082b888bfeeb955d46117cd5f8a5c5c8a23646da0f8ff1ce58e4
                                    • Instruction Fuzzy Hash: 27F0C232600244AFD7603B99DC85B19B76AEBE0369F211427E04486252C634F845CB79
                                    Uniqueness

                                    Uniqueness Score: -1.00%